[go: up one dir, main page]

WO2006114906A1 - Service providing system, service utilization device, service providing device, service relay device, authentication method, authentication program, and recording medium for the program - Google Patents

Service providing system, service utilization device, service providing device, service relay device, authentication method, authentication program, and recording medium for the program Download PDF

Info

Publication number
WO2006114906A1
WO2006114906A1 PCT/JP2005/017757 JP2005017757W WO2006114906A1 WO 2006114906 A1 WO2006114906 A1 WO 2006114906A1 JP 2005017757 W JP2005017757 W JP 2005017757W WO 2006114906 A1 WO2006114906 A1 WO 2006114906A1
Authority
WO
WIPO (PCT)
Prior art keywords
service
authentication information
authentication
encryption
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2005/017757
Other languages
French (fr)
Japanese (ja)
Inventor
Masafumi Hirata
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sharp Corp
Original Assignee
Sharp Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sharp Corp filed Critical Sharp Corp
Priority to JP2007514452A priority Critical patent/JP4627316B2/en
Publication of WO2006114906A1 publication Critical patent/WO2006114906A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • Service providing system service using device, service providing device, service relay device, authentication method, authentication program, and recording medium thereof
  • the present invention relates to an authentication method for authenticating a user of a service using device in a service providing system including a service using device and a service providing device that provides a service to the service using device,
  • the present invention relates to a service providing system, an information terminal device, a service providing device, a service relay device, an authentication program for causing a computer to execute the authentication method, and a recording medium thereof.
  • the service providing apparatus performs user authentication processing based on authentication information such as a user ID (user name) and password that has received the power of the connected information terminal apparatus.
  • authentication information such as a user ID (user name) and password that has received the power of the connected information terminal apparatus.
  • FIG. 12 is an explanatory diagram showing an example of a conventional service providing system that performs user authentication.
  • a service providing system 100 shown in this figure includes a mobile phone 101 and a service providing apparatus 102.
  • the mobile phone 101 and the service providing apparatus 102 are connected via the Internet.
  • the service providing apparatus 102 stores a combination of a user ID and a password set in advance for a user permitted to provide the service.
  • the user of the mobile phone 101 uses the service of the service providing device 102
  • the user inputs the user ID and password to the mobile phone 101 and transmits it to the service providing device 102.
  • the service providing device 102 receives the user ID and password from the mobile phone 101
  • the service providing device 102 provides the combination of the received user ID and password, and provides the service.
  • the user ID and password combination stored in the device 102 are collated. If they match, the user is authenticated as a user who is permitted to provide the service, and the contents of the provided service are transmitted to the mobile phone 101.
  • Japanese Patent Laid-Open Publication No. 2001-320366 discloses a server via the Internet so as to eliminate password mistakes in portable information terminals.
  • a technology has been disclosed in which a personal information terminal that exchanges information with the sano has a means for entering a password in a text field and authenticating the password.
  • the present invention has been made in view of the above problems, and an object thereof is a service providing system including a service using device and a service providing device that provides a service to the service using device. This is to reduce the authentication information input operation by the user and to increase the security of the authentication information.
  • the first service providing system of the present invention provides a predetermined service in response to a request for a service using device and a service using device connected via a network.
  • a service providing system including a service providing device, wherein the service using device stores an input unit that receives an input instruction from a user for specifying a requested service and the received encrypted authentication information
  • An encryption storage unit and a utilization device control unit that transmits encrypted authentication information corresponding to the requested service to the service providing device that provides the requested service, wherein the service providing device provides the service
  • the authentication information storage unit for storing the authentication information of the user who permits the authentication and the authentication information of the user who has requested the provision of the service are An authentication processing unit that performs an authentication process for collating with authentication information of a user permitted to provide a service stored in the storage unit, a decryption unit that decrypts the encrypted authentication information to create decrypted authentication information, and a service usage
  • the decryption key unit decrypts the
  • the use device control unit when the use device control unit requests provision of a service, the use device control unit transmits the encrypted authentication information to the service providing device.
  • the service providing apparatus decrypts the received encrypted authentication information and performs authentication processing. For this reason, the user does not need to perform an operation of inputting authentication information corresponding to the requested service every time a service is requested as in the prior art, so that the convenience of authentication processing can be improved.
  • a second service providing system of the present invention provides a service using device and a service providing device that provides the service using device with a service requested by the service using device via a network.
  • a service relay device connected to the service relay device and a service providing device connected to the service relay device via a network, wherein the service using device is a user for specifying a requested service.
  • An input unit that receives an input instruction, a cryptographic storage unit that stores the received cryptographic key authentication information, a utilization device control unit that transmits the cryptographic key authentication information corresponding to the requested service to the service relay device,
  • the service providing apparatus includes an authentication information storage unit that stores authentication information of a user who is permitted to provide the service.
  • An authentication processing unit that performs an authentication process for verifying authentication information received from a service relay device with authentication information of a user permitted to provide a service stored in the authentication information storage unit.
  • the service relay device decrypts the encrypted authentication information to create the decrypted authentication information, and when receiving the encrypted authentication information from the service using device, the encrypted relay information is sent to the decryption unit.
  • a relay control unit that decrypts and transmits the decryption key authentication information obtained by the decryption key to a service providing device that provides a service requested by the service using device that has transmitted the cipher key authentication information; It is characterized by being equipped with.
  • the utilization device control unit transmits the encrypted authentication information to the service relay device when requesting the provision of a service. Then, the service relay device decrypts the received encrypted authentication information and transmits it to the service providing device, and the service providing device performs an authentication process on the decrypted key authentication information received from the service relay device. For this reason, the user does not need to perform an operation of inputting authentication information corresponding to the requested service every time the service is requested, so that the convenience of the authentication processing can be improved.
  • FIG. 1 (a) is an explanatory diagram showing a schematic configuration of a service providing system according to an embodiment of the present invention.
  • FIG. 1 (b) is an explanatory diagram showing a schematic configuration of a service providing system according to an embodiment of the present invention.
  • FIG. 2 is a block diagram showing a schematic configuration of a service using apparatus and a service providing apparatus that constitute a service providing system according to an embodiment of the present invention.
  • FIG. 3 is a flowchart showing a flow of initial authentication processing in a service providing system according to an embodiment of the present invention.
  • FIG. 4 is a flowchart showing the flow of authentication processing for the second and subsequent times in the service providing system according to one embodiment of the present invention.
  • FIG. 5 (a) is an explanatory diagram showing a schematic configuration of a service providing system according to another embodiment of the present invention.
  • FIG. 5 (b) is an explanatory view showing a schematic configuration of a service providing system according to another embodiment of the present invention.
  • FIG. 6 is a block diagram showing a schematic configuration of a service utilization device, a service relay device, and a service provision device that constitute a service provision system according to another embodiment of the present invention.
  • FIG. 7 is a flowchart showing a flow of initial authentication processing in a service providing system according to another embodiment of the present invention.
  • FIG. 8 is a flowchart showing the flow of authentication processing for the second and subsequent times in the service providing system according to another embodiment of the present invention.
  • FIG. 9 (a) is an explanatory diagram showing a schematic configuration of still another service providing system of the present invention.
  • FIG. 9 (b) is an explanatory diagram showing a schematic configuration of still another service providing system of the present invention.
  • FIG. 10 is a flowchart showing a flow of initial authentication processing in a service providing system according to still another embodiment of the present invention.
  • FIG. 11 is a flowchart showing a flow of authentication processing for the second and subsequent times in a service providing system according to still another embodiment of the present invention.
  • FIG. 12 is an explanatory diagram showing an example of a conventional service providing system.
  • FIG. 13 is an explanatory diagram showing a schematic configuration of still another service providing system according to the present invention.
  • FIG. 14 is a block diagram showing a schematic configuration of a service using device, a service providing device, and a broadcast base station that constitute the service providing system shown in FIG.
  • FIG. 15 is a flowchart showing a process flow in the service providing system shown in FIG. 13.
  • FIG. 16 is an explanatory diagram showing a modification of the service providing system shown in FIG.
  • FIG. 17 is an explanatory diagram showing a modification of the service providing system shown in FIG.
  • FIG. 18 is an explanatory diagram showing a schematic configuration of still another service providing system according to the present invention.
  • FIG. 19 is a block diagram showing a schematic configuration of a service using device, a service providing device, a service relay device, and a broadcast base station that constitute the service providing system shown in FIG.
  • FIG. 20 is a flowchart showing the flow of processing in the service providing system shown in FIG.
  • FIG. 1 (a) and FIG. 1 (b) are explanatory diagrams showing a schematic configuration of a service providing system 1 according to the present embodiment.
  • the service providing system 1 includes a mobile phone (information terminal device, service using device) 10 and a server (service providing device) 20, and these power interfaces It is connected to be able to communicate via a network such as the Internet.
  • the server 20 provides a service to a service using device.
  • the services provided by the server 20 include, for example, a blog providing service that provides a blog (blog, Weblog; a general term for a diary-like website updated daily), a book author, publisher, price, etc.
  • a book information providing service that provides information
  • an online storage service that stores image data, photo data, etc. sent from an information terminal device can be considered.
  • these services are provided by the service delivery system 1 It is only an example of a service that can be used, and a variety of other services are possible.
  • FIG. 1 (a) and FIG. 1 (b) only one server 20 is depicted. Many servers 20 are connected on the network, and each server 20 has a predetermined service. Is to provide.
  • FIG. 2 is a block diagram showing a schematic configuration of the mobile phone 10 and the server 20.
  • the mobile phone 10 includes a control unit 11, a communication unit 12, a display unit 13, an input unit 14, an encryption storage unit 15, a ROM 16, and a RAM 17.
  • the control unit 11 is a central part of the mobile phone 10 that controls the operation of each component in the mobile phone 10.
  • ROM (Read Only Memory) 16 includes various programs used by the control unit 11.
  • a RAM (Random Access Memory) 17 is a primary storage unit used by the control unit 11, and temporarily stores various types of information handled by the control unit 11. Further, the control unit 11 reads the program in the ROM 16 into the RAM 17 when using the program.
  • the communication unit 12 communicates with an external device connected through the Internet.
  • the mobile phone 10 performs two-way communication with the server 20 via the communication unit 12! /.
  • the display unit 13 displays various information and presents it to the user.
  • the display means used as the display unit 13 is not particularly limited, but for example, a liquid crystal display panel or the like is used.
  • the input unit 14 receives various instructions from the user.
  • the mobile phone 10 is provided with an input unit 14 that also has a plurality of keys (operation buttons), and the user operates these keys in combination to input characters, numbers, symbols, etc.
  • Various processes to be executed by the telephone 10 can be selected.
  • the configuration of the input unit 14 is not limited to this, and various input means such as a keyboard, mouse pointer, jog dial, pen input device, touch panel, and voice input can be used. These input means may be those provided in the mobile phone 10 or may be provided to the mobile phone 10. Then, they may be connected by radio or wire.
  • the encryption storage unit 15 stores encryption information received from the server 20, that is, authentication information such as a user ID (user name) and a password encrypted by the server 20.
  • the server 20 includes a server control unit 21, a communication unit 22, an authentication processing unit 23, an encryption unit 24, a decryption unit 25, an authentication information storage unit 26, a ROM 27, and a RAM 28. I have.
  • the server control unit 21 is a central part of the server 20 that controls the operation of each component in the server 20.
  • a ROM (Read Only Memory) 27 is a memory for storing various programs (such as a program for authentication processing) used by the server control unit 21.
  • a RAM (Random Access Memory) 28 is a primary storage unit used by the server control unit 21 and temporarily stores various information handled by the server control unit 21. In addition, when using the program in the ROM 27, the server control unit 21 reads this into the RAM 28! /.
  • the communication unit 22 communicates with an external device (such as an information terminal device) connected through the Internet.
  • the server 20 performs two-way communication with the mobile phone 10 via the communication unit 22.
  • the authentication information storage unit 26 stores a combination (non-encrypted authentication information) of a user ID and a password set in advance for a user who is permitted to provide a service from the server 20.
  • the preset authentication information may be input (set) by an input means (not shown) provided in the server 20, or may be from an information processing terminal (mobile phone 10 in the present embodiment). It may be configured to be input (set) via the communication unit 22.
  • the authentication processing unit 23 sets (registers) a user who requests the provision of a service from the information terminal device connected via the communication unit 22 as a user permitted to provide the service. It is verified whether or not the user is a force. Specifically, the authentication processing unit 23 has a preset user ID and password (unencrypted authentication information) received through the communication unit 22 and the authentication information storage unit 26. Authentication information Check the information. Then, when the collation results of both match, the user who requests service provision via the communication unit 22 is authenticated as a user who is permitted to provide the service.
  • the encryption key unit 24 encrypts the authentication information received by the service using device through the communication unit 22.
  • the encryption method is not particularly limited.
  • the decryption unit 25 decrypts the encrypted authentication information (encrypted authentication information) received from the service using apparatus via the communication unit 22.
  • FIG. 3 is a flowchart showing the flow of the initial authentication process.
  • the control unit 11 of the mobile phone 10 accepts a selection instruction of the server 20 that requests the provision of service, in which user power is also input via the input unit 14 (Sl). That is, a selection instruction for selecting a server 20 that provides a desired service from one or more servers 20 that can be connected via a network is accepted.
  • the control unit 11 Upon receiving the selection instruction of the server 20 in S1, the control unit 11 searches the encryption storage unit 15, and the encryption authentication information corresponding to the server 20 to be selected (or the encryption key corresponding to the requested service). It is determined whether or not (authentication information) is stored (S2). Details of the encryption authentication information will be described later.
  • control unit 11 performs the initial authentication process described below (S4 to S4 in the mobile phone 10). The process of S9 and the process of S21 to S26 in the server 20 are performed.
  • the control unit 11 receives initial authentication information input from the user via the input unit 14. (User ID and password) are accepted (S4). In this case, the control unit 11 may cause the display unit 13 to display an image for prompting input of the initial authentication information as necessary.
  • Table 1 shows an example of authentication information (user ID and password) input via the input unit 14.
  • control unit 11 transmits the initial authentication information received in S4 to the server 20 that requests service provision (S5).
  • the initial authentication information is unencrypted authentication information that is not encrypted.
  • the server control unit 21 of the server 20 receives the initial authentication information transmitted from the mobile phone 10 via the communication unit (service authentication window) 22 (S21), the server control unit 21 performs authentication processing of the initial authentication information. (S22) 0 Specifically, the initial authentication information received from the mobile phone 10 and the preset authentication information stored in the authentication information storage unit 26 are collated.
  • the server control unit 21 determines whether or not the collation results of the two match as a result of the authentication processing in S22, that is, whether or not the authentication is successful (S23).
  • the server control unit 21 transmits a signal (information) indicating that the authentication has failed to the mobile phone 10, and notifies the authentication failure (S24).
  • the server control unit 21 causes the encryption unit 24 to encrypt the authentication information and create encrypted authentication information (S25).
  • the encryption method is not particularly limited.
  • Table 2 is an example of encryption authentication information obtained by encrypting the authentication information shown in Table 1 by the encryption unit 24.
  • the server control unit 21 returns the encryption key authentication information created by the processing of S25 to the mobile phone 10 via the communication unit 22 (S26).
  • control unit 11 of mobile phone 10 determines whether the received information is an authentication failure notification (S 7).
  • the control unit 11 When it is determined that the received information is an authentication failure notification, that is, when it is determined that the received information is not encryption authentication information, the control unit 11 indicates that the authentication processing has failed and the authentication A question as to whether or not to continue processing is displayed on the display unit 13 (not shown). If the input unit 14 is instructed not to continue the authentication process, or if no instruction is given, the authentication process ends. If the input unit 14 is instructed to continue the authentication process, the process from S4 is performed again. Or, omit the instruction to continue and allow the user to re-enter the authentication information for the first time when continuing the authentication process.
  • the control unit 11 If it is determined in S7 that the received information is not an authentication failure notification, that is, if it is determined that the received information is encrypted authentication information, the control unit 11 The received encrypted authentication information is stored in the encryption storage unit 15 in association with information for identifying the server 20 (or service corresponding to the encrypted authentication information) corresponding to the encrypted authentication information (S9). This completes the initial authentication process.
  • the second and subsequent authentication processes that is, encryption key recognition information corresponding to the requested service (or the server 20 providing the requested service) is stored in the encryption storage unit 15.
  • the authentication process in the case of being present will be described with reference to FIG. Fig. 4 is a flowchart showing the flow of authentication processing for the second and subsequent times.
  • control unit 11 of the mobile phone 10 performs the processes S1 and S2 described in FIG. In S2, the encryption key authentication information corresponding to the server 20 to be selected (or requested) If it is determined that the encryption authentication information corresponding to the service is not stored, the control unit 1
  • control unit 11 when it is determined that the corresponding encryption key information is stored in S2, the control unit 11 performs the second and subsequent authentication processes (S31 to S10 in the mobile phone 10) described below. The process of S34 and the process of S41 to S44 in the server 20 are performed.
  • control unit 11 first reads out the corresponding encryption authentication information stored in the encryption storage unit 15 (S31).
  • the control unit 11 receives input of service request information input via the input unit 14 (S32).
  • the service request information is various information necessary for requesting the provision of service.
  • control unit 11 transmits the encryption key authentication information read in S31 and the service request information received in S32 to the server 20 via the communication unit 12 (S33).
  • Table 3 shows an example of encryption authentication information and service request information when a blog providing service is requested.
  • the service identifier and the URL of the blog to be acquired correspond to the service request information.
  • the server control unit 21 of the server 20 Upon receiving the encrypted authentication information and the service request information from the mobile phone 10 via the communication unit 22 (S41), the server control unit 21 of the server 20 receives the encrypted key authentication information received by the decryption key unit 25. Is decrypted (S42).
  • the server control unit 21 performs an authentication process on the decrypted authentication information (S43). Specifically, the authentication information received and decrypted from the mobile phone 10 is collated with preset authentication information stored in the authentication information storage unit 26. Since the decrypted authentication information is authentication information that has been successfully authenticated during the initial authentication process, the authentication information storage unit 26 stores the decrypted authentication information. As long as the stored authentication information has not been rewritten thereafter, it always matches. Here, if such rewriting is not performed, if rewriting is performed, authentication failure may be notified to the mobile phone, and the initial authentication processing may be performed again (not shown). )
  • the server control unit 21 After performing the authentication process of S43 (after confirming the authentication success), the server control unit 21 transmits the service content to be provided to the mobile phone 10 (S44).
  • the control unit 11 of the mobile phone 10 receives the service provided from the server 20 (S34) and stores the received content in the RAM 17 or displays it on the display unit 13 to perform necessary processing. . This completes the second and subsequent authentication processing and service reception processing.
  • the server 20 when the server 20 receives the initial authentication information from the mobile phone 10, it performs an authentication process on the received initial authentication information.
  • the server 20 encrypts the initial authentication information to create encrypted authentication information and transmits it to the mobile phone 10.
  • the mobile phone 10 stores the encrypted authentication information received from the server 20.
  • the server 20 requests service from the next time onward, the encrypted authentication information stored as described above is transmitted from the mobile phone 10 to the server 20, and the encrypted authentication information received by the server 20 is transmitted.
  • the authentication process is performed by decrypting the above.
  • the user of the mobile phone (service utilization device) 10 only needs to input authentication information (user ID and password) during the initial authentication process. That is, when the user uses the service provided by the server (service providing apparatus) 20 using the mobile phone 10, it is not necessary to input authentication information every time. Therefore, the convenience of the user when using the service can be improved.
  • the encrypted authentication information is stored in the mobile phone 10, for example, even if the storage area of the mobile phone 10 is analyzed, the authentication information for the server 20 leaks (is stolen). There is no. Therefore, the security (safety) related to the authentication information can be enhanced by the authentication method that works on the present embodiment.
  • the server (service providing apparatus) 20 that can request the mobile phone 10 to provide the service includes: It is not limited to one. In other words, from mobile phone 10 to the Internet Select the server that provides the desired service from the multiple servers 20 that can be connected via the work, and request the service to be provided.
  • authentication information (user ID and password) set in advance in each server 20. ) May be different for each server (or for each service to be used).
  • initial authentication information (unencrypted authentication information) is transmitted from the mobile phone 10 to the server 20, and if the authentication process in the server 20 is successful, the server 20 The encryption key authentication information is returned to the mobile phone 10.
  • the present invention is not limited to this.
  • the initial authentication information and the service request information are transmitted from the mobile phone 10 to the server 20 and provided together with the encryption key authentication information when the server 20 succeeds in the authentication process.
  • the content of the service to be sent may be sent from the server 20 to the mobile phone 10.
  • the power for encrypting both the user ID and the password is not necessarily limited to this. For example, only one of them may be encrypted. Yes.
  • a user ID and a password are used as authentication information.
  • each mobile phone service utilization device
  • a terminal ID unique to 10 may be used as authentication information.
  • other information processing terminals service usage devices
  • the security related to the authentication information can be further improved.
  • the terminal ID may be information unique to the terminal.
  • the telephone number, the line contract number, the manufacturing number, etc. of the mobile phone 10 can be used. Since the terminal ID is information unique to each mobile phone 10, for example, it may be stored in the ROM 16 and read out by the control unit 11. In this case, the user does not need to input the terminal ID. Further, when the terminal ID is included in the authentication information, the terminal ID may be encrypted. Table 4 shows an example of the initial authentication information sent from the mobile phone 10 to the server 20 during the initial authentication process when the serial number of the mobile phone 10 is used as the terminal ID. The
  • the initial authentication information transmitted from the mobile phone 10 to the server 20 at the time of initial authentication is non-encrypted authentication information that is not encrypted, but is not limited thereto. It is not a thing.
  • the mobile phone 10 is provided with an encryption means and the server 20 is provided with a corresponding decryption means.
  • the initial authentication information is encrypted with the mobile phone 10 and the mobile phone 10 encrypts it to the server 20. It is also possible to transmit the entered initial authentication information and decryption information for decrypting it.
  • the encrypted initial authentication information transmitted from the mobile phone 10 to the server 20 at the time of the initial authentication is the same as the encrypted authentication information transmitted from the server 20 to the mobile phone 10 after the initial authentication is successful. There is no need.
  • the authentication information is encrypted when the initial authentication process is successful, and the authentication information encrypted at this time is used continuously thereafter.
  • the encryption key process may be executed again each time the authentication process is successful, and the encryption key authentication information different from the previous time may be transmitted to the mobile phone 10. Also, update the encrypted authentication information (re-encryption) every time a predetermined number of authentication processes are executed, and send the encryption authentication information different from the previous one to the mobile phone 10.
  • FIG. 5 (a) and FIG. 5 (b) are explanatory diagrams showing a schematic configuration of the service providing system 2 that works on the present embodiment.
  • the service providing system 2 is a mobile phone. (Information terminal device) 10, server (service providing device) 30, and relay server (service relay device) 40. Further, the mobile phone 10 and the relay server 40, and the relay server 40 and the server 30 are connected to each other via a network such as the Internet.
  • FIG. 6 is a block diagram showing a schematic configuration of the mobile phone 10, the relay server 40, and the server 30.
  • the configuration of the mobile phone 10 is the same as that of the first embodiment.
  • the relay Sano 0 relays between the mobile phone 10 and the server 20, and as shown in FIG. 6, the relay server control unit 41, the communication unit 42, the encryption unit 43, and the decryption unit 44 , A server identification information storage unit 45, a ROM 46, and a RAM 47 are provided.
  • the relay server control unit 41 is a central part of the relay server 40 that controls the operation of each component in the relay server 40.
  • a ROM (Read Only Memory) 46 is a memory for storing various programs (programs such as encryption process, decryption process, and server identification process) used by the relay server control unit 41.
  • a RAM (Random Access Memory) 47 is a primary storage unit used by the relay server control unit 41, and temporarily stores various types of information handled by the relay server control unit 41. Further, the relay server control unit 41 reads the program in the ROM 46 into the RAM 47 when using the program in the ROM 46! /.
  • the communication unit 42 communicates with a service using device (mobile phone 10 in the present embodiment) and a service providing device (server 30 in the present embodiment) connected through the Internet.
  • the relay server 40 performs bidirectional communication between the mobile phone 10 and the server 30 via the communication unit 42.
  • the encryption key unit 43 encrypts the authentication information that has also received the service using device capability via the communication unit 42.
  • the encryption method is not particularly limited.
  • the decryption key unit 44 decrypts it.
  • the server identification information storage unit 45 has information (services) for identifying services provided by each server 30 for one or more servers 30 that are communicably connected via the Internet. Identifier) and the destination of each server 30 are stored in association with each other.
  • the server 30 provides a service to the service using device such as the mobile phone 10 via the relay server 40.
  • the service provided by the server 30 is the same as that of the server 20 in the first embodiment.
  • FIG. 5 (a) and FIG. 5 (b) only one server 30 is depicted, but a large number of servers 30 are connected on the network, and each server 30 is a predetermined server 30. I started to provide services.
  • the server 30 includes an encryption key unit and a decryption key unit, and is different from the server 20 in the first embodiment in that respect. Further, the point that the communication unit 22 does not directly communicate with the mobile phone 10 but communicates with the relay server 40 is different from the first embodiment.
  • FIG. 7 is a flowchart showing the flow of the initial authentication process.
  • the control unit 11 of the mobile phone 10 receives an instruction to select a service to be used, in which user power is also input via the input unit 14 (S51). In other words, it accepts a selection instruction for selecting a desired service among the services provided by one or more servers 20 connectable via a network. Then, the control unit 11 generates information (service identifier) that identifies the selected service (not shown). Alternatively, the user may directly input information (service identifier) for specifying a desired service via the input unit 14.
  • control unit 11 searches the encryption storage unit 15 and determines whether or not the encryption authentication information corresponding to the service selected in S51 is stored (S52).
  • the control unit 11 performs the initial authentication process described below (the process of S54 to S59 in the mobile phone 10, the process of S61 to S67 in the intermediate Sano 40, and the process of S71 to S73 in the Sirno 30. Process).
  • control unit 11 receives the initial authentication information input from the user via the input unit 14.
  • control unit 11 may cause the display unit 13 to display an image that prompts input of the initial authentication information as necessary.
  • the control unit 11 transmits the initial authentication information and the service identifier to the relay server 40 via the communication unit 12 (S55).
  • the initial authentication information is non-encrypted authentication information that is not encrypted.
  • Table 5 shows an example of information transmitted in S55 when a blog provision service is requested.
  • relay server control unit 41 of relay server 40 receives the initial authentication information and the service identifier transmitted from mobile phone 10 via communication unit 42 (S61), the service corresponding to the received service identifier is received.
  • the server 30 that provides the server 30 searches the server identification information storage unit 45 to identify the destination, and transmits the initial authentication information to the identified destination server 30 via the communication unit 42 (S62). Further, the relay server control unit 41 stores the initial authentication information in the RAM 47.
  • the server control unit 21 of the server 30 receives the initial authentication information transmitted from the relay server 40 via the communication unit (service authentication window) 22 (S71), the server control unit 21 performs authentication processing of the initial authentication information. (S72). Specifically, the initial authentication information received from the relay server 40 and the preset authentication information stored in the authentication information storage unit 26 are collated, and whether or not the collation results match, that is, authentication. To determine whether or not And sir The control unit 21 notifies the determination result (authentication processing result) to the relay server 40 (S73).
  • the relay server control unit 41 of the relay Sano 0 determines whether or not the authentication processing in the server 30 is successful (S64).
  • the relay server control unit 41 when it is determined that the authentication process has failed, the relay server control unit 41 notifies the mobile phone 10 of the authentication failure (S65). On the other hand, if it is determined in S64 that the authentication process is successful, the relay server control unit 41 reads the initial authentication information stored in the RAM 47 and encrypts the initial authentication information in the encryption unit 43. To create encryption key authentication information (S66). Note that the encryption method is not particularly limited.
  • the relay server control unit 41 transmits the encryption key authentication information created in the process of S66 to the mobile phone 10 via the communication unit 42 (S67).
  • control unit 11 of the mobile phone 10 receives the information returned from the relay server 40 (S56), it determines whether or not the received information is an authentication failure notification (S57).
  • the control unit 11 When it is determined that the received information is an authentication failure notification, that is, when it is determined that the received information is not encryption authentication information, the control unit 11 indicates that the authentication processing has failed and the authentication A question as to whether or not to continue processing is displayed on the display unit 13 (not shown).
  • the authentication process ends. If the input unit 14 is instructed to continue the authentication process, the process from S54 is performed again. Or, omit the instruction to continue and allow the user to re-enter the initial authentication information when continuing the authentication process.
  • the control unit 11 receives the received encryption.
  • the authentication information is stored in the encryption storage unit 15 in association with the service identifier corresponding to the encryption authentication information (S59). This completes the initial authentication process.
  • the second and subsequent authentication processes that is, the authentication process when the cipher key recognition information corresponding to the selected service is stored in the cipher storage unit 15 will be described with reference to FIG. To do.
  • FIG. 8 is a flowchart showing the flow of authentication processing for the second and subsequent times.
  • control unit 11 of the mobile phone 10 performs the processes of S51 and S52 described with reference to FIG.
  • control unit 11 If it is determined in S52 that the encryption authentication information corresponding to the service identifier of the selected service is not stored, the control unit 11 performs the initial authentication process described above (the process after S54 in FIG. 7). I do.
  • control unit 11 performs the second and subsequent authentication processing described below (the processing of S81 to S84 in the mobile phone 10, The processing of S91 to S95 in Nakano Sano 40 and the processing of S101 to S103 in server 30) is performed.
  • control unit 11 first reads and obtains the encryption authentication information corresponding to the service identifier of the selected service stored in the encryption storage unit 15 (S81).
  • the control unit 11 receives input of detailed information related to a service input via the input unit 14 (S82).
  • the detailed information on the service is, for example, the URL of the blog to be acquired when requesting a blog providing service.
  • the information acquired! /, Information for identifying the book, etc. correspond to the detailed information about the service.
  • service request information information including such detailed information and service identification information is referred to as service request information.
  • control unit 11 sends the encryption key authentication information read in S81, the detailed information received in S82, and the service request information including the service identifier of the service selected in S51, to the communication unit 12. To the relay server 40 (S83).
  • the relay server control unit 41 of the relay server 40 receives the encryption authentication information and the service request information from the mobile phone 10 via the communication unit 42 (S91), the encryption received by the decryption unit 25 is received. The authentication information is decrypted (S92).
  • the relay server control unit 41 searches the server identification information storage unit 45 for the destination of the server 30 that provides the service corresponding to the service identifier received from the mobile phone 10, and specifies the destination.
  • the authentication information decrypted and transmitted to the server 30 via the communication unit 42.
  • Service request information is transmitted (S93).
  • the server control unit 21 of the server 30 receives the authentication information and the service request information decrypted from the relay sano O (S101), the server control unit 21 performs an authentication process on the received authentication information (decrypted authentication information). Perform (S102). Specifically, the authentication information decrypted by the relay server 40 and the preset authentication information stored in the authentication information storage unit 26 are collated. Since the decrypted authentication information is authentication information that has been successfully authenticated at the time of the initial authentication process, the authentication information stored in the authentication information storage unit 26 is sure to match unless the authentication information is subsequently rewritten. . Here, when such force rewriting is performed, if rewriting is performed, the mobile phone 10 is notified of the authentication failure via the relay server 40, and the initial authentication processing power is also restarted. If you do this (not shown).
  • the server control unit 21 After performing the authentication process of S102 (after confirming the authentication success), the server control unit 21 transmits the service content to be provided to the relay server 40 (S103).
  • the relay server control unit 41 of the relay server 40 receives the service content provided by the server 30 (S94), it transmits the received service content to the mobile phone 10 (S95).
  • the control unit 11 of the mobile phone 10 Upon receiving the service content from the relay server 40 (S84), the control unit 11 of the mobile phone 10 performs the necessary processing by storing the received service content in the RAM 17 or displaying it on the display unit 13 or the like. . This completes the second and subsequent authentication processing and service reception processing.
  • the authentication information that has been successfully subjected to the initial authentication process is encrypted by the relay server 40 and then stored in the mobile phone 10.
  • the encrypted authentication information stored as described above is transmitted from the mobile phone 10 to the relay server 40, and the encrypted key authentication information received by the relay server 40 is decrypted. Then, the decrypted authentication information is transmitted to the server 30 that provides the requested service.
  • the user of the mobile phone (service utilization device) 10 only needs to input authentication information (user ID and password) during the initial authentication process. That is, when the user uses the service provided by the server (service providing apparatus) 30 using the mobile phone 10, it is not necessary to input authentication information every time. Therefore, the convenience of the user when using the service can be improved. [0129] Further, since the encrypted authentication information is stored in the mobile phone 10, for example, even if the storage area of the mobile phone 10 is analyzed, the authentication information for the server 30 is leaked (stolen). There is no. Therefore, the security (safety) related to the authentication information can be enhanced by the authentication method that works on the present embodiment.
  • the encryption unit and the decryption unit are provided in the relay sano O. For this reason, it is not necessary for the server 30 to include an encryption unit and a decryption unit, and therefore the authentication method and service providing system of the present invention can be realized using the existing server 30 (service providing device). .
  • Relay Sano O associates information (service identifier) for identifying the service provided by each server with the destination of each server for one or more servers that are communicably connected.
  • a server identification information storage unit 45 for storage is provided.
  • the mobile phone 10 can also transmit the service identifier to the relay Sano O, so that the relay server 40 can search for the destination of the server that provides the service corresponding to the service identifier.
  • the cellular phone 10 only needs to store the encryption authentication information for the service that has been successfully authenticated for the first time in association with the service identifier of the service.
  • the user can easily use the desired service of each service provided by multiple servers simply by selecting (inputting) the service (or service identifier) to be used.
  • a service relay device when a service relay device is provided, services provided by one or more service providing devices can be authenticated and used without entering a password each time. improves.
  • authentication information user ID and password
  • each server 30 is set for each server (or each service). ) May be different.
  • the initial authentication information (unencrypted authentication information) and the service identifier are transmitted from the mobile phone 10 to the relay server 40, and the authentication process in the server 30 is successful.
  • the encryption key authentication information is returned from the relay server 40 to the mobile phone 10.
  • the present invention is not limited to this.
  • the mobile phone 10 requests to the relay server 40 in addition to the initial authentication information and the service identifier.
  • the server 30 succeeds in the authentication process, the service details provided by the server 30 and the encryption authentication information created by the relay server 40 are transmitted from the relay server 40. Send it to mobile phone 10.
  • the mobile phone 10 is provided with an encryption means, and the relay server 40 is provided with a corresponding decryption means.
  • the initial authentication information is encrypted with the mobile phone 10, and the mobile phone 10 power is also stored.
  • the initial authentication information encrypted and the decryption information for decrypting it may be transmitted to the relay server 40.
  • the encrypted initial authentication information transmitted from the mobile phone 10 to the relay server 40 at the time of the initial authentication does not have to be the same as the encrypted authentication information generated by the relay server 40 after the initial authentication is successful. .
  • the authentication information is encrypted when the initial authentication process is successful, and the encrypted authentication information is used continuously thereafter.
  • the encryption process of the authentication process related to the service is executed again, and the encryption authentication information different from the previous one is transmitted to the mobile phone 10. May be.
  • every time the service is used a specified number of times update the encrypted authentication information (re-encryption) and send the encrypted authentication information different from the previous one to the mobile phone 10.
  • FIG. 9 (a) and FIG. 9 (b) are explanatory diagrams showing a schematic configuration of a service providing system 2a that works on the present embodiment.
  • the service providing system 2a includes a mobile phone (information terminal device) 10, a relay server (service relay device) 40, and servers (service providing devices) 30a and 30b.
  • the mobile phone 10 and the relay server 40, and the relay server 40 and the servers 30a and 30b are respectively connected via a network such as the Internet. Are connected to communicate.
  • the configuration of the mobile phone 10 is the same as that of the first and second embodiments
  • the configuration of the relay server 40 is the same as that of the second embodiment
  • the configuration of each server 30a, 30b is the same as that of the server 30 of the second embodiment. It is.
  • the authentication information transmitted to the servers 30a and 30b is collectively collected from the mobile phone 10.
  • the authentication information transmitted to the relay server 40 and received by the relay server 40 is distributed for each server and transmitted. Further, the service contents provided by the servers 30a and 30b are collected together by the relay server 40 and transmitted to the mobile phone 10.
  • FIG. 10 is a flowchart showing the flow of the initial authentication process.
  • the control unit 11 of the mobile phone 10 receives an instruction to select all the services to be used, in which user power is also input via the input unit 14 (S111). That is, the selection instruction for selecting all desired services is also accepted as the central force of each service provided by one or more servers 20 that can be connected via the network. Then, the control unit 11 generates information (service identifier) that identifies each selected service (not shown). Alternatively, the user may directly input information (service identifier) identifying each desired service via the input unit 14.
  • control unit 11 searches the encryption storage unit 15 and determines whether encryption authentication information corresponding to all the services selected in S111 is stored (S112). ).
  • control unit 11 also receives user power through the input unit 14.
  • the encrypted authentication information is stored in S112, and the initial authentication information (user ID and password) are accepted (S114).
  • the control unit 11 stores the encrypted authentication information on the display unit 13 and displays an image prompting the user to input the initial authentication information for the service! / Even so,
  • the control unit 11 transmits the initial authentication information input in S114 and the service identifier of the service related to the initial authentication information to the relay server 40 via the communication unit 12 (S115). .
  • the initial authentication information is non-encrypted authentication information that is not encrypted.
  • Table 6 shows an example of information transmitted in S115 when the blog providing service and the book information (book information) providing service are used. In the example shown in Table 6, in addition to the user ID and password, a terminal ID that is unique to each mobile phone 10 is used as the authentication information.
  • the relay server control unit 41 of the relay server 40 receives initial authentication information and service identifiers for all services to be used transmitted from the mobile phone 10 via the communication unit 42 (S121), the received service identifiers Server that provides services corresponding to Is searched from the server identification information storage unit 45 and specified.
  • the initial authentication information is transmitted via the communication unit 42 (S122).
  • the relay server control unit 41 stores the initial authentication information of each service in the RAM 47.
  • the initial authentication information shown in Table 7 is transmitted to the server 30a that is a server providing the blog providing service.
  • the initial authentication information shown in Table 8 is transmitted to the server 30b which is a server providing the book information providing service.
  • the server control unit 21 of the servers 30a and 30b receives the initial authentication information transmitted from the relay server 40 via the communication unit (service authentication window) 22 (S131), it authenticates the received initial authentication information. Processing is performed (S132). Specifically, the initial authentication information received from the relay server 40 and the preset authentication information stored in the authentication information storage unit 26 are collated, and whether or not the collation results of the two match, That is, it is determined whether or not the authentication is successful. Then, the server control unit 21 notifies the determination result (authentication processing result) to the relay server 40 (S133).
  • the relay server control unit 41 of the relay server 40 receives the notification of the authentication processing result from the servers 30a and 30b (S123), it determines whether or not the authentication processing in each of the servers 30a and 30b is successful ( S 124). [0155] Then, the relay server control unit 41 reads from the RAM 47 the initial authentication information of the service for which the authentication process has been determined to be successful, and causes the encryption key unit 43 to encrypt the initial authentication information, thereby encrypting the authentication. Information is created (S 125). Further, the created encrypted authentication information is stored in the RAM 47 (S 126).
  • authentication failure information indicating that the authentication process for the service has failed is stored in RAM 47 (S127).
  • relay server control unit 41 determines whether or not the authentication process has been completed for the services corresponding to all service identifiers received from mobile phone 10 (S128). If there is a service for which authentication processing has not been completed, the processing from S122 is repeated, and authentication processing is performed for all services. On the other hand, if it is determined that the authentication process has been completed for all the services to be used, the relay server control unit 41 determines each encrypted authentication information stored in the RAM 47 in S126 and each authentication failure information stored in the RAM 47 in S127. And the read information is collected and transmitted to the mobile phone 10 (S129).
  • Table 9 shows information (service identifier and encryption key) transmitted from the relay server 40 to the mobile phone 10 when the authentication process is successful for both the blog providing service and the book information providing service.
  • An example of (authentication information) is shown.
  • the terminal ID must be encrypted for V, but not limited to this! /.
  • Terminal ID (encrypted authentication information B ') 037323290383 [0160]
  • the control unit 11 of the mobile phone 10 Upon receiving the information returned from the relay server 40 (S116), the control unit 11 of the mobile phone 10 stores the encrypted authentication information included in the received information in association with each service identifier. Stored in section 15 (S 117).
  • control unit 11 determines whether or not the information received from the relay server 40 includes authentication failure information (S118). If it is determined that the authentication failure information is included, the control unit 11 displays on the display unit 13 an inquiry as to whether the authentication process has failed for the service and whether or not to continue the authentication process. (Not shown).
  • the input unit 14 is instructed not to continue the authentication process, or if no instruction is given, it is determined that the use of the service that has failed in authentication is abandoned. Then, the authentication process ends. If the input unit 14 is instructed to continue the authentication process, the process from S114 is performed again. Or, omit the instruction to continue and allow the user to re-enter the initial authentication information for the service when continuing the authentication process.
  • FIG. Fig. 11 is a flowchart showing the flow of authentication processing after the second time.
  • control unit 11 of the mobile phone 10 performs the processing of S111 and S112 described with reference to FIG.
  • the control unit 11 performs the above-described initial authentication process (S114 in FIG. 10). Perform the following processing).
  • the control unit 11 performs the second and subsequent authentication processing described below (from S141 to S143 in the mobile phone 10). Processing, intermediate Sano 40, S151 to S157, and Sano 30a, 30b, S161 to S163). In this case, the control unit 11 receives input of detailed information (other information) related to the service input via the input unit 14 (S141).
  • the detailed information about the service is, for example, the URL of the blog to be acquired when requesting a blog provision service.
  • information such as the number that identifies the book for which information is to be obtained corresponds to the detailed information about the service.
  • information including such detailed information and service identification information is referred to as service request information.
  • the control unit 11 reads out the encryption authentication information corresponding to the service identifiers of all the services to be used from the encryption storage unit 15, and reads out the encrypted authentication information about each read service and each service.
  • the service request information (service identifier of each service and detailed information of each service) is transmitted to the relay server 40 via the communication unit 12 (S142).
  • Table 10 shows an example of information transmitted in the process of S142.
  • the relay server control unit 41 of the relay server 40 receives the encryption key authentication information and the service request information for all the services to be used from the mobile phone 10 via the communication unit 42 (S151), the decryption key unit Each encrypted key authentication information received is decrypted in 25 (S152). [0171] Next, the relay server control unit 41 searches the server identification information storage unit 45 to identify the destination of the server that provides each service to be used, and passes the communication unit 42 to each identified server. Then, the decrypted authentication information and detailed information about the service are transmitted (S153).
  • the decrypted authentication information shown in Table 11 and the detailed information about the service are transmitted to the server 30a that is a server that provides the blog providing service.
  • the decrypted authentication information and detailed information on the service shown in Table 12 are transmitted to the server 30b which is a server that provides the information providing service of the book.
  • the server control unit 21 of the servers 30a and 30b receives the authentication information decrypted from the relay server 0 and the service request information (S161), it performs an authentication process on the received authentication information (decrypted authentication information) ( S162). Specifically, the authentication information decrypted by the relay server 40 is compared with preset authentication information stored in the authentication information storage unit 26. Note that the decrypted authentication information is authentication information that has been successfully authenticated at the time of the initial authentication process, so that the authentication information stored in the authentication information storage unit 26 is subsequently rewritten and Always match. Here, it is assumed that such rewriting has not been performed, If the rewriting has been performed, the mobile phone 10 is notified of the authentication failure via the relay server 40, and the initial authentication process is performed again! (Not shown).
  • the server control unit 21 After performing the authentication process of S162 (after confirming the authentication success), the server control unit 21 transmits the service content to be provided to the relay Sano O (S163).
  • the service content transmitted from the server 30a that provides the program is the service content oc
  • the service content transmitted from the server 30b that provides the book information is the service content ⁇ .
  • the relay server control unit 41 of the relay server receives the service content that also provides the servers 30a and 30b (S94), the received service content is stored in the RAM 47 in association with the service identifier of each service ( S 155).
  • the relay server control unit 41 determines whether or not the service content of the service corresponding to all the service identifiers to be used has been received from each Sano (S 156). If there is a service that has not received the service content, the relay server control unit 41 repeats the processing from S 152 onward, and receives the service content for all the services.
  • the relay server control unit 41 reads the service contents of each service stored in the RAM 47 in S155 and reads each service that has been read.
  • the service contents are collectively sent to the mobile phone 10 (S157).
  • the service content of each service is transmitted to the mobile phone 10 in a state associated with the service identifier of each service.
  • the control unit 11 of the mobile phone 10 Upon receiving the service content from the relay server 40 (S143), the control unit 11 of the mobile phone 10 performs the necessary processing by storing the received service content in the RAM 17 or displaying it on the display unit 13 or the like. . This completes the second and subsequent authentication processing and service reception processing.
  • the mobile phone 10 (service using device) also requires the provision of services to the plurality of servers 30a, 30b (service providing devices).
  • Authentication information to be sent to each server 30a, 30b is collectively sent from the mobile phone 10 to the relay server 40 (service relay device), and the authentication information received by the relay server 40 is distributed to each server. To send.
  • each service By inputting all the authentication information in a lump and sending the input authentication information for each service together to the relay server 40, it is possible to receive provision of a plurality of desired services. This further improves the convenience of the user at the first authentication of each service.
  • authentication information for example, user ID and password
  • authentication information for example, user ID and password
  • service contents that are also provided with a plurality of servers 30a and 30b are collected together by the relay server 0 and transmitted to the mobile phone 10.
  • the user can use the services provided by multiple servers at the same time, or use them in combination.
  • Relay Sano 0 associates information (service identifier) that identifies a service provided by each server and the destination of each server with respect to one or more servers that are communicably connected.
  • a server identification information storage unit 45 for storage is provided.
  • the mobile phone 10 can also transmit the service identifier to the relay server 0, so that the relay server 40 can search for the destination of the server that provides the service corresponding to the service identifier.
  • the cellular phone 10 only needs to store the encryption authentication information for the service that has been successfully authenticated for the first time in association with the service identifier of the service.
  • the user can easily use the desired service of each service provided by multiple servers simply by selecting (inputting) the service (or service identifier) to be used.
  • FIG. 13 is an explanatory diagram showing a schematic configuration of a service providing system la according to the present embodiment.
  • the service providing system la is a mobile phone (information terminal device).
  • a service using device 10a and a server (service providing device) 20a are connected so that it can communicate via a network such as the Internet.
  • the service providing system la the encrypted authentication information, the terminal ID, and the service connection destination of the user permitted to provide the service are transmitted from the server 20a to the broadcast base station 50 via the Internet or the like. 50 is transmitted via the broadcast network.
  • the broadcasting network for example, terrestrial digital broadcasting, BS digital broadcasting, mopile broadcasting, broadcasting for mobile phones, and the like can be used.
  • FIG. 14 is a block diagram showing a schematic configuration of the mobile phone 10a, the server 20a, and the broadcast base station 50. As shown in FIG.
  • the broadcast base station 50 includes a control unit 51, a communication unit 52, and a transmission unit 53.
  • the control unit 51 controls operations of the communication unit 52 and the transmission unit 53.
  • the communication unit 52 communicates with the communication unit 22 provided in the server 20a.
  • the communication medium that connects the communication unit 52 and the communication unit 22 so as to communicate with each other is not particularly limited, but for example, the Internet can be used.
  • the mobile phone 10a includes a tuner part 18 that receives a broadcast transmitted from the broadcast base station 50. Further, a terminal ID determination unit 1 la for determining whether or not the terminal ID of the mobile phone 10a is included in the information received by the tuner part 18 is provided in the control unit 11. .
  • the server 20a includes an authentication information input unit 29 in addition to the configuration of the server 20 shown in FIG.
  • This authentication information input unit 29 accepts input of the user ID and password of the user who is permitted to provide the service from the server 20a and the terminal ID of the mobile phone 10a that provides the service.
  • the configuration of the authentication information input unit 29 is not particularly limited.
  • various input means such as a keyboard, a mouse pointer, a jog dial, a pen input device, a touch panel, and a voice input can be used. These input means may be provided in the mobile phone 10a or may be connected to the mobile phone 10a by radio or wire.
  • FIG. 15 is a flowchart showing the flow of the initial authentication process in the service providing system la.
  • the server control unit 21 of the server 20a accepts input of authentication information (user ID, password, terminal ID) permitted to provide a service, which is input via the authentication information input unit 29 (S171). ).
  • the service provider inputs authentication information of a user who has contracted in advance through the authentication information input unit 29.
  • the server control unit 21 causes the encryption unit 24 to encrypt the authentication information input in S171, and creates encryption authentication information (S172).
  • the encryption method is not particularly limited.
  • the server control unit 21 uses the encryption key authentication information created in the processing of S172, the terminal ID and the service connection destination (address for communicating with the server 20a) input in S171, as the communication unit.
  • the data is transmitted to the broadcast base station 50 via 22 (S173).
  • Table 13 shows an example of encryption authentication information (user ID and password), terminal ID, and service connection destination transmitted from the server 20a to the broadcast base station 50.
  • control unit 51 of the broadcast base station 50 receives the encryption key authentication information, the terminal ID, and the service connection destination via the communication unit 52 (S181), the received encryption key authentication information, terminal, and service are received.
  • the connection destination is transmitted from the transmission unit 53 to the broadcast network (S182).
  • control unit 11 of the mobile phone 10a receives the encryption key authentication information, the terminal, and the service connection destination transmitted from the broadcast base station 50 (S191), the control is received by the terminal ID determination unit 11a. It is determined whether the terminal ID is its own terminal ID (S192).
  • control unit 11 determines that the terminal ID is its own terminal ID, the control unit 11 stores the received encryption key authentication information, terminal, and service connection destination in the encryption storage unit 15 (S193). finish.
  • the control unit 11 receives the received encryption key.
  • the authentication information, terminal, and service connection destination are discarded (S194), and the process ends.
  • the server 20a permits the provision of the encrypted authentication information and the service obtained by encrypting the authentication information permitting the provision of the service.
  • the terminal ID of the mobile phone 10a and the service connection destination are transmitted via the broadcast network.
  • the mobile phone 10a When the mobile phone 10a receives the encrypted authentication information, the terminal ID, and the service connection destination, the mobile phone 10a determines whether the received terminal ID is its own terminal ID, and is the own terminal ID. In this case, the encryption authentication information and the service connection destination received together with the terminal ID are stored in the encryption storage unit 15.
  • the server 20a transmits the encryption key authentication information, the terminal, and the service connection destination to the mobile phone 10a via the broadcast network.
  • the present invention is not limited to this. You may make it transmit via.
  • data may be transmitted from the server 20a to the mobile phone 10a by designating the address of the mobile phone 10a so that the terminal ID is not included in the transmitted data.
  • the process of determining whether or not the received data includes its own terminal ID may be omitted, and all received encryption key authentication information and service connection destinations may be stored. ⁇ .
  • the power that authentication information (user ID, password, terminal ID) permitting service provision is input via the authentication information input unit 29 is not limited to this.
  • the user power of the mobile phone 10a and other services The initial authentication may be completed by the same method as in FIG. 3 of the first embodiment via the one-service device (other mobile phone or personal computer), and the terminal ID of the mobile phone 10a may be designated.
  • a user who has previously used the service on another service using device (contracted with the service) specifies the terminal ID of the mobile phone 10a to use the service using the mobile phone 10a. It can also be applied to
  • the mobile phone 10a when the user of the mobile phone 10a requests service provision, the mobile phone 10a transmits the encryption authentication information, the terminal ID, and the service request information to the server 20a. It is not limited to this.
  • encryption authentication information, terminal, and service request information (or service identifier) are transmitted from the mobile phone 10a to the server 20a via the relay Sano O shown in FIGS. 5 (a) and 5 (b).
  • the server 20a may be provided instead of the server 30a
  • the mobile phone 10a may be provided instead of the mobile phone 10. .
  • the service when using the service in which the encryption key authentication information is stored in the mobile phone 10a, the service is used only by performing the same process as in FIG. can do. That is, even when the service provided by the server 20a is used, the cellular phone 1 Oa may perform the same process as in FIG. Therefore, for services that receive encrypted authentication information from the broadcast network, users do not have to enter authentication information themselves when using the service from the mobile phone 10a! Even if you use it, you can easily use the service.
  • FIG. 17 is an explanatory diagram showing the state of the initial authentication process in the service providing system la in this case.
  • the server control unit 21 input authentication information, terminal ID, service connection destination (or service identifier), and successful authentication (The relay server 40 is notified of the authentication result indicating that the authentication is permitted. Then, the relay server control unit 41 of the relay server 40 causes the received authentication information to be encrypted, and the encrypted authentication information, terminal ID, and service connection destination (or service identifier) are transmitted to the communication unit. 42 is transmitted to the broadcast base station 50 via the Internet or the like.
  • the broadcast base station 50 transmits the received encrypted authentication information, terminal ID, and service connection destination (or service identifier) using the broadcast network.
  • the relay server control unit 41 of the relay Sano 0 transmits the encrypted authentication information, the terminal ID, and the service connection destination (or service identifier) from the communication unit 42 that does not transmit to the mobile phone 10a via the broadcast network. Send directly to the mobile phone 10a via a mobile phone.
  • FIG. 18 is an explanatory diagram showing a schematic configuration of a service providing system 2b according to the present embodiment.
  • the service providing system 2b includes a mobile phone (information terminal device, service using device) 10a, Sano (service providing devices) 30a and 30b, and a relay server 4 Oa. It is connected to be able to communicate via a network such as the Internet.
  • the encrypted authentication information, the terminal ID, and the service connection destination of the user permitted to provide the service are transmitted from the relay server 40a to the broadcasting base station 50 via the Internet or the like.
  • the broadcast base station 50 transmits the data via the broadcast network.
  • FIG. 19 is a block diagram showing a schematic configuration of the mobile phone 10a, the relay server 40a, the servers 30a and 30b, and the broadcast base station 50. As shown in this figure, the relay Sano Oa is shown in Figure 6. In addition to the configuration of the relay server 40, an authentication information input unit 48 is provided.
  • the authentication information input unit 48 accepts input of the user ID, password, and terminal ID of the mobile phone 10a that provides the service for the user who performs the initial authentication process.
  • the configuration of the authentication information input 48 is not particularly limited.
  • various input means such as a keyboard, a mouse pointer, a jog dial, a pen input device, a touch panel, and a voice input can be used. These input means may be provided in the mobile phone 10a, or may be connected to the mobile phone 10a by radio or wire.
  • FIG. 20 is a flowchart showing the flow of the initial authentication process in the service providing system 2b.
  • the relay server control unit 41 of the relay server 40a accepts initial authentication information (user ID, password, terminal ID) and service connection destination input via the authentication information input unit 48 ( S201).
  • the relay server control unit 41 transmits the initial authentication information input in S211 to the service connection destination server (in this case, the server 30a) (S202). Also, the relay server control unit 41 stores the authentication information and the service connection destination in the RAM 47.
  • the server control unit 31 of the server 30a Upon receiving the authentication information transmitted from the server relay server Oa (S211), the server control unit 31 of the server 30a causes the authentication processing unit 23 to perform authentication processing of the received authentication information (S212). Then, the server control unit 31 transmits the authentication result to the relay server 40a via the communication unit 22 (S213).
  • the relay server control unit 41 of the relay server 40a determines whether the authentication process in the server 30a is successful (S204). If it is determined that the authentication process has failed, the relay server control unit 41 waits for re-input of the initial authentication information and the service connection destination.
  • the relay server 40a may be provided with a display means, a voice output means, etc. so that the input person who has entered the initial authentication information is notified via the authentication information input section 48 that the authentication has failed.
  • the relay server control unit 41 The first authentication information stored in the RAM 47 is read out, and the user ID and password included in the initial authentication information are encrypted in the encryption unit 43 to generate encrypted authentication information (S205).
  • the relay server control unit 41 uses the encryption key authentication information, terminal I, created in the process of S205.
  • the service connection destination is transmitted to the broadcast base station 50 via the communication unit 42 (S206).
  • the control unit 51 of the broadcast base station 50 Upon receiving the encryption key authentication information, the terminal ID, and the service connection destination via the communication unit 52 (S221), the control unit 51 of the broadcast base station 50 receives the received encryption key authentication information, the terminal, and the service.
  • the connection destination is transmitted from the transmission unit 53 to the broadcast network (S222).
  • the control unit 11 of the mobile phone 10a receives the encryption authentication information, the terminal ID, and the service connection destination transmitted from the broadcast base station 50 (S231), the terminal ID received by the terminal ID determination unit 11a is received. It is determined whether or not is its own terminal ID (S232).
  • control unit 11 stores the received encryption key authentication information, terminal, and service connection destination in the encryption storage unit 15 (S233), and ends the process. To do.
  • control unit 11 discards the received encryption authentication information, terminal, and service connection destination (S234), and ends the process.
  • the mobile phone 10a requests the server 30a to provide a service
  • the mobile phone 10a power is also included in the service request information transmitted to the Sano 30a.
  • the relay Sano Oa includes the authentication information input unit 48 that receives the input of the initial authentication information, and the initial authentication information for a certain service is input. Then, the initial authentication information is transmitted to the server 30a that provides the service. Then, when receiving the authentication result indicating that the initial authentication is successful, the relay server 40a causes the encryption unit 43 to encrypt the initial authentication information (user ID, password) and create encryption key authentication information. Then, the encrypted authentication information is transmitted to the broadcast base station 50, and transmitted from the broadcast base station 50 to the mobile phone 10a via the broadcast network.
  • the mobile phone 10a when the user of the mobile phone 10a requests the server 30a to provide a service, the mobile phone 10a does not need to input authentication information (user ID and password) using the mobile phone 10a. That is, when using the service provided by the server 20a using the mobile phone 10a, the user does not need to input authentication information even once. Therefore, the convenience of the user when using the service can be improved.
  • the relay server 40a transmits the encryption authentication information, the terminal ID, and the service connection destination to the mobile phone 10a via the broadcast network.
  • the present invention is not limited to this.
  • it may be transmitted via the Internet or the like.
  • data may be transmitted from the relay Sano Oa to the mobile phone 10a by specifying the address of the mobile phone 10a, and the terminal ID may not be included in the transmitted data.
  • the mobile phone 10a omits the process of determining whether or not the received data includes its own terminal ID, and stores all received encrypted authentication information and service connection destinations. You can let it happen.
  • the authentication information (user ID, password, terminal ID) and service connection destination permitting the provision of the service via the authentication information input unit 48 are input. It is not limited.
  • the user of the mobile phone 1 Oa completes the initial authentication in the same manner as in FIG. 7 or FIG. 11 through another service using device (other mobile phone or personal computer),
  • the terminal ID of the mobile phone 10a may be specified.
  • an object of the present invention is to provide a program code (execution format program, intermediate code program, source program) of a program which is software for realizing the functions of the above-described members. This can be achieved by supplying a readable recording medium to a system or apparatus and reading and executing the program code recorded on the recording medium by a computer (or CPU) provided in the system or apparatus. .
  • the object of the present invention is to provide the ff3 ⁇ 43 ⁇ 4] ⁇ ll of the mobile phone 10, 10a as hardware, the Sano ffiU3 ⁇ 4] ⁇ 21 of the Sano 20,20a, 30,30a, 30b, and the relay server of the intermediate Sano 40, 40a.
  • This is achieved by the control unit 41, the encryption unit 24 of the servers 20 and 20a, the decryption unit 25, the encryption unit 43 and the decryption unit 44 of the relay servers 40 and 40a.
  • these members may be configured by combining hardware that performs a part of the processing and arithmetic means that executes program code for performing processing other than the control of the hardware and the processing performed by the hardware. realizable. Furthermore, even among the above-described members, even those described as hardware, hardware that performs part of the processing, and program code that performs processing other than control of the hardware and processing performed by the hardware It can also be realized as a configuration that combines with a calculation means for executing.
  • the arithmetic means may have a single configuration, or a configuration in which a plurality of arithmetic means connected via a bus or various communication paths in the apparatus cooperate to execute program code. It may be.
  • the encryption unit 24 and the decryption unit 25 of 20, 20a, and the encryption unit 43 and the decryption unit 44 of the relay servers 40 and 40a can be provided in any place in the service providing system.
  • the program code itself that can be directly executed by the arithmetic means, or a program as data that can generate a program code by a process such as decompression to be described later is the program (the program or the data). It is stored in a recording medium and distributed, or the program is distributed by being transmitted by a communication means for transmission via a wired or wireless communication path, and is executed by the arithmetic means. Shall be executed.
  • various transmission media constituting the communication path may be The program is transmitted through the communication path by propagating a signal sequence indicating a gram.
  • the transmission device may superimpose the signal sequence on the carrier by modulating the carrier with a signal sequence indicating a program. In this case, the signal sequence is restored by the receiving device demodulating the carrier wave.
  • the transmission device may divide the signal sequence as a digital data sequence into packets. In this case, the receiving apparatus concatenates the received packet groups and restores the signal sequence.
  • the transmission device may multiplex and transmit the signal sequence with another signal sequence by a method such as time division Z frequency division Z code division.
  • the receiving apparatus extracts and restores the signal sequence from the multiplexed signal sequence. In either case, the same effect can be obtained if the program can be transmitted via the communication channel.
  • the recording medium for distributing the program is removable, but it does not matter whether the recording medium after distributing the program is removable.
  • the recording medium may be any rewritable (writeable) power or volatile as long as the program is recorded, and the recording method and shape are also questioned. Absent. Examples of such recording media include tapes such as magnetic tape and cassette tape, magnetic disks such as floppy (registered trademark) disks and hard disks, CD-ROMs, magneto-optical disks (MO), mini-discs (MD), Digital video disks (DVDs and other discs.
  • the recording medium may be a card such as an IC card or optical card, or a semiconductor memory such as a mask ROM, EPROM, EEPROM, or flash ROM. Alternatively, it may be a memory formed in a calculation means such as a CPU.
  • the program code may be a code for instructing the arithmetic means of all the processes of the respective members, or may be a part of the processes of the respective members by calling in a predetermined procedure. If a basic program (for example, operating system or library) that can execute all of the program already exists, the basic program can be called by a code or pointer that instructs the arithmetic unit. Or you can replace everything.
  • a basic program for example, operating system or library
  • the format for storing the program in the recording medium is, for example, allocated to the real memory. It may be stored in a storage format that can be accessed and executed by the computing means as in the state of being installed, or a local recording medium (for example, real memory) that is always accessible by the computing means before being placed in the real memory.
  • the program may be stored in the recording medium as source code that is not limited to the object code after being compiled, or as intermediate code that is generated during the interpretation or compilation.
  • source code that is not limited to the object code after being compiled
  • intermediate code that is generated during the interpretation or compilation.
  • the intermediate code can be converted into a format that can be executed by the arithmetic means, the same effect can be obtained regardless of the format in which the program is stored in the recording medium.
  • the mobile phone 10 is used as a service utilization device
  • the present invention is not limited to this.
  • it can be applied to a configuration using a mobile phone, PHS (Personal Handyphone System; registered trademark), PDA (personal digital assistants), personal computer, word processor, TV broadcast receiver, etc. as a service using device.
  • PHS Personal Handyphone System
  • PDA personal digital assistants
  • the first service providing system of the present invention provides a predetermined service in response to a request for a service using device and a service using device connected via a network.
  • a service providing system including a service providing device, wherein the service using device stores an input unit that receives an input instruction from a user for specifying a requested service and the received encrypted authentication information
  • An encryption storage unit and a utilization device control unit that transmits encrypted authentication information corresponding to the requested service to the service providing device that provides the requested service, wherein the service providing device provides the service
  • the authentication information storage unit for storing the authentication information of the user who permits the authentication and the authentication information of the user who has requested the provision of the service are And authentication processing unit for performing an authentication process for collating the authentication information of users are allowed to provide the service stored in the storage unit, a decoding unit for creating a decrypted authentication information by decrypting the encrypted authentication information, When the encrypted authentication information is received from the service using device, the received encrypted authentication information is decrypted by
  • the utilization device control unit transmits the encrypted authentication information to the service providing device when requesting the provision of the service.
  • the service providing apparatus decrypts the received encrypted authentication information and performs authentication processing. For this reason, the user does not need to perform an operation of inputting authentication information corresponding to the requested service every time a service is requested as in the prior art, so that the convenience of authentication processing can be improved.
  • the use device control unit stores the encrypted authentication information corresponding to the requested service in the encryption storage unit!
  • the encryption authentication information corresponding to the requested service is stored in the encryption storage unit.
  • the user input is made via the input unit.
  • Authentication information related to the requested service is transmitted as initial authentication information to a service providing apparatus that provides the service, and the service providing apparatus encrypts the authentication information and creates a cipher authentication information.
  • the providing device control unit causes the authentication processing unit to perform the authentication processing of the initial authentication information and succeeds in authenticating the initial authentication information.
  • the encryption unit encrypts the initial authentication information, and transmits the encryption key authentication information obtained by the encryption key to the service using apparatus that has transmitted the initial authentication information. Yo ⁇ even formed.
  • the user apparatus control unit stores the encryption authentication information corresponding to the requested service in the encryption storage unit! In such a case, the encryption key authentication information is transmitted to the service providing apparatus. Then, when the encrypted authentication information corresponding to the requested service is stored in the encryption storage unit, the user device control unit can determine whether the user is the user via the input unit. Authentication information related to the requested service is transmitted to the service providing apparatus.
  • the encrypted authentication information corresponding to the service requested by the user is stored in the encryption storage unit.
  • the authentication processing of the authentication information related to the service has not been completed before. Only in such a case, an authentication information input operation may be performed. Therefore, it is not necessary to input authentication information by the user during the second and subsequent authentication processing, and there is no need to input service authentication information every time as in the conventional case. Can be improved.
  • the authentication information when the initial authentication information is successfully authenticated, the authentication information is encrypted and stored in the service using apparatus. That is, encrypted authentication information is stored in the service using device. For this reason, even if the storage area of the service using device is analyzed, for example, authentication information related to the service is not stolen. Accordingly, security (safety) related to authentication information can be improved.
  • the service providing apparatus includes an authentication information input unit that receives input of authentication information of a user permitted to provide a service, an encryption unit that encrypts the authentication information and creates encrypted authentication information,
  • the providing device control unit causes the encryption information unit to encrypt the authentication information input to the authentication information input unit, and uses the encryption authentication information obtained by the encryption to use the service. It is good also as a structure which transmits to an apparatus.
  • the service providing apparatus receives the input of the authentication information of the user permitted to provide the service, encrypts it, and transmits it to the service using apparatus.
  • the user of the service using device since the user of the service using device does not need to perform an authentication information input operation, convenience related to the authentication process can be improved.
  • the providing apparatus control unit may transmit the encrypted authentication information to the service using apparatus via a broadcast network.
  • the authentication information input unit receives an input of a terminal ID for identifying a service using device that is permitted to provide a service
  • the providing device control unit receives the encrypted authentication information and the encrypted authentication information. It is also possible to transmit the terminal ID to the service using device.
  • a service using device may receive encrypted authentication information transmitted to another service using device. Therefore, encryption authentication By transmitting the terminal ID together with the information, the service using device can determine whether or not the encrypted authentication information is transmitted to itself.
  • the second service providing system of the present invention provides a service using apparatus and a service providing apparatus that provides the service using apparatus with a service requested by the service using apparatus via a network.
  • a service relay device connected to the service relay device and a service providing device connected to the service relay device via a network, wherein the service using device is a user for specifying a requested service.
  • An input unit that receives an input instruction, a cryptographic storage unit that stores the received cryptographic key authentication information, a utilization device control unit that transmits the cryptographic key authentication information corresponding to the requested service to the service relay device,
  • the service providing apparatus includes an authentication information storage unit that stores authentication information of a user who is permitted to provide the service.
  • An authentication processing unit that performs an authentication process for verifying authentication information received from a service relay device with authentication information of a user permitted to provide a service stored in the authentication information storage unit.
  • the service relay device decrypts the encrypted authentication information to create the decrypted authentication information, and when receiving the encrypted authentication information from the service using device, the encrypted relay information is sent to the decryption unit.
  • a relay control unit that decrypts and transmits the decryption key authentication information obtained by the decryption key to a service providing device that provides a service requested by the service using device that has transmitted the cipher key authentication information; It is characterized by being equipped with.
  • the utilization device control unit transmits the encrypted authentication information to the service relay device when requesting the provision of a service. Then, the service relay device decrypts the received encrypted authentication information and transmits it to the service providing device, and the service providing device performs an authentication process on the decrypted key authentication information received from the service relay device. For this reason, the user does not need to perform an operation of inputting authentication information corresponding to the requested service every time the service is requested, so that the convenience of the authentication processing can be improved.
  • the service providing apparatus includes a providing control unit that transmits authentication result information indicating a result of the authentication process to the service relay apparatus, and the using apparatus control unit provides the service requested.
  • a providing control unit that transmits authentication result information indicating a result of the authentication process to the service relay apparatus, and the using apparatus control unit provides the service requested.
  • the encryption authentication information corresponding to the requested service is not stored in the encryption storage unit.
  • the authentication information regarding the requested service is transmitted to the service relay apparatus as initial authentication information, and the user power is also input via the input unit, and the service relay apparatus encrypts the authentication information and transmits the encrypted authentication information.
  • the relay control unit receives the initial authentication information, the relay control unit transmits the received initial authentication information to the initial authentication information.
  • the initial The authentication information may be encrypted by the encryption unit, and the encryption key authentication information obtained by the encryption key may be returned to the service using apparatus that has transmitted the initial authentication information.
  • the user apparatus control unit stores the encryption authentication information corresponding to the requested service in the encryption storage unit!
  • the encryption key authentication information is transmitted to the service relay device.
  • the using device control unit relays the authentication information related to the requested service from the user via the input unit. Send to device.
  • the encrypted authentication information corresponding to the service requested by the user is stored in the encryption storage unit.
  • the authentication processing of the authentication information related to the service has not been completed before. Only in such a case, an authentication information input operation may be performed. Therefore, it is not necessary for the user to input authentication information during the second and subsequent authentication processes, and there is no need to input service authentication information every time as in the conventional case. Can be improved.
  • the authentication information when the initial authentication information is successfully authenticated, the authentication information is encrypted and stored in the service using device. In other words, service interest The authentication device stores encrypted authentication information. For this reason, even if the storage area of the service using device is analyzed, for example, authentication information related to the service is not stolen. Accordingly, security (safety) related to authentication information can be improved.
  • a service providing apparatus that has the above-described configuration of the service using device and includes the encryption unit and the decryption unit in the service relay device, the conventional service
  • the service providing apparatus used in the providing system can be used as it is. Therefore, the existing service providing apparatus can be used effectively.
  • the utilization device control unit when requesting provision of a plurality of services, collectively transmits the initial authentication information for each requested service to the service relay device,
  • the relay control unit provides a service corresponding to each initial authentication information from among a plurality of service providing apparatuses connected via the network, with respect to each initial authentication information received by the service utilization apparatus power.
  • the initial authentication information that has been successfully authenticated is encrypted by the encryption unit and obtained by the encryption key.
  • a configuration may be adopted in which each encrypted authentication information is returned to the service using apparatus that has transmitted each initial authentication information.
  • the use device control unit requests provision of a plurality of services, whether or not encryption authentication information for each requested service is stored in the encryption storage unit. For each service, it accepts the input of authentication information of the user power and sends the input authentication information to the service relay device as initial authentication information, and the relay control unit For each initial authentication information received from the service using device, a service providing device that provides a service corresponding to each initial authentication information is selected from a plurality of service providing devices connected via the network. When the authentication process result is received from each service providing device, each initial authentication information that has been successfully authenticated is received. The information may be encrypted by the encryption unit, and each encryption key authentication information obtained by the encryption key may be returned to the service using apparatus that has transmitted each initial authentication information.
  • the service providing apparatus includes an authentication information input unit that receives authentication information of a user permitted to provide a service, and the providing apparatus control unit includes the authentication information input from the authentication information input unit.
  • the service relay device includes an encryption unit that encrypts authentication information to create encryption authentication information, and the relay control unit also receives the authentication information from the service providing device.
  • the authentication information may be encrypted in the encryption key unit, and the encryption key authentication information obtained by the encryption key may be transmitted to the service using apparatus.
  • the service providing apparatus accepts the input of the authentication information of the user permitted to provide the service
  • the input authentication information (the authentication information of the user permitted to provide the service) Is transmitted to the service relay device.
  • the service relay device encrypts the received authentication information and transmits it to the service using device.
  • the user of the service using device does not need to perform an authentication information input operation, convenience related to the authentication processing can be improved.
  • the service relay apparatus includes an authentication information input unit that receives input of authentication information and information specifying a service providing apparatus that performs authentication processing using the authentication information, and encrypts the authentication information by encrypting the authentication information.
  • the relay control unit transmits the authentication information input via the authentication information input unit to a service providing apparatus that performs authentication processing using the authentication information.
  • the authentication processing result indicating that the authentication processing is successful is received from the service providing device, the authentication information that has succeeded in the authentication is encrypted by the encryption unit, and the encryption obtained by the encryption is encrypted.
  • the authentication authentication information may be transmitted to the service using device.
  • the service relay apparatus receives input of authentication information and information specifying a service providing apparatus that performs authentication processing using the authentication information, and transmits the authentication information to the service providing apparatus. To do.
  • the service relay device receives an authentication processing result indicating that the authentication processing is successful from the service providing device, the service relay device encrypts the authentication information and transmits it to the service using device.
  • the user of the service using device does not need to perform an authentication information input operation, so that convenience related to authentication processing can be improved.
  • the providing apparatus control unit may transmit the encrypted authentication information to the service using apparatus via a broadcast network.
  • the authentication information input unit accepts an input of a terminal ID for identifying a service using device permitted to provide the service, and the providing device control unit receives the encrypted authentication information and the terminal ID. May be transmitted to the service using device.
  • the use device control unit requests provision of a plurality of services, whether or not the encryption authentication information for each requested service is stored in the encryption storage unit. If the encrypted key authentication information for each service is stored, the encrypted authentication information is transmitted to the service relay device, and the relay control unit Each of the encrypted authentication information received is decrypted by the decryption unit, and the decryption key authentication information obtained by the decryption key is transmitted from each of a plurality of service providing apparatuses connected via the network.
  • the service providing device that provides the service corresponding to the decryption key authentication information is selected and transmitted, and the service content is received from each of the service providing devices described above, and the received service content is grouped. It may be configured to reply to the service using apparatus that requested to provide serial services.
  • the service using apparatus can use a plurality of services provided by a plurality of service providing apparatuses at the same time, or use them in combination.
  • the service using apparatus of the present invention is a service receiving apparatus providing service.
  • An input unit that receives an input instruction from a user for specifying a requested service, an encryption storage unit that stores the received encrypted authentication information, and an encryption corresponding to the requested service.
  • a utilization device control unit that transmits the authentication request information to the service providing device that provides the requested service.
  • the user can request provision of a service without performing an authentication information input operation only by performing an input instruction for specifying the requested service.
  • the authentication information encrypted is stored in the service using device. For this reason, for example, even if the storage area of the service using device is analyzed, authentication information about the service is not stolen. Therefore, it is possible to improve security (security) related to authentication information.
  • the use device control unit determines whether or not the encryption authentication information corresponding to the requested service is stored in the encryption storage unit, and is stored.
  • the authentication information related to the requested service input by the user via the input unit may be transmitted to the service providing apparatus that provides the service as initial authentication information.
  • the user apparatus control unit stores the encryption authentication information corresponding to the requested service in the encryption storage unit! In such a case, the encryption key authentication information is transmitted to the service providing apparatus. Then, when the encrypted authentication information corresponding to the requested service is stored in the encryption storage unit, the using device control unit provides the authentication information related to the service requested from the user via the input unit. Send to device.
  • the user only needs to perform the authentication information input operation at the time of the first authentication.
  • the user does not need to input the authentication information at the second and subsequent authentication processing. Therefore, the convenience related to the authentication process can be improved.
  • a receiving unit that receives the encryption key authentication information and the terminal ID transmitted using the broadcast network, and determines whether or not the received terminal ID is a terminal ID corresponding to the service using device.
  • a terminal ID determination unit and when the received terminal ID is a terminal ID corresponding to the service using device, the using device control unit receives the encryption received together with the terminal ID.
  • the authentication information may be stored in the encryption storage unit.
  • the service providing apparatus of the present invention is a service providing apparatus that provides a service to a service using apparatus, and an authentication information storage unit that stores authentication information of a user permitted to provide the service, and a request for providing the service
  • the authentication processing unit that performs authentication processing for verifying the authentication information of the user who has been registered with the authentication information of the user permitted to provide the service stored in the authentication information storage unit, and the encrypted authentication information by encrypting the authentication information
  • the authentication process for the initial authentication information is the authentication process described above when the encryption unit to be created, the decryption unit for decrypting the encrypted authentication information to create the decryption authentication information, and the initial authentication information are received If the initial authentication information is successfully authenticated, the initial encryption information is encrypted by the encryption key unit, and the encryption key authentication information obtained by the encryption key is returned.
  • the received encrypted authentication information is decrypted by the decryption unit, and the authentication processing unit performs authentication processing of the decryption authentication information obtained by the
  • the service using apparatus only needs to transmit the encrypted authentication information to the service providing apparatus at the time of initial authentication. Therefore, it is possible to reduce the burden on the user who is required to input authentication information.
  • a second service providing apparatus of the present invention is a service providing apparatus that provides a service to a service using apparatus, an authentication information storage unit that stores authentication information of a user permitted to provide the service, An authentication processing unit that performs authentication processing for verifying the authentication information of the user who has requested the provision of service with the authentication information of the user permitted to provide the service stored in the authentication information storage unit, and permits the provision of the service
  • the authentication information input unit that accepts input of user authentication information, the encryption unit that encrypts the authentication information to create encrypted authentication information, and the authentication information of the user permitted to provide the service are stored in the encryption unit. It is characterized by comprising a providing device control unit that encrypts and transmits the encrypted authentication information obtained by the encryption to the service using device.
  • the service using device receives the encryption of the service providing device.
  • the provision of the service may be requested using the authentication information. Accordingly, since the user does not need to input authentication information, the burden on the user for inputting authentication information can be reduced.
  • the providing apparatus control unit may transmit the encrypted authentication information to the service using apparatus via a broadcast network.
  • the authentication information input unit accepts an input of a terminal ID for identifying a service using device permitted to provide a service, and the providing device control unit uses the encrypted authentication information and the terminal ID for the service use. As a configuration to send to the device.
  • the service relay device of the present invention is a service relay device that relays between a service using device and a service providing device that provides services to the service using device, and encrypts authentication information to encrypt authentication.
  • the decryption unit that creates the decryption authentication information by decrypting the encryption key authentication information, and the initial authentication information received from the service using device
  • the encryption key information is decrypted by the decryption key unit.
  • the decryption key authentication information obtained by the decryption key is transmitted to the service providing apparatus, and the initial authentication information is transmitted to the service providing apparatus.
  • the initial authentication information is encrypted in the above cipher part and the cipher obtained by the cipher key is used. And a relay control unit that returns the authentication information to the service using apparatus that has transmitted the initial authentication information.
  • the service using device only needs to transmit the encrypted authentication information to the service providing device only at the time of the initial authentication. Therefore, it is possible to reduce the burden on the user who is required to input authentication information.
  • a second service relay device of the present invention is a service relay device that relays between a service using device and a service providing device that provides a service to the service using device, and encrypts authentication information and encrypts the encrypted information.
  • Cryptographic unit for creating authentication information and service providing device Encrypt the authentication information of the user who is permitted to provide the received service in the above ciphering unit.
  • a relay control unit for transmitting the encrypted authentication information obtained by the encryption to the service using device.
  • the service using device stores the encrypted authentication information received from the service relay device, and when requesting the provision of service, the service using device stores the encrypted authentication information. To send to. Therefore, the burden on the user for inputting authentication information can be reduced.
  • a third service relay device of the present invention is a service relay device that relays between a service using device and a service providing device that provides a service to the service using device, and uses authentication information and the authentication information.
  • An authentication information input unit that receives input of information specifying a service providing apparatus that performs authentication processing, an encryption unit that encrypts authentication information to create encrypted authentication information, and the authentication information input unit.
  • Authentication information is sent to a service providing device that performs authentication processing using the authentication information, and when the authentication processing result indicating that the authentication processing is successful is received from the service providing device, the authentication is successful.
  • a relay control unit that encrypts the encrypted authentication information in the encryption key unit and transmits the encrypted authentication information obtained by the encryption key to the service using device. It is characterized in that Ru.
  • the service using device stores the encrypted authentication information received from the service relay device, and when requesting the provision of service, the service using device stores the encrypted authentication information. To send to. Therefore, the burden on the user for inputting authentication information can be reduced.
  • the relay control unit may be configured to transmit the encrypted authentication information to the service using apparatus via a broadcast network.
  • the relay control unit may transmit a terminal ID for identifying a service using device permitted to provide a service to the service using device together with the encryption key authentication information.
  • An authentication method of the present invention provides a service providing apparatus including a service using apparatus and a service providing apparatus that provides a predetermined service in response to a request from a service using apparatus connected via a network.
  • a service request step for transmitting encrypted authentication information corresponding to the requested service from the service using apparatus to the service providing apparatus; and decrypting the transmitted encrypted authentication information to decrypt the encrypted authentication information.
  • the above authentication method it is not necessary to perform an operation for inputting authentication information corresponding to a requested service every time a service is requested, so that convenience related to authentication processing is improved. be able to. Further, according to the above configuration, the authentication information stored in the service use device is stored. Therefore, the security (security) related to authentication information can be improved.
  • a determination step for determining whether or not the encryption authentication information for the service specified by the input instruction is stored in the service using device, and for the service specified by the input instruction In the case where the encryption key authentication information is stored in the service using device, the initial authentication information input step for accepting the input of the authentication information from the user, and the authentication information input in the initial authentication information input step, A user who is permitted to provide the service by the authentication information input in the first authentication information input step as a result of the authentication processing step. If the authentication information matches the authentication information, the encryption step of encrypting the authentication information to create encrypted authentication information, and the encrypted authentication information to the service using device Yo, it is performed and the encryption storage step of memorize in.
  • the encryption step and the decryption step may be executed by a service relay device that relays between the service using device and the service providing device.
  • the authentication method described above it is possible to improve the convenience of the user related to the authentication information input operation and to increase the security related to the authentication information.
  • the service providing apparatus used in the conventional service providing system can be used as it is. Therefore, existing service providing devices are It can be used effectively.
  • a first authentication program of the present invention is for causing a computer to execute processing of each step in the above-described authentication method. By causing the computer to read this program, the processing of each step in the authentication method of the present invention can be realized by the computer.
  • the second authentication program of the present invention performs the processes of the encryption storage step, the input step, and the service request step in the authentication method described above on the computer provided in the service use device or the service use device. It is intended to be executed by a connected computer. By causing the computer to read this program, it is possible to realize the encryption storage step, the input step, and the service request step in the authentication method of the present invention by the computer.
  • the third authentication program of the present invention provides a computer provided in the service providing apparatus or the service described above for the encryption process, the decryption process, and the authentication process in the authentication program. This is to be executed by a computer connected to the providing device. By causing the computer to read this program, the encryption process, the decryption process, and the authentication process in the authentication method of the present invention can be realized by the computer.
  • a fourth authentication program of the present invention comprises a service relay device that relays the process of encryption and decryption in the above authentication method between the service utilization device and the service providing device. To be executed by a connected computer or a computer connected to the service relay device. By causing the computer to read this program, the encryption process and the decryption process can be realized by the computer.
  • the present invention is a service providing system including an information terminal device and a service providing device that provides a service to the information terminal device, and a service that authenticates a user when providing the service.
  • the present invention can be applied to a providing system, an information terminal device used in the service providing system, a service providing device, a service relay device, and an authentication method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

At the initial authentication, a portable telephone (service utilization device)(10) sends non-encrypted authentication information (user ID, password) inputted by a user to a server (service providing device)(20), and the server (20) performs authentication processing based on the non-encrypted authentication information received from the portable telephone (10). Then, when the authentication processing is succeeded, the server (20) encrypts the authentication information and returns the result to the portable telephone (10). The portable telephone (10) memorizes the encrypted authentication information received from the server (20). After that, when service is requested to the server (20) the next time onward, the portable telephone (10) sends the encrypted information memorized as above to the server (20), and the server (20) decrypts the received encrypted information to perform authentication processing. In a service providing system including both the service utilization device and the service providing device for providing service to the service utilization device, burden on a user performing input operation of authentication information is reduced and security on authentication information can be enhanced.

Description

明 細 書  Specification

サービス提供システム、サービス利用装置、サービス提供装置、サービス 中継装置、認証方法、認証プログラムおよびその記録媒体  Service providing system, service using device, service providing device, service relay device, authentication method, authentication program, and recording medium thereof

技術分野  Technical field

[0001] 本発明は、サービス利用装置とサービス利用装置に対してサービスを提供するサ 一ビス提供装置とを含んでなるサービス提供システムにお ヽて、サービス利用装置 のユーザを認証する認証方法、この認証方法を実現するサービス提供システム、情 報端末装置、サービス提供装置、サービス中継装置、上記認証方法をコンピュータ に実行させるための認証プログラムおよびその記録媒体に関するものである。  The present invention relates to an authentication method for authenticating a user of a service using device in a service providing system including a service using device and a service providing device that provides a service to the service using device, The present invention relates to a service providing system, an information terminal device, a service providing device, a service relay device, an authentication program for causing a computer to execute the authentication method, and a recording medium thereof.

背景技術  Background art

[0002] 従来より、インターネット等のネットワーク上のサービス提供装置から、そのネットヮ ークを介して接続されるパソコンや携帯電話などの情報端末装置 (サービス利用装 置)に、各種サービスを提供する技術が用いられている。  [0002] Conventionally, technologies for providing various services from a service providing device on a network such as the Internet to an information terminal device (service using device) such as a personal computer or a mobile phone connected via the network Is used.

[0003] これらのサービスの中には、例えば、予め登録を済ませたユーザにのみサービスを 提供するものがある。その場合、一般に、サービス提供装置が、サービスの提供に先 立って、接続された情報端末装置力も受信したユーザ ID (ユーザ名)やパスワードな どの認証情報に基づ ヽてユーザの認証処理を行 ヽ、認証できた場合にのみサービ スを提供するようになって!/、る。  [0003] Among these services, for example, there are services that provide services only to users who have registered in advance. In this case, generally, prior to providing the service, the service providing apparatus performs user authentication processing based on authentication information such as a user ID (user name) and password that has received the power of the connected information terminal apparatus.な っ て Service is provided only when authentication is successful!

[0004] 図 12は、ユーザの認証を行う従来のサービス提供システムの一例を示す説明図で ある。この図に示すサービス提供システム 100は、携帯電話 101とサービス提供装置 102とからなる。携帯電話 101とサービス提供装置 102とは、インターネットを介して 接続されている。また、サービス提供装置 102には、サービスの提供を許可するユー ザに対して予め設定されたユーザ IDとパスワードとの組み合わせが記憶されている。  FIG. 12 is an explanatory diagram showing an example of a conventional service providing system that performs user authentication. A service providing system 100 shown in this figure includes a mobile phone 101 and a service providing apparatus 102. The mobile phone 101 and the service providing apparatus 102 are connected via the Internet. In addition, the service providing apparatus 102 stores a combination of a user ID and a password set in advance for a user permitted to provide the service.

[0005] 携帯電話 101のユーザがサービス提供装置 102のサービスを利用する場合、ユー ザは、携帯電話 101にユーザ IDおよびパスワードを入力してサービス提供装置 102 に送信する。サービス提供装置 102は、携帯電話 101からユーザ IDおよびパスヮー ドを受信すると、受信したユーザ IDおよびパスワードの組み合わせと、サービス提供 装置 102に予め記憶されたユーザ IDおよびパスワードの組み合わせとを照合する。 そして、両者が一致する場合、そのユーザをサービスの提供を許可するユーザとして 認証し、提供するサービスの内容を携帯電話 101に送信する。 When the user of the mobile phone 101 uses the service of the service providing device 102, the user inputs the user ID and password to the mobile phone 101 and transmits it to the service providing device 102. When the service providing device 102 receives the user ID and password from the mobile phone 101, the service providing device 102 provides the combination of the received user ID and password, and provides the service. The user ID and password combination stored in the device 102 are collated. If they match, the user is authenticated as a user who is permitted to provide the service, and the contents of the provided service are transmitted to the mobile phone 101.

[0006] また、日本国公開特許公報である特開 2001— 320366号公報(2001年 11月 16 日公開)には、携帯型情報端末においてパスワードの打ち間違いがなくなるように、 インターネットを介してサーバとの間で情報のやりとりを行う携帯型情報端末に対し、 テキストフィールドによりパスワードを入力し、パスワード認証する手段をサーノ に備 える技術が開示されている。  [0006] Japanese Patent Laid-Open Publication No. 2001-320366 (published on November 16, 2001) discloses a server via the Internet so as to eliminate password mistakes in portable information terminals. A technology has been disclosed in which a personal information terminal that exchanges information with the sano has a means for entering a password in a text field and authenticating the password.

[0007] また、マイクロソフト社、「オートコンプリートによる時間の節約」、インターネット < UR L: http:/ 1 www.microsoft.com/ windows/ ie_intl/ ja/ using/howto/ customizing/ autocom plete.mspx >、 2003年 3月 16日公開、 [2005年 4月 13日検索]には、パソコンで用 いられるウェブブラウザにおいて、ユーザが一度入力した情報を記憶し、新しい情報 が入力された時に記憶した情報に基づ 、てユーザの入力内容を予測して考えられる 一致項目を表示する、オートコンプリートという技術が記載されている。また、ユーザ 名およびパスワードにつ!/、て、上記のオートコンプリートを行うことが示唆されて!、る。  [0007] Also, Microsoft, “Save time with autocomplete”, Internet <UR L: http: / 1 www.microsoft.com/ windows / ie_intl / en / using / howto / customizing / autocom plete.mspx>, Released on March 16, 2003, [Search April 13, 2005] stores information once entered by the user in a web browser used on a personal computer, and stores the information when new information is entered. On the basis of this, a technique called autocomplete is described, in which the user's input contents are predicted to display possible matching items. Also, it is suggested that you complete the above autocomplete!

[0008] し力しながら、上記従来の技術では、サービスを利用する際に、毎回、ユーザ IDと ノ スワードとを入力する必要があり、非常に手間がかかる。特に、携帯電話等の情報 端末装置では、一般に、 1つのキーを複数回押すことで入力する文字を特定するよう になっており、ユーザ IDやパスワードを毎回入力することは非常に面倒である。  [0008] However, in the conventional technique, it is necessary to input a user ID and a password every time a service is used, which is very troublesome. In particular, in an information terminal device such as a mobile phone, generally, a character to be input is specified by pressing one key multiple times, and it is very troublesome to input a user ID and a password each time.

[0009] なお、上記した「オートコンプリートによる時間の節約」の技術では、オートコンプリ ートによって入力操作が軽減されるものの、毎回入力操作を行う必要があることには 変わりがなぐユーザの手間が力かるという問題を本質的に解決することはできない。  [0009] Although the above-mentioned technique of "saving time by auto-complete" reduces the input operation by auto-complete, it is necessary to perform the input operation every time. The problem of power cannot be solved essentially.

[0010] また、上記従来の各技術では、ユーザ IDやパスワードを入力する際に周囲力 入 力内容を盗み見られたり、あるいは情報端末とサーバとの間の送信路にお 、てユー ザ IDやパスワードが盗聴されたりする可能性があるといった、セキュリティ上の問題が ある。また、上記した「オートコンプリートによる時間の節約」の技術では、ユーザ IDや パスワードなどの情報が、入力されたままの状態でブラウザに記憶されるので、ユー ザ IDやパスワードが第 3者に漏洩する危険性が高い。 発明の開示 [0010] In addition, in each of the conventional technologies described above, when the user ID or password is entered, the input content of the surrounding force is stolen, or the user ID or password is transmitted in the transmission path between the information terminal and the server. There are security issues such as passwords being eavesdropped. In addition, with the above-mentioned technology of “saving time by auto-complete”, information such as user ID and password is stored in the browser as it is entered, so the user ID and password are leaked to third parties. There is a high risk of Disclosure of the invention

[0011] 本発明は、上記の問題点に鑑みてなされたものであり、その目的は、サービス利用 装置とサービス利用装置に対してサービスを提供するサービス提供装置とを含むサ 一ビス提供システムにおいて、ユーザによる認証情報の入力操作を低減し、かつ、認 証情報に関するセキュリティを高めることにある。  [0011] The present invention has been made in view of the above problems, and an object thereof is a service providing system including a service using device and a service providing device that provides a service to the service using device. This is to reduce the authentication information input operation by the user and to increase the security of the authentication information.

[0012] 本発明の第 1のサービス提供システムは、上記の課題を解決するために、サービス 利用装置と、ネットワークを介して接続されるサービス利用装置力 の要求に応じて 所定のサービスを提供するサービス提供装置とを含んでなるサービス提供システム であって、上記サービス利用装置は、要求するサービスを特定するためのユーザか らの入力指示を受け付ける入力部と、受信した暗号化認証情報を記憶する暗号記憶 部と、上記要求するサービスに対応する暗号ィヒ認証情報を上記要求するサービスを 提供するサービス提供装置に送信する利用装置制御部と、を備え、上記サービス提 供装置は、サービスの提供を許可するユーザの認証情報を記憶する認証情報記憶 部と、サービスの提供を要求してきたユーザの認証情報を、上記認証情報記憶部に 記憶したサービスの提供を許可するユーザの認証情報と照合する認証処理を行う認 証処理部と、暗号化認証情報を復号化して復号化認証情報を作成する復号化部と、 サービス利用装置から暗号化認証情報を受信した場合に、受信した暗号化認証情 報を上記復号ィ匕部に復号化させ、その復号ィ匕によって得られる復号ィ匕認証情報の 認証処理を上記認証処理部に行わせる提供装置制御部と、を備えていることを特徴 としている。  [0012] In order to solve the above problems, the first service providing system of the present invention provides a predetermined service in response to a request for a service using device and a service using device connected via a network. A service providing system including a service providing device, wherein the service using device stores an input unit that receives an input instruction from a user for specifying a requested service and the received encrypted authentication information An encryption storage unit, and a utilization device control unit that transmits encrypted authentication information corresponding to the requested service to the service providing device that provides the requested service, wherein the service providing device provides the service The authentication information storage unit for storing the authentication information of the user who permits the authentication and the authentication information of the user who has requested the provision of the service are An authentication processing unit that performs an authentication process for collating with authentication information of a user permitted to provide a service stored in the storage unit, a decryption unit that decrypts the encrypted authentication information to create decrypted authentication information, and a service usage When receiving the encrypted authentication information from the apparatus, the decryption key unit decrypts the received encrypted authentication information, and the authentication processing unit performs the authentication process of the decryption key authentication information obtained by the decryption key. And a providing device control section to be executed.

[0013] 上記の構成によれば、利用装置制御部は、サービスの提供を要求する場合、暗号 化認証情報をサービス提供装置に送信する。そして、サービス提供装置は、受信し た暗号化認証情報を復号化して認証処理を行う。このため、ユーザは、要求するサ 一ビスに対応する認証情報を入力する操作を、従来のようにサービスを要求する毎 に行う必要がないので、認証処理に関する利便性を向上させることができる。  [0013] According to the above configuration, when the use device control unit requests provision of a service, the use device control unit transmits the encrypted authentication information to the service providing device. The service providing apparatus decrypts the received encrypted authentication information and performs authentication processing. For this reason, the user does not need to perform an operation of inputting authentication information corresponding to the requested service every time a service is requested as in the prior art, so that the convenience of authentication processing can be improved.

[0014] また、上記の構成によれば、サービス利用装置には、暗号ィ匕された認証情報が記 憶される。このため、例えばサービス利用装置の記憶領域が解析されたとしても、サ 一ビスに関する認証情報が盗まれることがない。したがって、認証情報に関するセキ ユリティ (安全性)を高めることができる。 [0014] According to the configuration described above, encrypted authentication information is stored in the service using apparatus. For this reason, even if the storage area of the service using device is analyzed, for example, the authentication information related to the service is not stolen. Therefore, the security information The utility (safety) can be increased.

[0015] 本発明の第 2のサービス提供システムは、上記の課題を解決するために、サービス 利用装置と、サービス利用装置を当該サービス利用装置の要求するサービスを提供 するサービス提供装置にネットワークを介して接続するサービス中継装置と、サービ ス中継装置とネットワークを介して接続されるサービス提供装置とを含んでなるサービ スシステムであって、上記サービス利用装置は、要求するサービスを特定するための ユーザ力 の入力指示を受け付ける入力部と、受信した暗号ィ匕認証情報を記憶する 暗号記憶部と、上記要求するサービスに対応する暗号ィ匕認証情報をサービス中継 装置に送信する利用装置制御部と、を備え、上記サービス提供装置は、サービスの 提供を許可するユーザの認証情報を記憶する認証情報記憶部と、サービス中継装 置カゝら受信した認証情報を、上記認証情報記憶部に記憶したサービスの提供を許 可するユーザの認証情報と照合する認証処理を行う認証処理部と、を備え、上記サ 一ビス中継装置は、暗号化認証情報を復号化して復号化認証情報を作成する復号 化部と、サービス利用装置から暗号化認証情報を受信した場合に、当該暗号化情報 を上記復号ィ匕部に復号化させ、その復号ィ匕によって得られた復号ィ匕認証情報を当 該暗号ィ匕認証情報を送信してきたサービス利用装置の要求するサービスを提供する サービス提供装置に送信する中継制御部と、を備えて ヽることを特徴として ヽる。  [0015] In order to solve the above problems, a second service providing system of the present invention provides a service using device and a service providing device that provides the service using device with a service requested by the service using device via a network. A service relay device connected to the service relay device and a service providing device connected to the service relay device via a network, wherein the service using device is a user for specifying a requested service. An input unit that receives an input instruction, a cryptographic storage unit that stores the received cryptographic key authentication information, a utilization device control unit that transmits the cryptographic key authentication information corresponding to the requested service to the service relay device, The service providing apparatus includes an authentication information storage unit that stores authentication information of a user who is permitted to provide the service. An authentication processing unit that performs an authentication process for verifying authentication information received from a service relay device with authentication information of a user permitted to provide a service stored in the authentication information storage unit. The service relay device decrypts the encrypted authentication information to create the decrypted authentication information, and when receiving the encrypted authentication information from the service using device, the encrypted relay information is sent to the decryption unit. A relay control unit that decrypts and transmits the decryption key authentication information obtained by the decryption key to a service providing device that provides a service requested by the service using device that has transmitted the cipher key authentication information; It is characterized by being equipped with.

[0016] 上記の構成によれば、利用装置制御部は、サービスの提供を要求する場合、暗号 化認証情報をサービス中継装置に送信する。そして、サービス中継装置は、受信し た暗号化認証情報を復号化してサービス提供装置に送信し、サービス提供装置は サービス中継装置カゝら受信した復号ィ匕認証情報の認証処理を行う。このため、ユー ザは、要求するサービスに対応する認証情報を入力する操作を、従来のようにサー ビスを要求する毎に行う必要がないので、認証処理に関する利便性を向上させること ができる。  [0016] According to the above configuration, the utilization device control unit transmits the encrypted authentication information to the service relay device when requesting the provision of a service. Then, the service relay device decrypts the received encrypted authentication information and transmits it to the service providing device, and the service providing device performs an authentication process on the decrypted key authentication information received from the service relay device. For this reason, the user does not need to perform an operation of inputting authentication information corresponding to the requested service every time the service is requested, so that the convenience of the authentication processing can be improved.

[0017] また、上記の構成によれば、サービス利用装置には、暗号ィ匕された認証情報が記 憶される。このため、例えばサービス利用装置の記憶領域が解析されたとしても、サ 一ビスに関する認証情報が盗まれることがない。したがって、認証情報に関するセキ ユリティ (安全性)を高めることができる。 [0018] 本発明の他の目的、特徴、および優れた点は、以下に示す記載によって十分分か るであろう。また、本発明の利点は、添付図面を参照した次の説明で明白になるであ ろう。 [0017] According to the above configuration, encrypted authentication information is stored in the service using device. For this reason, even if the storage area of the service using device is analyzed, for example, the authentication information related to the service is not stolen. Therefore, the security (security) regarding authentication information can be improved. [0018] Other objects, features, and advantages of the present invention will be fully understood from the following description. The advantages of the present invention will be apparent from the following description with reference to the accompanying drawings.

図面の簡単な説明  Brief Description of Drawings

[0019] [図 1(a)]本発明の一実施形態にカゝかるサービス提供システムの概略構成を示す説明 図である。  [FIG. 1 (a)] is an explanatory diagram showing a schematic configuration of a service providing system according to an embodiment of the present invention.

[図 1(b)]本発明の一実施形態にかかるサービス提供システムの概略構成を示す説明 図である。  FIG. 1 (b) is an explanatory diagram showing a schematic configuration of a service providing system according to an embodiment of the present invention.

[図 2]本発明の一実施形態にカゝかるサービス提供システムを構成するサービス利用 装置およびサービス提供装置の概略構成を示すブロック図である。  FIG. 2 is a block diagram showing a schematic configuration of a service using apparatus and a service providing apparatus that constitute a service providing system according to an embodiment of the present invention.

[図 3]本発明の一実施形態にカゝかるサービス提供システムにおける、初回認証処理 の流れを示すフロー図である。  FIG. 3 is a flowchart showing a flow of initial authentication processing in a service providing system according to an embodiment of the present invention.

[図 4]本発明の一実施形態に力かるサービス提供システムにおける、 2回目以降の認 証処理の流れを示すフロー図である。  FIG. 4 is a flowchart showing the flow of authentication processing for the second and subsequent times in the service providing system according to one embodiment of the present invention.

[図5 (a)]本発明の他の実施形態にカゝかるサービス提供システムの概略構成を示す説 明図である。 FIG. 5 (a) is an explanatory diagram showing a schematic configuration of a service providing system according to another embodiment of the present invention.

[図 5(b)]本発明の他の実施形態にカゝかるサービス提供システムの概略構成を示す説 明図である。  [FIG. 5 (b)] is an explanatory view showing a schematic configuration of a service providing system according to another embodiment of the present invention.

[図 6]本発明の他の実施形態にカゝかるサービス提供システムを構成するサービス利 用装置、サービス中継装置、サービス提供装置の概略構成を示すブロック図である。  FIG. 6 is a block diagram showing a schematic configuration of a service utilization device, a service relay device, and a service provision device that constitute a service provision system according to another embodiment of the present invention.

[図 7]本発明の他の実施形態にカゝかるサービス提供システムにおける、初回認証処 理の流れを示すフロー図である。  FIG. 7 is a flowchart showing a flow of initial authentication processing in a service providing system according to another embodiment of the present invention.

[図 8]本発明の他の実施形態に力かるサービス提供システムにおける、 2回目以降の 認証処理の流れを示すフロー図である。  FIG. 8 is a flowchart showing the flow of authentication processing for the second and subsequent times in the service providing system according to another embodiment of the present invention.

[図 9(a)]本発明のさらに他のサービス提供システムの概略構成を示す説明図である。  FIG. 9 (a) is an explanatory diagram showing a schematic configuration of still another service providing system of the present invention.

[図 9(b)]本発明のさらに他のサービス提供システムの概略構成を示す説明図である。  FIG. 9 (b) is an explanatory diagram showing a schematic configuration of still another service providing system of the present invention.

[図 10]本発明のさらに他の実施形態に力かるサービス提供システムにおける、初回 認証処理の流れを示すフロー図である。 [図 11]本発明のさらに他の実施形態に力かるサービス提供システムにおける、 2回目 以降の認証処理の流れを示すフロー図である。 FIG. 10 is a flowchart showing a flow of initial authentication processing in a service providing system according to still another embodiment of the present invention. FIG. 11 is a flowchart showing a flow of authentication processing for the second and subsequent times in a service providing system according to still another embodiment of the present invention.

[図 12]従来のサービス提供システムの一例を示す説明図である。  FIG. 12 is an explanatory diagram showing an example of a conventional service providing system.

[図 13]本発明のさらに他のサービス提供システムの概略構成を示す説明図である。  FIG. 13 is an explanatory diagram showing a schematic configuration of still another service providing system according to the present invention.

[図 14]図 13に示したサービス提供システムを構成するサービス利用装置、サービス 提供装置、放送基地局の概略構成を示すブロック図である。  14 is a block diagram showing a schematic configuration of a service using device, a service providing device, and a broadcast base station that constitute the service providing system shown in FIG.

[図 15]図 13に示したサービス提供システムにおける処理の流れを示すフロー図であ る。  FIG. 15 is a flowchart showing a process flow in the service providing system shown in FIG. 13.

[図 16]図 13に示したサービス提供システムの変形例を示す説明図である。  FIG. 16 is an explanatory diagram showing a modification of the service providing system shown in FIG.

[図 17]図 13に示したサービス提供システムの変形例を示す説明図である。  FIG. 17 is an explanatory diagram showing a modification of the service providing system shown in FIG.

[図 18]本発明のさらに他のサービス提供システムの概略構成を示す説明図である。  FIG. 18 is an explanatory diagram showing a schematic configuration of still another service providing system according to the present invention.

[図 19]図 13に示したサービス提供システムを構成するサービス利用装置、サービス 提供装置、サービス中継装置、放送基地局の概略構成を示すブロック図である。  FIG. 19 is a block diagram showing a schematic configuration of a service using device, a service providing device, a service relay device, and a broadcast base station that constitute the service providing system shown in FIG.

[図 20]図 13に示したサービス提供システムにおける処理の流れを示すフロー図であ る。  FIG. 20 is a flowchart showing the flow of processing in the service providing system shown in FIG.

発明を実施するための最良の形態  BEST MODE FOR CARRYING OUT THE INVENTION

[0020] 〔実施形態 1〕 [Embodiment 1]

本発明の一実施形態について、図面を参照して説明する。図 1 (a)および図 1 (b) は、本実施形態にカゝかるサービス提供システム 1の概略構成を示す説明図である。  An embodiment of the present invention will be described with reference to the drawings. FIG. 1 (a) and FIG. 1 (b) are explanatory diagrams showing a schematic configuration of a service providing system 1 according to the present embodiment.

[0021] これらの図に示すように、サービス提供システム 1は、携帯電話 (情報端末装置、サ 一ビス利用装置) 10と、サーバ(サービス提供装置) 20とを備えており、これら力イン ターネット等のネットワークを介して通信可能に接続されている。 As shown in these drawings, the service providing system 1 includes a mobile phone (information terminal device, service using device) 10 and a server (service providing device) 20, and these power interfaces It is connected to be able to communicate via a network such as the Internet.

[0022] サーバ 20は、サービス利用装置に対してサービスを提供するものである。ここで、 サーバ 20によって提供されるサービスとしては、例えば、ブログ (blog, Weblog ;日々 更新される日記的な Webサイトの総称)を提供するブログ提供サービス、書籍の著者 、発行者、価格などの情報を提供する書籍情報提供サービス、情報端末装置から送 信される画像データ,写真データなどを蓄積するオンラインストレージサービス、など が考えられる。もちろん、これらのサービスは、サービス提供システム 1によって提供さ れるサービスの一例に過ぎず、その他にも多種多様なサービスが考えられる。 [0022] The server 20 provides a service to a service using device. Here, the services provided by the server 20 include, for example, a blog providing service that provides a blog (blog, Weblog; a general term for a diary-like website updated daily), a book author, publisher, price, etc. A book information providing service that provides information, an online storage service that stores image data, photo data, etc. sent from an information terminal device can be considered. Of course, these services are provided by the service delivery system 1 It is only an example of a service that can be used, and a variety of other services are possible.

[0023] また、図 1 (a)および図 1 (b)ではサーバ 20を 1つだけ描いている力 ネットワーク上 には、多数のサーバ 20が接続されており、それぞれのサーバ 20が所定のサービスを 提供するようになっている。  In addition, in FIG. 1 (a) and FIG. 1 (b), only one server 20 is depicted. Many servers 20 are connected on the network, and each server 20 has a predetermined service. Is to provide.

[0024] 図 2は、携帯電話 10およびサーバ 20の概略構成を示すブロック図である。 FIG. 2 is a block diagram showing a schematic configuration of the mobile phone 10 and the server 20.

[0025] 携帯電話 10は、図 2に示すように、制御部 11,通信部 12,表示部 13,入力部 14, 暗号記憶部 15, ROM16, RAM17を備えている。 As shown in FIG. 2, the mobile phone 10 includes a control unit 11, a communication unit 12, a display unit 13, an input unit 14, an encryption storage unit 15, a ROM 16, and a RAM 17.

[0026] 制御部 11は、携帯電話 10における各構成部材の動作を制御する、携帯電話 10の 中枢部である。 The control unit 11 is a central part of the mobile phone 10 that controls the operation of each component in the mobile phone 10.

[0027] ROM (Read Only Memory) 16は、制御部 11によって使用される各種のプログラム  [0027] ROM (Read Only Memory) 16 includes various programs used by the control unit 11.

(認証処理のためのプログラムなど)を記憶するためのメモリ一である。  This is a memory for storing (such as a program for authentication processing).

[0028] RAM (Random Access Memory) 17は、制御部 11によって使用される一次記憶部 であり、制御部 11が取り扱う各種情報を一時的に記憶するものである。また、制御部 11は、 ROM16内のプログラムを使用する際に、これを RAM 17に読み込ませるよう になっている。  [0028] A RAM (Random Access Memory) 17 is a primary storage unit used by the control unit 11, and temporarily stores various types of information handled by the control unit 11. Further, the control unit 11 reads the program in the ROM 16 into the RAM 17 when using the program.

[0029] 通信部 12は、インターネットを通じて接続される外部の機器との間で通信を行うも のである。本実施形態では、携帯電話 10は、通信部 12を介して、サーバ 20との間で 双方向の通信を行うようになって!/、る。  [0029] The communication unit 12 communicates with an external device connected through the Internet. In the present embodiment, the mobile phone 10 performs two-way communication with the server 20 via the communication unit 12! /.

[0030] 表示部 13は、各種情報を表示してユーザに提示するものである。表示部 13として 用いられる表示手段は特に限定されるものではな 、が、例えば液晶表示パネルなど が用いられる。 [0030] The display unit 13 displays various information and presents it to the user. The display means used as the display unit 13 is not particularly limited, but for example, a liquid crystal display panel or the like is used.

[0031] 入力部 14は、ユーザの各種指示を受け付けるものである。携帯電話 10では、複数 のキー (操作ボタン)力もなる入力部 14が備えられており、ユーザがこれらのキーを組 み合わせて操作することで、文字や数字、記号などを入力したり、携帯電話 10に実 行させる各種処理を選択したりできるようになつている。なお、入力部 14の構成はこ れに限るものではなぐキーボードやマウスポインタ、ジョグダイヤル、ペン入力装置、 タツチパネル、音声入力などの各種入力手段を用いることができる。また、これらの入 力手段は、携帯電話 10に備えられるものであってもよぐあるいは携帯電話 10に対 して無線または有線によって接続されるものであってもよい。 [0031] The input unit 14 receives various instructions from the user. The mobile phone 10 is provided with an input unit 14 that also has a plurality of keys (operation buttons), and the user operates these keys in combination to input characters, numbers, symbols, etc. Various processes to be executed by the telephone 10 can be selected. The configuration of the input unit 14 is not limited to this, and various input means such as a keyboard, mouse pointer, jog dial, pen input device, touch panel, and voice input can be used. These input means may be those provided in the mobile phone 10 or may be provided to the mobile phone 10. Then, they may be connected by radio or wire.

[0032] 暗号記憶部 15は、サーバ 20から受信した暗号情報、すなわちサーバ 20によって 暗号ィ匕されたユーザ ID (ユーザ名),パスワード等の認証情報を記憶するものである  The encryption storage unit 15 stores encryption information received from the server 20, that is, authentication information such as a user ID (user name) and a password encrypted by the server 20.

[0033] サーバ 20は、図 2に示すように、サーバ制御部 21,通信部 22,認証処理部 23,暗 号化部 24,復号ィ匕部 25,認証情報記憶部 26, ROM27, RAM28を備えている。 As shown in FIG. 2, the server 20 includes a server control unit 21, a communication unit 22, an authentication processing unit 23, an encryption unit 24, a decryption unit 25, an authentication information storage unit 26, a ROM 27, and a RAM 28. I have.

[0034] サーバ制御部 21は、サーバ 20における各構成部材の動作を制御する、サーバ 20 の中枢部である。  The server control unit 21 is a central part of the server 20 that controls the operation of each component in the server 20.

[0035] ROM (Read Only Memory) 27は、サーバ制御部 21によって使用される各種のプロ グラム (認証処理のためのプログラムなど)を記憶するためのメモリーである。  A ROM (Read Only Memory) 27 is a memory for storing various programs (such as a program for authentication processing) used by the server control unit 21.

[0036] RAM (Random Access Memory) 28は、サーバ制御部 21によって使用される一次 記憶部であり、サーバ制御部 21が取り扱う各種情報を一時的に記憶するものである 。また、サーバ制御部 21は、 ROM27内のプログラムを使用する際に、これを RAM2 8に読み込ませるようになって!/、る。  A RAM (Random Access Memory) 28 is a primary storage unit used by the server control unit 21 and temporarily stores various information handled by the server control unit 21. In addition, when using the program in the ROM 27, the server control unit 21 reads this into the RAM 28! /.

[0037] 通信部 22は、インターネットを通じて接続される外部の装置 (情報端末装置など)と の間で通信を行うものである。本実施形態では、サーバ 20は、通信部 22を介して、 携帯電話 10との間で双方向の通信を行うようになっている。  [0037] The communication unit 22 communicates with an external device (such as an information terminal device) connected through the Internet. In the present embodiment, the server 20 performs two-way communication with the mobile phone 10 via the communication unit 22.

[0038] 認証情報記憶部 26は、サーバ 20からのサービスの提供を許可するユーザに対し て予め設定されたユーザ IDとパスワードとの組み合わせ (非暗号化認証情報)を記 憶するものである。この予め設定される認証情報は、例えば、サーバ 20に備えられた 図示しない入力手段によって入力(設定)される構成であってもよぐあるいは情報処 理端末 (本実施形態では携帯電話 10)から通信部 22を介して入力 (設定)される構 成であってもよい。  The authentication information storage unit 26 stores a combination (non-encrypted authentication information) of a user ID and a password set in advance for a user who is permitted to provide a service from the server 20. The preset authentication information may be input (set) by an input means (not shown) provided in the server 20, or may be from an information processing terminal (mobile phone 10 in the present embodiment). It may be configured to be input (set) via the communication unit 22.

[0039] 認証処理部 23は、通信部 22を介して接続されている情報端末装置カゝらサービス の提供を要求して ヽるユーザが、サービスの提供を許可するユーザとして予め設定( 登録)されたユーザである力否かを照合するものである。具体的には、認証処理部 2 3は、情報端末装置力も通信部 22を介して受信したユーザ IDおよびパスワード (非 暗号化認証情報)と、認証情報記憶部 26に記憶されている予め設定された認証情 報とを照合する。そして、両者の照合結果が一致した場合に、通信部 22を介してサ 一ビスの提供を要求して 、るユーザを、サービスの提供を許可するユーザとして認証 する。 [0039] The authentication processing unit 23 sets (registers) a user who requests the provision of a service from the information terminal device connected via the communication unit 22 as a user permitted to provide the service. It is verified whether or not the user is a force. Specifically, the authentication processing unit 23 has a preset user ID and password (unencrypted authentication information) received through the communication unit 22 and the authentication information storage unit 26. Authentication information Check the information. Then, when the collation results of both match, the user who requests service provision via the communication unit 22 is authenticated as a user who is permitted to provide the service.

[0040] 暗号ィ匕部 24は、通信部 22を介してサービス利用装置力も受信した認証情報を暗 号化するものである。暗号ィ匕の手法は特に限定されるものではない。  [0040] The encryption key unit 24 encrypts the authentication information received by the service using device through the communication unit 22. The encryption method is not particularly limited.

[0041] 復号ィ匕部 25は、通信部 22を介してサービス利用装置から暗号ィ匕された認証情報( 暗号化認証情報)を受信した場合に、それを復号化するものである。 [0041] The decryption unit 25 decrypts the encrypted authentication information (encrypted authentication information) received from the service using apparatus via the communication unit 22.

[0042] 次に、サービス提供システム 1における認証処理 (携帯電話 10およびサーバ 20の 認証処理時の動作)について説明する。なお、以下の説明では、サーバ 20の認証情 報記憶部 26には、サービスの提供を許可するユーザの認証情報 (ユーザ IDおよび パスワード)が予め登録 (記憶)されて 、るものとする。 [0042] Next, authentication processing in the service providing system 1 (operation during authentication processing of the mobile phone 10 and the server 20) will be described. In the following description, it is assumed that authentication information (user ID and password) of a user permitted to provide a service is registered (stored) in the authentication information storage unit 26 of the server 20 in advance.

[0043] まず、サービス提供システム 1における初回認証処理について図 3に基づいて説明 する。図 3は、この初回認証処理の流れを示すフロー図である。 First, the initial authentication process in the service providing system 1 will be described with reference to FIG. FIG. 3 is a flowchart showing the flow of the initial authentication process.

[0044] まず、携帯電話 10の制御部 11は、入力部 14を介してユーザ力も入力される、サー ビスの提供を要求するサーバ 20の選択指示を受け付ける(Sl)。つまり、ネットワーク を介して接続可能な 1つ以上のサーバ 20の中から、所望するサービスを提供するサ ーバ 20を選択する選択指示を受け付ける。 [0044] First, the control unit 11 of the mobile phone 10 accepts a selection instruction of the server 20 that requests the provision of service, in which user power is also input via the input unit 14 (Sl). That is, a selection instruction for selecting a server 20 that provides a desired service from one or more servers 20 that can be connected via a network is accepted.

[0045] S1においてサーバ 20の選択指示を受け付けると、制御部 11は、暗号記憶部 15を 検索し、選択するサーバ 20に対応する暗号ィ匕認証情報 (あるいは要求するサービス に対応する暗号ィ匕認証情報)が記憶されているかどうかを判断する(S2)。なお、暗 号化認証情報の詳細にっ 、ては後述する。 [0045] Upon receiving the selection instruction of the server 20 in S1, the control unit 11 searches the encryption storage unit 15, and the encryption authentication information corresponding to the server 20 to be selected (or the encryption key corresponding to the requested service). It is determined whether or not (authentication information) is stored (S2). Details of the encryption authentication information will be described later.

[0046] そして、対応する暗号化認識情報が暗号記憶部 15に記憶されている場合には、初 回認証処理は必要ないので、後述する 2回目以降の認証処理(図 4参照)を行う(S3[0046] When the corresponding encryption recognition information is stored in the cipher storage unit 15, the first authentication process is not necessary, so the second and subsequent authentication processes (see FIG. 4) described later are performed (see FIG. 4). S3

) o ) o

[0047] 一方、 S2において、対応する暗号化認証情報が暗号記憶部 15に記憶されていな いと判断した場合、制御部 11は、以下に説明する初回認証処理 (携帯電話 10にお ける S4〜S9の処理、および、サーバ 20における S21〜S26の処理)を行う。  [0047] On the other hand, if it is determined in S2 that the corresponding encrypted authentication information is not stored in the encryption storage unit 15, the control unit 11 performs the initial authentication process described below (S4 to S4 in the mobile phone 10). The process of S9 and the process of S21 to S26 in the server 20 are performed.

[0048] この場合、制御部 11は、入力部 14を介してユーザカゝら入力される、初回認証情報 (ユーザ IDおよびパスワード)を受け付ける(S4)。なお、この場合、必要に応じて、制 御部 11が表示部 13に初回認証情報の入力を促す画像を表示させるようにしてもよ い。表 1は、入力部 14を介して入力される認証情報 (ユーザ IDおよびパスワード)の 一例である。 [0048] In this case, the control unit 11 receives initial authentication information input from the user via the input unit 14. (User ID and password) are accepted (S4). In this case, the control unit 11 may cause the display unit 13 to display an image for prompting input of the initial authentication information as necessary. Table 1 shows an example of authentication information (user ID and password) input via the input unit 14.

[0049] [表 1] [0049] [Table 1]

Figure imgf000012_0001
Figure imgf000012_0001

[0050] 次に、制御部 11は、 S4で受け付けた初回認証情報を、サービスの提供を要求する サーバ 20に送信する(S5)。なお、この時点では、初回認証情報は暗号ィ匕されてい な 、非暗号化認証情報である。 Next, the control unit 11 transmits the initial authentication information received in S4 to the server 20 that requests service provision (S5). At this point, the initial authentication information is unencrypted authentication information that is not encrypted.

[0051] サーバ 20のサーバ制御部 21は、通信部(サービス認証窓口) 22を介して携帯電 話 10から送信された初回認証情報を受信すると (S21)、その初回認証情報の認証 処理を行う (S22) 0具体的には、携帯電話 10から受信した初回認証情報と、認証情 報記憶部 26に記憶されて 、る予め設定された認証情報とを照合する。 [0051] When the server control unit 21 of the server 20 receives the initial authentication information transmitted from the mobile phone 10 via the communication unit (service authentication window) 22 (S21), the server control unit 21 performs authentication processing of the initial authentication information. (S22) 0 Specifically, the initial authentication information received from the mobile phone 10 and the preset authentication information stored in the authentication information storage unit 26 are collated.

[0052] そして、サーバ制御部 21は、 S22の認証処理の結果、両者の照合結果が一致した か否か、すなわち認証に成功したカゝ否かを判断する(S23)。  Then, the server control unit 21 determines whether or not the collation results of the two match as a result of the authentication processing in S22, that is, whether or not the authentication is successful (S23).

[0053] S23において認証失敗と判断した場合、サーバ制御部 21は、認証に失敗したこと を示す信号 (情報)を携帯電話 10に送信し、認証失敗を通知する(S24)。  If it is determined in S23 that the authentication has failed, the server control unit 21 transmits a signal (information) indicating that the authentication has failed to the mobile phone 10, and notifies the authentication failure (S24).

[0054] 一方、 S23において認証に成功したと判断した場合、サーバ制御部 21は、その認 証情報を暗号化部 24に暗号化させ、暗号化認証情報を作成させる(S25)。なお、 暗号ィ匕の手法は特に限定されるものではない。表 2は、暗号ィ匕部 24によって表 1に 示した認証情報を暗号ィ匕した暗号認証情報の一例である。  On the other hand, if it is determined in S23 that the authentication has succeeded, the server control unit 21 causes the encryption unit 24 to encrypt the authentication information and create encrypted authentication information (S25). The encryption method is not particularly limited. Table 2 is an example of encryption authentication information obtained by encrypting the authentication information shown in Table 1 by the encryption unit 24.

[0055] [表 2] ユーザ I D %iIF3i)#Ro#$# [0055] [Table 2] (User ID% iIF3i) #Ro # $ #

ノ スヮー ド %0g09j40-982  No Sword% 0g09j40-982

[0056] 次に、サーバ制御部 21は、 S25の処理で作成した暗号ィ匕認証情報を、通信部 22 を介して携帯電話 10に返信する(S26)。 Next, the server control unit 21 returns the encryption key authentication information created by the processing of S25 to the mobile phone 10 via the communication unit 22 (S26).

[0057] 一方、携帯電話 10の制御部 11は、サーバ 20から返信される情報を受信すると(S 6)、受信した情報が認証失敗通知であるカゝ否かを判断する(S7)。  On the other hand, when receiving the information returned from server 20 (S 6), control unit 11 of mobile phone 10 determines whether the received information is an authentication failure notification (S 7).

[0058] そして、受信した情報が認証失敗通知であると判断した場合、すなわち受信した情 報が暗号ィ匕認証情報ではないと判断した場合、制御部 11は、認証処理に失敗した ことおよび認証処理を継続するか否かの問 、合わせを表示部 13に表示する(図示 せず)。そして、入力部 14に対して認証処理を継続しない旨の指示があった場合、あ るいは何ら指示がな力つた場合には、認証処理を終了する。また、入力部 14に対し て認証処理を継続する旨の指示があった場合には、再び S4からの処理を行う。ある いは、継続する旨の指示入力を省略し、認証処理を継続する場合にはユーザが初 回認証情報を再入力するようにしてもょ ヽ。  [0058] When it is determined that the received information is an authentication failure notification, that is, when it is determined that the received information is not encryption authentication information, the control unit 11 indicates that the authentication processing has failed and the authentication A question as to whether or not to continue processing is displayed on the display unit 13 (not shown). If the input unit 14 is instructed not to continue the authentication process, or if no instruction is given, the authentication process ends. If the input unit 14 is instructed to continue the authentication process, the process from S4 is performed again. Or, omit the instruction to continue and allow the user to re-enter the authentication information for the first time when continuing the authentication process.

[0059] また、 S7にお 、て、受信した情報が認証失敗通知ではな 、と判断した場合、すな わち受信した情報が暗号化認証情報であると判断した場合、制御部 11は、受信した 暗号化認証情報を、その暗号ィ匕認証情報に対応するサーバ 20 (あるいはその暗号 化認証情報に対応するサービス)を識別する情報と関連付けて暗号記憶部 15に記 憶させる(S9)。これにより、初回認証処理が終了する。  [0059] If it is determined in S7 that the received information is not an authentication failure notification, that is, if it is determined that the received information is encrypted authentication information, the control unit 11 The received encrypted authentication information is stored in the encryption storage unit 15 in association with information for identifying the server 20 (or service corresponding to the encrypted authentication information) corresponding to the encrypted authentication information (S9). This completes the initial authentication process.

[0060] 次に、 2回目以降の認証処理、すなわち、暗号記憶部 15に、要求するサービス (あ るいは要求するサービスを提供するサーバ 20)に対応する暗号ィ匕認識情報が記憶さ れている場合の認証処理について図 4に基づいて説明する。図 4は、 2回目以降の 認証処理の流れを示すフロー図である。  [0060] Next, the second and subsequent authentication processes, that is, encryption key recognition information corresponding to the requested service (or the server 20 providing the requested service) is stored in the encryption storage unit 15. The authentication process in the case of being present will be described with reference to FIG. Fig. 4 is a flowchart showing the flow of authentication processing for the second and subsequent times.

[0061] まず、携帯電話 10の制御部 11は、図 3で説明した S1および S2の処理を行う。そし て、 S2において、選択するサーバ 20に対応する暗号ィ匕認証情報 (あるいは要求する サービスに対応する暗号ィ匕認証情報)が記憶されていないと判断した場合、制御部 1First, the control unit 11 of the mobile phone 10 performs the processes S1 and S2 described in FIG. In S2, the encryption key authentication information corresponding to the server 20 to be selected (or requested) If it is determined that the encryption authentication information corresponding to the service is not stored, the control unit 1

1は、上記した初回認証処理(図 3における S4以降の処理)を行う。 1 performs the above-described initial authentication process (the process after S4 in FIG. 3).

[0062] 一方、 S2にお 、て、対応する暗号ィ匕情報が記憶されて 、ると判断した場合、制御 部 11は、以下に説明する 2回目以降の認証処理 (携帯電話 10における S31〜S34 の処理、および、サーバ 20における S41〜S44の処理)を行う。 [0062] On the other hand, when it is determined that the corresponding encryption key information is stored in S2, the control unit 11 performs the second and subsequent authentication processes (S31 to S10 in the mobile phone 10) described below. The process of S34 and the process of S41 to S44 in the server 20 are performed.

[0063] この場合、制御部 11は、まず、暗号記憶部 15に記憶されている、上記対応する暗 号化認証情報を読み出す (S31)。 In this case, the control unit 11 first reads out the corresponding encryption authentication information stored in the encryption storage unit 15 (S31).

[0064] 次に、制御部 11は、入力部 14を介して入力されるサービス要求情報の入力を受け 付ける(S32)。ここで、サービス要求情報とは、サービスの提供を要求するために必 要となる各種情報である。 Next, the control unit 11 receives input of service request information input via the input unit 14 (S32). Here, the service request information is various information necessary for requesting the provision of service.

[0065] 次に、制御部 11は、 S31で読み出した暗号ィ匕認証情報と、 S32で受け付けたサー ビス要求情報とを、通信部 12を介してサーバ 20に送信する(S33)。 Next, the control unit 11 transmits the encryption key authentication information read in S31 and the service request information received in S32 to the server 20 via the communication unit 12 (S33).

[0066] 表 3は、ブログの提供サービスを要求する場合の、暗号化認証情報およびサービス 要求情報の一例を示している。この表に示す例では、サービス識別子および取得す るブログの URLがサービス要求情報に該当する。 [0066] Table 3 shows an example of encryption authentication information and service request information when a blog providing service is requested. In the example shown in this table, the service identifier and the URL of the blog to be acquired correspond to the service request information.

[0067] [表 3] [0067] [Table 3]

Figure imgf000014_0001
Figure imgf000014_0001

[0068] サーバ 20のサーバ制御部 21は、携帯電話 10から通信部 22を介して暗号化認証 情報およびサービス要求情報を受信すると (S41)、復号ィ匕部 25に受信した暗号ィ匕 認証情報を復号化させる(S42)。 [0068] Upon receiving the encrypted authentication information and the service request information from the mobile phone 10 via the communication unit 22 (S41), the server control unit 21 of the server 20 receives the encrypted key authentication information received by the decryption key unit 25. Is decrypted (S42).

[0069] 次に、サーバ制御部 21は、復号化された認証情報の認証処理を行う(S43)。具体 的には、携帯電話 10から受信して復号化した認証情報と、認証情報記憶部 26に記 憶されている予め設定された認証情報とを照合する。なお、この復号化した認証情報 は、初回認証処理時に認証に成功した認証情報であるので、認証情報記憶部 26に 記憶されている認証情報がその後書き換えられていない限り、必ず一致する。ここで は、そのような書き換えは行われていないものとする力 書き換えが行われている場 合には認証失敗を携帯電話に通知し、初回認証処理からやり直させるようにすれば よい(図示せず)。 Next, the server control unit 21 performs an authentication process on the decrypted authentication information (S43). Specifically, the authentication information received and decrypted from the mobile phone 10 is collated with preset authentication information stored in the authentication information storage unit 26. Since the decrypted authentication information is authentication information that has been successfully authenticated during the initial authentication process, the authentication information storage unit 26 stores the decrypted authentication information. As long as the stored authentication information has not been rewritten thereafter, it always matches. Here, if such rewriting is not performed, if rewriting is performed, authentication failure may be notified to the mobile phone, and the initial authentication processing may be performed again (not shown). )

[0070] S43の認証処理を行った後(認証成功を確認した後)、サーバ制御部 21は、携帯 電話 10に提供するサービス内容を送信する(S44)。  [0070] After performing the authentication process of S43 (after confirming the authentication success), the server control unit 21 transmits the service content to be provided to the mobile phone 10 (S44).

[0071] 携帯電話 10の制御部 11は、サーバ 20から提供されるサービスを受信し (S34)、 受信した内容を RAM 17に記憶させたり表示部 13に表示させるなどして必要な処理 を行う。これにより、 2回目以降の認証処理およびサービスの受信処理が終了する。  [0071] The control unit 11 of the mobile phone 10 receives the service provided from the server 20 (S34) and stores the received content in the RAM 17 or displays it on the display unit 13 to perform necessary processing. . This completes the second and subsequent authentication processing and service reception processing.

[0072] 以上のように、本実施形態では、サーバ 20が、携帯電話 10から初回認証情報を受 信すると、受信した初回認証情報の認証処理を行う。そして、初回認証に成功した場 合、サーバ 20が、その初回認証情報を暗号ィ匕して暗号ィ匕認証情報を作成し、携帯 電話 10に送信する。そして、携帯電話 10は、サーバ 20から受信した暗号化認証情 報を記憶する。そして、そのサーバ 20に対して次回以降にサービスを要求する時に は、携帯電話 10からサーバ 20に、上記のように記憶した暗号化認証情報を送信し、 サーバ 20が受信した暗号ィ匕認証情報を復号ィ匕して認証処理を行う。  As described above, in the present embodiment, when the server 20 receives the initial authentication information from the mobile phone 10, it performs an authentication process on the received initial authentication information. When the initial authentication is successful, the server 20 encrypts the initial authentication information to create encrypted authentication information and transmits it to the mobile phone 10. Then, the mobile phone 10 stores the encrypted authentication information received from the server 20. When the server 20 requests service from the next time onward, the encrypted authentication information stored as described above is transmitted from the mobile phone 10 to the server 20, and the encrypted authentication information received by the server 20 is transmitted. The authentication process is performed by decrypting the above.

[0073] これにより、携帯電話 (サービス利用装置) 10のユーザが認証情報 (ユーザ IDよお びパスワード)の入力操作を行うのは、初回認証処理のときだけでよくなる。すなわち 、ユーザが、携帯電話 10を用いてサーバ (サービス提供装置) 20の提供するサービ スを利用する際、認証情報を毎回入力する必要がなくなる。したがって、サービスを 利用する際のユーザの利便性を向上させることができる。  [0073] Thus, the user of the mobile phone (service utilization device) 10 only needs to input authentication information (user ID and password) during the initial authentication process. That is, when the user uses the service provided by the server (service providing apparatus) 20 using the mobile phone 10, it is not necessary to input authentication information every time. Therefore, the convenience of the user when using the service can be improved.

[0074] また、携帯電話 10には暗号ィ匕された認証情報が記憶されるので、例えば携帯電話 10の記憶領域が解析されたとしても、サーバ 20に対する認証情報が漏れる(盗まれ る)ことがない。したがって、本実施形態に力かる認証方法により、認証情報に関する セキュリティ(安全性)を高めることができる。  [0074] Further, since the encrypted authentication information is stored in the mobile phone 10, for example, even if the storage area of the mobile phone 10 is analyzed, the authentication information for the server 20 leaks (is stolen). There is no. Therefore, the security (safety) related to the authentication information can be enhanced by the authentication method that works on the present embodiment.

[0075] なお、本実施形態では、携帯電話 10からサーバ 20にサービスの提供を要求する 場合について説明したが、携帯電話 10からサービスの提供を要求できるサーバ (サ 一ビス提供装置) 20は、 1つに限られるものではない。つまり、携帯電話 10からネット ワークを介して接続可能な複数のサーバ 20の中から、所望するサービスを提供する サーバを選択してアクセスし、サービスの提供を要求するようにすればよ 、。 In the present embodiment, the case where the mobile phone 10 requests the server 20 to provide the service has been described. However, the server (service providing apparatus) 20 that can request the mobile phone 10 to provide the service includes: It is not limited to one. In other words, from mobile phone 10 to the Internet Select the server that provides the desired service from the multiple servers 20 that can be connected via the work, and request the service to be provided.

[0076] また、このように、携帯電話 10と複数のサーバ 20との間で本実施形態に力かる認 証方法を実現する場合、各サーバ 20に予め設定する認証情報 (ユーザ IDおよびパ スワード)は、サーバ毎(あるいは利用するサービス毎)に異なっていてもよい。  In addition, in this way, in the case of realizing an authentication method that works on the present embodiment between the mobile phone 10 and the plurality of servers 20, authentication information (user ID and password) set in advance in each server 20. ) May be different for each server (or for each service to be used).

[0077] また、本実施形態では、初回認証時には、携帯電話 10からサーバ 20に初回認証 情報 (非暗号化認証情報)が送信され、サーバ 20における認証処理が成功した場合 には、サーバ 20から携帯電話 10に暗号ィ匕認証情報が返信されるようになっている。 ただし、これに限らず、例えば、初回認証時に、携帯電話 10からサーバ 20に初回認 証情報およびサービス要求情報を送信し、サーバ 20が認証処理に成功した場合に 、暗号ィ匕認証情報とともに提供するサービスの内容をサーバ 20から携帯電話 10に 送信するようにしてもよ ヽ。  Further, in the present embodiment, at the time of initial authentication, initial authentication information (unencrypted authentication information) is transmitted from the mobile phone 10 to the server 20, and if the authentication process in the server 20 is successful, the server 20 The encryption key authentication information is returned to the mobile phone 10. However, the present invention is not limited to this. For example, during the initial authentication, the initial authentication information and the service request information are transmitted from the mobile phone 10 to the server 20 and provided together with the encryption key authentication information when the server 20 succeeds in the authentication process. The content of the service to be sent may be sent from the server 20 to the mobile phone 10.

[0078] また、本実施形態では、ユーザ IDとパスワードとの両方を暗号ィ匕している力 必ず しもこれに限るものではなぐ例えば、いずれか一方のみを暗号ィ匕するようにしてもよ い。  In this embodiment, the power for encrypting both the user ID and the password is not necessarily limited to this. For example, only one of them may be encrypted. Yes.

[0079] また、本実施形態では、認証情報としてユーザ IDとパスワードとを用いて 、るが、こ れに限るものではなぐ例えば、ユーザ IDおよびパスワードにカ卩えて、各携帯電話( サービス利用装置) 10に固有の端末 IDを認証情報として用いるようにしてもよい。こ の場合、暗号ィ匕認識情報が万一第 3者に漏洩したとしても、他の情報処理端末 (サ 一ビス利用装置)力 その暗号ィ匕認証情報を用いてサービスを利用することができな い。したがって、認証情報に関するセキュリティ性をさらに高めることができる。  In this embodiment, a user ID and a password are used as authentication information. However, the present invention is not limited to this. For example, each mobile phone (service utilization device) is changed into a user ID and a password. ) A terminal ID unique to 10 may be used as authentication information. In this case, even if the encryption key recognition information is leaked to a third party, other information processing terminals (service usage devices) can use the service using the encryption key authentication information. Absent. Therefore, the security related to the authentication information can be further improved.

[0080] なお、この場合、端末 IDは、端末固有の情報であればよぐ例えば、携帯電話 10 の電話番号、回線契約番号、製造番号などを用いることができる。端末 IDは、各携 帯電話 10に固有の情報であるので、例えば ROM16に記憶させておいて制御部 11 がそれを読み出すようにすればよい。この場合、ユーザが端末 IDの入力操作を行う 必要がない。また、認証情報に端末 IDを含める場合、端末 IDについても暗号ィ匕する ようにしてもよい。表 4に、端末 IDとして携帯電話 10の製造番号を用いる場合の、初 回認証処理時に携帯電話 10からサーバ 20に送信される初回認証情報の一例を示 す。 In this case, the terminal ID may be information unique to the terminal. For example, the telephone number, the line contract number, the manufacturing number, etc. of the mobile phone 10 can be used. Since the terminal ID is information unique to each mobile phone 10, for example, it may be stored in the ROM 16 and read out by the control unit 11. In this case, the user does not need to input the terminal ID. Further, when the terminal ID is included in the authentication information, the terminal ID may be encrypted. Table 4 shows an example of the initial authentication information sent from the mobile phone 10 to the server 20 during the initial authentication process when the serial number of the mobile phone 10 is used as the terminal ID. The

[0081] [表 4]  [0081] [Table 4]

Figure imgf000017_0001
Figure imgf000017_0001

[0082] また、本実施形態では、携帯電話 10からサーバ 20に初回認証時に送信される初 回認証情報は、暗号ィ匕されていない非暗号ィ匕認証情報であるとしているが、これに 限るものではない。例えば、携帯電話 10に暗号化手段を設け、サーバ 20にそれに 対応する復号化手段を設けておき、初回認証時には、初回認証情報を携帯電話 10 で暗号化し、携帯電話 10からサーバ 20に暗号ィ匕した初回認証情報とそれを復号ィ匕 するための解読情報とを送信するようにしてもよい。この場合、初回認証時に携帯電 話 10からサーバ 20に送信される暗号ィ匕された初回認証情報は、初回認証成功後に サーバ 20から携帯電話 10に送信される暗号ィ匕認証情報と同じである必要はない。 In this embodiment, the initial authentication information transmitted from the mobile phone 10 to the server 20 at the time of initial authentication is non-encrypted authentication information that is not encrypted, but is not limited thereto. It is not a thing. For example, the mobile phone 10 is provided with an encryption means and the server 20 is provided with a corresponding decryption means. At the time of initial authentication, the initial authentication information is encrypted with the mobile phone 10 and the mobile phone 10 encrypts it to the server 20. It is also possible to transmit the entered initial authentication information and decryption information for decrypting it. In this case, the encrypted initial authentication information transmitted from the mobile phone 10 to the server 20 at the time of the initial authentication is the same as the encrypted authentication information transmitted from the server 20 to the mobile phone 10 after the initial authentication is successful. There is no need.

[0083] また、本実施形態では、初回認証処理に成功した際に認証情報が暗号化され、こ の際に暗号ィ匕された認証情報がその後継続して利用されるようになっている力 これ に限るものではない。例えば、 2回目以降の認証処理時に、認証処理に成功する毎 に暗号ィ匕処理を再度実行し、前回とは異なる暗号ィ匕認証情報を携帯電話 10に送信 するよう〖こしてもよい。また、所定回数の認証処理を実行する毎に、暗号化認証情報 の更新 (再暗号化)を行い、前回とは異なる暗号ィ匕認証情報を携帯電話 10に送信す るようにしてちょい。  In this embodiment, the authentication information is encrypted when the initial authentication process is successful, and the authentication information encrypted at this time is used continuously thereafter. This is not a limitation. For example, in the second and subsequent authentication processes, the encryption key process may be executed again each time the authentication process is successful, and the encryption key authentication information different from the previous time may be transmitted to the mobile phone 10. Also, update the encrypted authentication information (re-encryption) every time a predetermined number of authentication processes are executed, and send the encryption authentication information different from the previous one to the mobile phone 10.

[0084] 〔実施形態 2〕  [Embodiment 2]

本発明の他の実施形態について、図面を参照して説明する。なお、説明の便宜上 、実施形態 1で説明した各部材と同様の機能を有する部材については、実施形態 1 と同じ符号を用い、その説明を省略する。  Another embodiment of the present invention will be described with reference to the drawings. For convenience of explanation, members having the same functions as those described in the first embodiment are denoted by the same reference numerals as those in the first embodiment, and the description thereof is omitted.

[0085] 図 5 (a)および図 5 (b)は、本実施形態に力かるサービス提供システム 2の概略構成 を示す説明図である。これらの図に示すように、サービス提供システム 2は、携帯電話 (情報端末装置) 10と、サーバ (サービス提供装置) 30と、中継サーバ (サービス中継 装置) 40とを備えている。また、携帯電話 10と中継サーバ 40、および、中継サーバ 4 0とサーバ 30は、それぞれインターネット等のネットワークを介して通信可能に接続さ れている。 FIG. 5 (a) and FIG. 5 (b) are explanatory diagrams showing a schematic configuration of the service providing system 2 that works on the present embodiment. As shown in these figures, the service providing system 2 is a mobile phone. (Information terminal device) 10, server (service providing device) 30, and relay server (service relay device) 40. Further, the mobile phone 10 and the relay server 40, and the relay server 40 and the server 30 are connected to each other via a network such as the Internet.

[0086] 図 6は、携帯電話 10、中継サーバ 40、サーバ 30の概略構成を示すブロック図であ る。なお、携帯電話 10の構成は実施形態 1と同様である。  FIG. 6 is a block diagram showing a schematic configuration of the mobile phone 10, the relay server 40, and the server 30. The configuration of the mobile phone 10 is the same as that of the first embodiment.

[0087] 中継サーノ 0は、携帯電話 10とサーバ 20とを中継するものであり、図 6に示すよう に、中継サーバ制御部 41,通信部 42,暗号ィヒ部 43,復号ィヒ部 44,サーバ識別情 報記憶部 45, ROM46, RAM47を備えている。 The relay Sano 0 relays between the mobile phone 10 and the server 20, and as shown in FIG. 6, the relay server control unit 41, the communication unit 42, the encryption unit 43, and the decryption unit 44 , A server identification information storage unit 45, a ROM 46, and a RAM 47 are provided.

[0088] 中継サーバ制御部 41は、中継サーバ 40における各構成部材の動作を制御する、 中継サーバ 40の中枢部である。 The relay server control unit 41 is a central part of the relay server 40 that controls the operation of each component in the relay server 40.

[0089] ROM (Read Only Memory) 46は、中継サーバ制御部 41によって使用される各種 のプログラム(暗号ィ匕処理,復号化処理,サーバ識別処理などのプログラム)を記憶 するためのメモリーである。 A ROM (Read Only Memory) 46 is a memory for storing various programs (programs such as encryption process, decryption process, and server identification process) used by the relay server control unit 41.

[0090] RAM (Random Access Memory) 47は、中継サーバ制御部 41によって使用される 一次記憶部であり、中継サーバ制御部 41が取り扱う各種情報を一時的に記憶するも のである。また、中継サーバ制御部 41は、 ROM46内のプログラムを使用する際に、 これを RAM47に読み込ませるようになって!/、る。 A RAM (Random Access Memory) 47 is a primary storage unit used by the relay server control unit 41, and temporarily stores various types of information handled by the relay server control unit 41. Further, the relay server control unit 41 reads the program in the ROM 46 into the RAM 47 when using the program in the ROM 46! /.

[0091] 通信部 42は、インターネットを通じて接続されるサービス利用装置 (本実施形態で は携帯電話 10)およびサービス提供装置 (本実施形態ではサーバ 30)との間で通信 を行うものである。本実施形態では、中継サーバ 40は、通信部 42を介して、携帯電 話 10およびサーバ 30との間で双方向の通信を行うようになっている。 [0091] The communication unit 42 communicates with a service using device (mobile phone 10 in the present embodiment) and a service providing device (server 30 in the present embodiment) connected through the Internet. In this embodiment, the relay server 40 performs bidirectional communication between the mobile phone 10 and the server 30 via the communication unit 42.

[0092] 暗号ィ匕部 43は、通信部 42を介してサービス利用装置力も受信した認証情報を暗 号化するものである。暗号ィ匕の手法は特に限定されるものではない。 The encryption key unit 43 encrypts the authentication information that has also received the service using device capability via the communication unit 42. The encryption method is not particularly limited.

[0093] 復号ィ匕部 44は、通信部 22を介してサービス利用装置から暗号ィ匕された認証情報( 暗号化認証情報)を受信した場合に、それを復号化するものである。 When receiving the encrypted authentication information (encrypted authentication information) from the service using apparatus via the communication unit 22, the decryption key unit 44 decrypts it.

[0094] サーバ識別情報記憶部 45は、インターネットを介して通信可能に接続される 1っ以 上のサーバ 30について、各サーバ 30が提供するサービスを特定する情報(サービス 識別子)と、各サーバ 30の宛先とを関連付けて記憶するものである。 [0094] The server identification information storage unit 45 has information (services) for identifying services provided by each server 30 for one or more servers 30 that are communicably connected via the Internet. Identifier) and the destination of each server 30 are stored in association with each other.

[0095] サーバ 30は、携帯電話 10等のサービス利用装置に対して中継サーバ 40を介して サービスを提供するものである。サーバ 30によって提供されるサービスは、実施形態 1におけるサーバ 20と同様のものである。また、図 5 (a)および図 5 (b)ではサーバ 30 を 1つだけ描いているが、ネットワーク上には、多数のサーバ 30が接続されており、そ れぞれのサーバ 30が所定のサービスを提供するようになって 、る。  The server 30 provides a service to the service using device such as the mobile phone 10 via the relay server 40. The service provided by the server 30 is the same as that of the server 20 in the first embodiment. In addition, in FIG. 5 (a) and FIG. 5 (b), only one server 30 is depicted, but a large number of servers 30 are connected on the network, and each server 30 is a predetermined server 30. I started to provide services.

[0096] なお、サーバ 30は、暗号ィ匕部および復号ィ匕部を備えて 、な 、点が実施形態 1にお けるサーバ 20と異なる。また、通信部 22が、携帯電話 10と直接通信を行うのではな く、中継サーバ 40との間で通信を行う点が、実施形態 1と異なっている。  Note that the server 30 includes an encryption key unit and a decryption key unit, and is different from the server 20 in the first embodiment in that respect. Further, the point that the communication unit 22 does not directly communicate with the mobile phone 10 but communicates with the relay server 40 is different from the first embodiment.

[0097] 次に、サービス提供システム 2における認証処理 (携帯電話 10,中継サーノ 0,サ ーバ 30の認証処理時の動作)について説明する。なお、サーバ 30の認証情報記憶 部 26には、サービスの提供を許可するユーザの認証情報 (ユーザ IDおよびパスヮー ド)が予め登録 (記憶)されて 、るものとする。  [0097] Next, authentication processing in the service providing system 2 (operation at the time of authentication processing of the mobile phone 10, the relay server 0, and the server 30) will be described. It is assumed that authentication information (user ID and password) of a user permitted to provide a service is registered (stored) in the authentication information storage unit 26 of the server 30 in advance.

[0098] まず、サービス提供システム 2における初回認証処理について図 7に基づいて説明 する。図 7は、この初回認証処理の流れを示すフロー図である。  First, the initial authentication process in the service providing system 2 will be described with reference to FIG. FIG. 7 is a flowchart showing the flow of the initial authentication process.

[0099] まず、携帯電話 10の制御部 11は、入力部 14を介してユーザ力も入力される、利用 するサービスの選択指示を受け付ける(S51)。つまり、ネットワークを介して接続可能 な 1つ以上のサーバ 20によって提供される各サービスの中力 所望するサービスを 選択する選択指示を受け付ける。そして、制御部 11は、選択されたサービスを特定 する情報 (サービス識別子)を生成する(図示せず)。あるいは、ユーザが、所望する サービスを特定する情報 (サービス識別子)を、入力部 14を介して直接入力するよう にしてもよい。  [0099] First, the control unit 11 of the mobile phone 10 receives an instruction to select a service to be used, in which user power is also input via the input unit 14 (S51). In other words, it accepts a selection instruction for selecting a desired service among the services provided by one or more servers 20 connectable via a network. Then, the control unit 11 generates information (service identifier) that identifies the selected service (not shown). Alternatively, the user may directly input information (service identifier) for specifying a desired service via the input unit 14.

[0100] 次に、制御部 11は、暗号記憶部 15を検索し、 S51において選択されたサービスに 対応する暗号化認証情報が記憶されて ヽるかどうかを判断する(S52)。  [0100] Next, the control unit 11 searches the encryption storage unit 15 and determines whether or not the encryption authentication information corresponding to the service selected in S51 is stored (S52).

[0101] そして、対応する暗号ィ匕認識情報が暗号記憶部 15に記憶されている場合には、初 回認証処理は必要ないので、後述する 2回目以降の認証処理(図 8参照)を行う(S5 3)。  [0101] Then, when the corresponding cipher key recognition information is stored in the cipher storage unit 15, the first authentication process is not necessary, so the second and subsequent authentication processes (see FIG. 8) described later are performed. (S5 3).

[0102] 一方、 S52において、対応する暗号化認証情報が暗号記憶部 15に記憶されてい ないと判断した場合、制御部 11は、以下に説明する初回認証処理 (携帯電話 10に おける S54〜S59の処理、および、中 ϋサーノ 40における S61〜S67の処理、サー ノ 30における S71〜S73の処理)を行う。 On the other hand, in S52, the corresponding encrypted authentication information is stored in the encryption storage unit 15. If not, the control unit 11 performs the initial authentication process described below (the process of S54 to S59 in the mobile phone 10, the process of S61 to S67 in the intermediate Sano 40, and the process of S71 to S73 in the Sirno 30. Process).

[0103] この場合、制御部 11は、入力部 14を介してユーザカゝら入力される、初回認証情報 In this case, the control unit 11 receives the initial authentication information input from the user via the input unit 14.

(ユーザ IDおよびパスワード)を受け付ける(S54)。なお、この場合、必要に応じて、 制御部 11が表示部 13に初回認証情報の入力を促す画像を表示させるようにしても よい。  (User ID and password) are accepted (S54). In this case, the control unit 11 may cause the display unit 13 to display an image that prompts input of the initial authentication information as necessary.

[0104] 次に、制御部 11は、初回認証情報とサービス識別子とを、通信部 12を介して中継 サーバ 40に送信する(S55)。なお、この時点では、初回認証情報は暗号化されてい ない非暗号ィ匕認証情報である。表 5に、ブログの提供サービスを要求する場合の、 S 55において送信される情報の例を示す。  [0104] Next, the control unit 11 transmits the initial authentication information and the service identifier to the relay server 40 via the communication unit 12 (S55). At this point, the initial authentication information is non-encrypted authentication information that is not encrypted. Table 5 shows an example of information transmitted in S55 when a blog provision service is requested.

[0105] [表 5]  [0105] [Table 5]

Figure imgf000020_0001
Figure imgf000020_0001

[0106] 中継サーバ 40の中継サーバ制御部 41は、通信部 42を介して携帯電話 10から送 信された初回認証情報およびサービス識別子を受信すると (S61)、受信したサービ ス識別子に対応するサービスを提供するサーバ 30の宛先をサーバ識別情報記憶部 45から検索して特定し、特定した宛先のサーバ 30に、通信部 42を介して初回認証 情報を送信する(S62)。また、中継サーバ制御部 41は、初回認証情報を RAM47 に記憶させる。 [0106] When relay server control unit 41 of relay server 40 receives the initial authentication information and the service identifier transmitted from mobile phone 10 via communication unit 42 (S61), the service corresponding to the received service identifier is received. The server 30 that provides the server 30 searches the server identification information storage unit 45 to identify the destination, and transmits the initial authentication information to the identified destination server 30 via the communication unit 42 (S62). Further, the relay server control unit 41 stores the initial authentication information in the RAM 47.

[0107] サーバ 30のサーバ制御部 21は、通信部(サービス認証窓口) 22を介して中継サー バ 40から送信された初回認証情報を受信すると (S71)、その初回認証情報の認証 処理を行う(S72)。具体的には、中継サーバ 40から受信した初回認証情報と、認証 情報記憶部 26に記憶されている予め設定された認証情報とを照合し、両者の照合 結果が一致したか否か、すなわち認証に成功したか否かを判断する。そして、サー バ制御部 21は、その判断結果 (認証処理結果)を中継サーバ 40に通知する(S73) [0107] When the server control unit 21 of the server 30 receives the initial authentication information transmitted from the relay server 40 via the communication unit (service authentication window) 22 (S71), the server control unit 21 performs authentication processing of the initial authentication information. (S72). Specifically, the initial authentication information received from the relay server 40 and the preset authentication information stored in the authentication information storage unit 26 are collated, and whether or not the collation results match, that is, authentication. To determine whether or not And sir The control unit 21 notifies the determination result (authentication processing result) to the relay server 40 (S73).

[0108] 一方、中継サーノ 0の中継サーバ制御部 41は、サーバ 30からの認証処置結果 の通知を受信すると(S63)、サーバ 30における認証処理が成功した力否かを判断 する(S64)。 On the other hand, when receiving the notification of the authentication processing result from the server 30 (S63), the relay server control unit 41 of the relay Sano 0 determines whether or not the authentication processing in the server 30 is successful (S64).

[0109] ここで、認証処理が失敗であつたと判断した場合、中継サーバ制御部 41は、携帯 電話 10に対して認証失敗を通知する(S65)。一方、 S64において、認証処理が成 功であつたと判断した場合、中継サーバ制御部 41は、 RAM47に記憶させておいた 初回認証情報を読み出し、その初回認証情報を暗号ィ匕部 43に暗号化させ、暗号ィ匕 認証情報を作成させる(S66)。なお、暗号ィ匕の手法は特に限定されるものではない  Here, when it is determined that the authentication process has failed, the relay server control unit 41 notifies the mobile phone 10 of the authentication failure (S65). On the other hand, if it is determined in S64 that the authentication process is successful, the relay server control unit 41 reads the initial authentication information stored in the RAM 47 and encrypts the initial authentication information in the encryption unit 43. To create encryption key authentication information (S66). Note that the encryption method is not particularly limited.

[0110] 次に、中継サーバ制御部 41は、 S66の処理で作成した暗号ィ匕認証情報を、通信 部 42を介して携帯電話 10に送信する(S67)。 [0110] Next, the relay server control unit 41 transmits the encryption key authentication information created in the process of S66 to the mobile phone 10 via the communication unit 42 (S67).

[0111] 一方、携帯電話 10の制御部 11は、中継サーバ 40から返信された情報を受信する と(S56)、受信した情報が認証失敗通知であるカゝ否かを判断する(S57)。 On the other hand, when the control unit 11 of the mobile phone 10 receives the information returned from the relay server 40 (S56), it determines whether or not the received information is an authentication failure notification (S57).

[0112] そして、受信した情報が認証失敗通知であると判断した場合、すなわち受信した情 報が暗号ィ匕認証情報ではないと判断した場合、制御部 11は、認証処理に失敗した ことおよび認証処理を継続するか否かの問 、合わせを表示部 13に表示する(図示 せず)。 [0112] When it is determined that the received information is an authentication failure notification, that is, when it is determined that the received information is not encryption authentication information, the control unit 11 indicates that the authentication processing has failed and the authentication A question as to whether or not to continue processing is displayed on the display unit 13 (not shown).

[0113] そして、入力部 14に対して認証処理を継続しない旨の指示があった場合、あるい は何ら指示がな力つた場合には、認証処理を終了する。また、入力部 14に対して認 証処理を継続する旨の指示があった場合には、再び S54からの処理を行う。あるい は、継続する旨の指示入力を省略し、認証処理を継続する場合にはユーザが初回 認証情報を再入力するようにしてもょ ヽ。  [0113] If there is an instruction to the input unit 14 not to continue the authentication process, or if no instruction is given, the authentication process ends. If the input unit 14 is instructed to continue the authentication process, the process from S54 is performed again. Or, omit the instruction to continue and allow the user to re-enter the initial authentication information when continuing the authentication process.

[0114] また、 S57において、受信した情報が認証失敗通知ではないと判断した場合、すな わち受信した情報が暗号化認証情報であると判断した場合、制御部 11は、受信した 暗号化認証情報を、その暗号ィ匕認証情報に対応するサービス識別子と関連付けて 暗号記憶部 15に記憶させる(S59)。これにより、初回認証処理が終了する。 [0115] 次に、 2回目以降の認証処理、すなわち、暗号記憶部 15に、選択されたサービス に対応する暗号ィ匕認識情報が記憶されている場合の認証処理について図 8に基づ いて説明する。図 8は、 2回目以降の認証処理の流れを示すフロー図である。 [0114] If it is determined in S57 that the received information is not an authentication failure notification, that is, if it is determined that the received information is encrypted authentication information, the control unit 11 receives the received encryption. The authentication information is stored in the encryption storage unit 15 in association with the service identifier corresponding to the encryption authentication information (S59). This completes the initial authentication process. [0115] Next, the second and subsequent authentication processes, that is, the authentication process when the cipher key recognition information corresponding to the selected service is stored in the cipher storage unit 15 will be described with reference to FIG. To do. FIG. 8 is a flowchart showing the flow of authentication processing for the second and subsequent times.

[0116] まず、携帯電話 10の制御部 11は、図 7で説明した S51および S52の処理を行う。  First, the control unit 11 of the mobile phone 10 performs the processes of S51 and S52 described with reference to FIG.

そして、 S52において、選択されたサービスのサービス識別子に対応する暗号ィ匕認 証情報が記憶されていないと判断した場合、制御部 11は、上記した初回認証処理( 図 7における S54以降の処理)を行う。  If it is determined in S52 that the encryption authentication information corresponding to the service identifier of the selected service is not stored, the control unit 11 performs the initial authentication process described above (the process after S54 in FIG. 7). I do.

[0117] 一方、 S52において、対応する暗号ィ匕情報が記憶されていると判断した場合、制御 部 11は、以下に説明する 2回目以降の認証処理 (携帯電話 10における S81〜S84 の処理、中 ϋサーノ 40における S91〜S95の処理、サーバ 30における S101〜S1 03の処理)を行う。  [0117] On the other hand, if it is determined in S52 that the corresponding encryption key information is stored, the control unit 11 performs the second and subsequent authentication processing described below (the processing of S81 to S84 in the mobile phone 10, The processing of S91 to S95 in Nakano Sano 40 and the processing of S101 to S103 in server 30) is performed.

[0118] この場合、制御部 11は、まず、暗号記憶部 15に記憶されている、選択されたサー ビスのサービス識別子に対応する暗号ィ匕認証情報を読み出して取得する(S81)。  In this case, the control unit 11 first reads and obtains the encryption authentication information corresponding to the service identifier of the selected service stored in the encryption storage unit 15 (S81).

[0119] 次に、制御部 11は、入力部 14を介して入力されるサービスに関する詳細情報の入 力を受け付ける(S82)。ここで、サービスに関する詳細情報とは、例えば、ブログの 提供サービスを要求する場合には、取得するブログの URLなどである。また、書籍情 報提供サービスを要求する場合には、情報を取得した!/、書籍を特定するための情報 等が、サービスに関する詳細情報に該当する。なお、以下の説明では、このような詳 細情報とサービス識別情報とを含む情報を、サービス要求情報と称する。  [0119] Next, the control unit 11 receives input of detailed information related to a service input via the input unit 14 (S82). Here, the detailed information on the service is, for example, the URL of the blog to be acquired when requesting a blog providing service. In addition, when requesting a book information providing service, the information acquired! /, Information for identifying the book, etc., correspond to the detailed information about the service. In the following description, information including such detailed information and service identification information is referred to as service request information.

[0120] 次に、制御部 11は、 S81で読み出した暗号ィ匕認証情報と、 S82で受け付けた詳細 情報および S51で選択されたサービスのサービス識別子を含むサービス要求情報と を、通信部 12を介して中継サーバ 40に送信する(S83)。  [0120] Next, the control unit 11 sends the encryption key authentication information read in S81, the detailed information received in S82, and the service request information including the service identifier of the service selected in S51, to the communication unit 12. To the relay server 40 (S83).

[0121] 中継サーバ 40の中継サーバ制御部 41は、携帯電話 10から通信部 42を介して暗 号化認証情報およびサービス要求情報を受信すると (S91)、復号化部 25に受信し た暗号化認証情報を復号化させる(S92)。  [0121] When the relay server control unit 41 of the relay server 40 receives the encryption authentication information and the service request information from the mobile phone 10 via the communication unit 42 (S91), the encryption received by the decryption unit 25 is received. The authentication information is decrypted (S92).

[0122] 次に、中継サーバ制御部 41は、携帯電話 10から受信したサービス識別子に対応 するサービスを提供するサーバ 30の宛先をサーバ識別情報記憶部 45から検索して 特定し、特定した宛先のサーバ 30に、通信部 42を介して、復号ィ匕された認証情報と サービス要求情報とを送信する(S93)。 [0122] Next, the relay server control unit 41 searches the server identification information storage unit 45 for the destination of the server 30 that provides the service corresponding to the service identifier received from the mobile phone 10, and specifies the destination. The authentication information decrypted and transmitted to the server 30 via the communication unit 42. Service request information is transmitted (S93).

[0123] サーバ 30のサーバ制御部 21は、中継サーノ Oから復号ィ匕された認証情報とサー ビス要求情報とを受信すると (S101)、受信した認証情報 (復号化認証情報)の認証 処理を行う(S102)。具体的には、中継サーバ 40で復号ィ匕された認証情報と、認証 情報記憶部 26に記憶されている予め設定された認証情報とを照合する。なお、この 復号ィ匕した認証情報は、初回認証処理時に認証に成功した認証情報であるので、 認証情報記憶部 26に記憶されて 、る認証情報がその後書き換えられて 、ない限り、 必ず一致する。ここでは、そのような書き換えは行われていないものとする力 書き換 えが行われている場合には、中継サーバ 40を介して携帯電話 10に認証失敗を通知 し、初回認証処理力もやり直させるようにすればょ ヽ(図示せず)。  [0123] When the server control unit 21 of the server 30 receives the authentication information and the service request information decrypted from the relay sano O (S101), the server control unit 21 performs an authentication process on the received authentication information (decrypted authentication information). Perform (S102). Specifically, the authentication information decrypted by the relay server 40 and the preset authentication information stored in the authentication information storage unit 26 are collated. Since the decrypted authentication information is authentication information that has been successfully authenticated at the time of the initial authentication process, the authentication information stored in the authentication information storage unit 26 is sure to match unless the authentication information is subsequently rewritten. . Here, when such force rewriting is performed, if rewriting is performed, the mobile phone 10 is notified of the authentication failure via the relay server 40, and the initial authentication processing power is also restarted. If you do this (not shown).

[0124] S 102の認証処理を行った後(認証成功を確認した後)、サーバ制御部 21は、中継 サーバ 40に、提供するサービス内容を送信する(S103)。  [0124] After performing the authentication process of S102 (after confirming the authentication success), the server control unit 21 transmits the service content to be provided to the relay server 40 (S103).

[0125] 中継サーバ 40の中継サーバ制御部 41は、サーバ 30力 提供されるサービス内容 を受信すると (S94)、受信したサービス内容を携帯電話 10に送信する(S95)。  [0125] When the relay server control unit 41 of the relay server 40 receives the service content provided by the server 30 (S94), it transmits the received service content to the mobile phone 10 (S95).

[0126] 携帯電話 10の制御部 11は、中継サーバ 40からサービス内容を受信すると(S84) 、受信したサービス内容を RAM 17に記憶させたり表示部 13に表示させるなどして 必要な処理を行う。これにより、 2回目以降の認証処理およびサービスの受信処理が 終了する。  [0126] Upon receiving the service content from the relay server 40 (S84), the control unit 11 of the mobile phone 10 performs the necessary processing by storing the received service content in the RAM 17 or displaying it on the display unit 13 or the like. . This completes the second and subsequent authentication processing and service reception processing.

[0127] 以上のように、本実施形態では、初回認証処理に成功した認証情報は、中継サー バ 40で暗号化された後、携帯電話 10に記憶される。そして、そのサービスを次回以 降要求する時には、携帯電話 10から中継サーバ 40に、上記のように記憶した暗号 化認証情報を送信し、中継サーバ 40が受信した暗号ィ匕認証情報を復号ィ匕して、要 求するサービスを提供するサーバ 30に復号ィ匕した認証情報を送信する。  As described above, in the present embodiment, the authentication information that has been successfully subjected to the initial authentication process is encrypted by the relay server 40 and then stored in the mobile phone 10. When the service is requested from the next time, the encrypted authentication information stored as described above is transmitted from the mobile phone 10 to the relay server 40, and the encrypted key authentication information received by the relay server 40 is decrypted. Then, the decrypted authentication information is transmitted to the server 30 that provides the requested service.

[0128] これにより、携帯電話 (サービス利用装置) 10のユーザが認証情報 (ユーザ IDよお びパスワード)の入力操作を行うのは、初回認証処理のときだけでよくなる。すなわち 、ユーザが、携帯電話 10を用いてサーバ (サービス提供装置) 30の提供するサービ スを利用する際、認証情報を毎回入力する必要がなくなる。したがって、サービスを 利用する際のユーザの利便性を向上させることができる。 [0129] また、携帯電話 10には暗号ィ匕された認証情報が記憶されるので、例えば携帯電話 10の記憶領域が解析されたとしても、サーバ 30に対する認証情報が漏れる(盗まれ る)ことがない。したがって、本実施形態に力かる認証方法により、認証情報に関する セキュリティ(安全性)を高めることができる。 As a result, the user of the mobile phone (service utilization device) 10 only needs to input authentication information (user ID and password) during the initial authentication process. That is, when the user uses the service provided by the server (service providing apparatus) 30 using the mobile phone 10, it is not necessary to input authentication information every time. Therefore, the convenience of the user when using the service can be improved. [0129] Further, since the encrypted authentication information is stored in the mobile phone 10, for example, even if the storage area of the mobile phone 10 is analyzed, the authentication information for the server 30 is leaked (stolen). There is no. Therefore, the security (safety) related to the authentication information can be enhanced by the authentication method that works on the present embodiment.

[0130] また、本実施形態にカゝかるサービス提供システム 2では、暗号化部および復号化部 が中継サーノ Oに備えられている。このため、サーバ 30に暗号化部および復号ィ匕 部を備える必要がないので、既存のサーバ 30 (サービス提供装置)を用いて、本発 明の認証方法およびサービス提供システムを実現することができる。  [0130] Also, in the service providing system 2 according to the present embodiment, the encryption unit and the decryption unit are provided in the relay sano O. For this reason, it is not necessary for the server 30 to include an encryption unit and a decryption unit, and therefore the authentication method and service providing system of the present invention can be realized using the existing server 30 (service providing device). .

[0131] また、中継サーノ Oは、通信可能に接続される 1つ以上のサーバについて、各サ ーバが提供するサービスを特定する情報 (サービス識別子)と各サーバの宛先とを関 連付けて記憶するサーバ識別情報記憶部 45を備えている。これにより、携帯電話 10 力も中継サーノ Oにサービス識別子を送信することで、中継サーバ 40においてそ のサービス識別子に対応するサービスを提供するサーバの宛先を検索できる。つま り、携帯電話 10では、初回認証に成功したサービスについての暗号ィ匕認証情報をそ のサービスのサービス識別子と関連付けて記憶しておくだけでよい。また、ユーザは 、利用するサービス (あるいはサービス識別子)を選択 (入力)するだけで、複数のサ ーバが提供する各サービスの中力 所望するサービスを容易に利用することができる  [0131] Relay Sano O associates information (service identifier) for identifying the service provided by each server with the destination of each server for one or more servers that are communicably connected. A server identification information storage unit 45 for storage is provided. As a result, the mobile phone 10 can also transmit the service identifier to the relay Sano O, so that the relay server 40 can search for the destination of the server that provides the service corresponding to the service identifier. In other words, the cellular phone 10 only needs to store the encryption authentication information for the service that has been successfully authenticated for the first time in association with the service identifier of the service. In addition, the user can easily use the desired service of each service provided by multiple servers simply by selecting (inputting) the service (or service identifier) to be used.

[0132] また、本実施形態によれば、サービス中継装置を設ける場合は、 1以上のサービス 提供装置が提供するサービスを、毎回パスワードを入力することなく認証して利用で きるので、利便性が向上する。また、このように、 1以上のサービス提供装置が提供す るサービスを利用する場合、各サーバ 30に予め設定しておく認証情報 (ユーザ IDお よびパスワード)は、利用するサーバ毎(あるいはサービス毎)に異なっていてもよい。 [0132] Also, according to the present embodiment, when a service relay device is provided, services provided by one or more service providing devices can be authenticated and used without entering a password each time. improves. As described above, when using a service provided by one or more service providing apparatuses, authentication information (user ID and password) set in advance for each server 30 is set for each server (or each service). ) May be different.

[0133] また、本実施形態では、初回認証時には、携帯電話 10から中継サーバ 40に初回 認証情報 (非暗号化認証情報)とサービス識別子が送信され、サーバ 30における認 証処理が成功した場合に、中継サーバ 40から携帯電話 10に暗号ィ匕認証情報が返 信されるようになっている。ただし、これに限らず、例えば、初回認証時に、携帯電話 10から中継サーバ 40に初回認証情報およびサービス識別子に加えて要求するサ 一ビスの詳細情報を送信し、サーバ 30が認証処理に成功した場合に、サーバ 30か ら提供されるサービス内容と中継サーバ 40で作成した暗号ィ匕認証情報とを、中継サ ーバ 40から携帯電話 10に送信するようにしてもょ ヽ。 [0133] Also, in the present embodiment, at the time of the initial authentication, the initial authentication information (unencrypted authentication information) and the service identifier are transmitted from the mobile phone 10 to the relay server 40, and the authentication process in the server 30 is successful. The encryption key authentication information is returned from the relay server 40 to the mobile phone 10. However, the present invention is not limited to this. For example, in the initial authentication, the mobile phone 10 requests to the relay server 40 in addition to the initial authentication information and the service identifier. When the server 30 succeeds in the authentication process, the service details provided by the server 30 and the encryption authentication information created by the relay server 40 are transmitted from the relay server 40. Send it to mobile phone 10.

[0134] また、初回認証時に、ユーザ IDまたはパスワードのいずれか一方のみを暗号化す るようにしてもよい。また、ユーザ IDおよびパスワードにカ卩えて、各携帯電話 (サービ ス利用装置) 10に固有の端末 IDを認証情報として用いるようにしてもよい。また、携 帯電話 10に暗号化手段を設け、中継サーバ 40にそれに対応する復号化手段を設 けておき、初回認証時には、初回認証情報を携帯電話 10で暗号ィ匕し、携帯電話 10 力も中継サーバ 40に暗号ィ匕した初回認証情報とそれを復号ィ匕するための解読情報 とを送信するようにしてもよい。この場合、初回認証時に携帯電話 10から中継サーバ 40に送信される暗号ィ匕された初回認証情報は、初回認証成功後に中継サーバ 40 で作成される暗号ィ匕認証情報と同じである必要はない。  [0134] Also, at the time of initial authentication, only one of the user ID and password may be encrypted. In addition to the user ID and password, a terminal ID unique to each mobile phone (service using device) 10 may be used as authentication information. Also, the mobile phone 10 is provided with an encryption means, and the relay server 40 is provided with a corresponding decryption means. At the time of the initial authentication, the initial authentication information is encrypted with the mobile phone 10, and the mobile phone 10 power is also stored. The initial authentication information encrypted and the decryption information for decrypting it may be transmitted to the relay server 40. In this case, the encrypted initial authentication information transmitted from the mobile phone 10 to the relay server 40 at the time of the initial authentication does not have to be the same as the encrypted authentication information generated by the relay server 40 after the initial authentication is successful. .

[0135] また、本実施形態では、初回認証処理に成功した際に認証情報が暗号化され、こ の際に暗号ィ匕された認証情報がその後継続して利用されるようになっている力 これ に限るものではない。例えば、 2回目以降の認証処理において、サービスが利用され る毎にそのサービスに関する認証処理の暗号ィ匕処理を再度実行し、前回とは異なる 暗号ィ匕認証情報を携帯電話 10に送信するようにしてもよい。また、そのサービスが所 定回数利用される毎に、暗号化認証情報の更新 (再暗号化)を行い、前回とは異なる 暗号化認証情報を携帯電話 10に送信するようにしてもょ ヽ。  [0135] In the present embodiment, the authentication information is encrypted when the initial authentication process is successful, and the encrypted authentication information is used continuously thereafter. This is not a limitation. For example, in the second and subsequent authentication processes, every time a service is used, the encryption process of the authentication process related to the service is executed again, and the encryption authentication information different from the previous one is transmitted to the mobile phone 10. May be. Also, every time the service is used a specified number of times, update the encrypted authentication information (re-encryption) and send the encrypted authentication information different from the previous one to the mobile phone 10.

[0136] 〔実施形態 3〕  [Embodiment 3]

本発明のさらに他の実施形態について説明する。なお、説明の便宜上、実施形態 1または 2で説明した各部材と同様の機能を有する部材については、実施形態 1また は 2と同じ符号を用い、その説明を省略する。  Still another embodiment of the present invention will be described. For convenience of explanation, members having the same functions as those described in the first or second embodiment are denoted by the same reference numerals as those in the first or second embodiment, and the description thereof is omitted.

[0137] 図 9 (a)および図 9 (b)は、本実施形態に力かるサービス提供システム 2aの概略構 成を示す説明図である。これらの図に示すように、サービス提供システム 2aは、携帯 電話 (情報端末装置) 10と、中継サーバ (サービス中継装置) 40と、サーバ (サービス 提供装置) 30a, 30bとを備えている。なお、携帯電話 10と中継サーバ 40、および、 中継サーバ 40とサーバ 30a, 30bは、それぞれインターネット等のネットワークを介し て通信可能に接続されている。また、携帯電話 10の構成は実施形態 1, 2と同様であ り、中継サーバ 40の構成は実施形態 2と同様であり、各サーバ 30a, 30bの構成は実 施形態 2のサーバ 30と同様である。 FIG. 9 (a) and FIG. 9 (b) are explanatory diagrams showing a schematic configuration of a service providing system 2a that works on the present embodiment. As shown in these drawings, the service providing system 2a includes a mobile phone (information terminal device) 10, a relay server (service relay device) 40, and servers (service providing devices) 30a and 30b. The mobile phone 10 and the relay server 40, and the relay server 40 and the servers 30a and 30b are respectively connected via a network such as the Internet. Are connected to communicate. The configuration of the mobile phone 10 is the same as that of the first and second embodiments, the configuration of the relay server 40 is the same as that of the second embodiment, and the configuration of each server 30a, 30b is the same as that of the server 30 of the second embodiment. It is.

[0138] ただし、本実施形態では、携帯電話 10から複数のサーバ 30a, 30bにサービスの 提供を要求する場合に、サーバ 30a, 30bに対して送信する認証情報を一まとめにし て携帯電話 10から中継サーバ 40に送信し、中継サーバ 40が受信したそれらの認証 情報をサーバ毎に振り分けて送信するようになっている。また、サーバ 30a, 30bから 提供されるサービス内容力 中継サーバ 40によって一まとめにされて携帯電話 10に 送信されるようになって 、る。  However, in the present embodiment, when the mobile phone 10 requests the provision of services to a plurality of servers 30a and 30b, the authentication information transmitted to the servers 30a and 30b is collectively collected from the mobile phone 10. The authentication information transmitted to the relay server 40 and received by the relay server 40 is distributed for each server and transmitted. Further, the service contents provided by the servers 30a and 30b are collected together by the relay server 40 and transmitted to the mobile phone 10.

[0139] サービス提供システム 2aにおける認証処理 (携帯電話 10,中継サーノ 0,サーバ 30a, 30bの認証処理時の動作)について説明する。なお、サーバ 30a, 30bの認証 情報記憶部 26には、それぞれ、サービスの提供を許可するユーザの認証情報 (ユー ザ IDおよびパスワード)が予め登録 (記憶)されているものとする。  [0139] An authentication process (operation during the authentication process of the mobile phone 10, relay sano 0, and servers 30a and 30b) in the service providing system 2a will be described. It is assumed that the authentication information storage unit 26 of the servers 30a and 30b has previously registered (stored) authentication information (user ID and password) of a user permitted to provide a service.

[0140] まず、サービス提供システム 2aにおける初回認証処理について図 10に基づいて説 明する。図 10は、この初回認証処理の流れを示すフロー図である。  First, the initial authentication process in the service providing system 2a will be described with reference to FIG. FIG. 10 is a flowchart showing the flow of the initial authentication process.

[0141] まず、携帯電話 10の制御部 11は、入力部 14を介してユーザ力も入力される、利用 する全てのサービスの選択指示を受け付ける(S 111)。つまり、ネットワークを介して 接続可能な 1つ以上のサーバ 20によって提供される各サービスの中力も所望する全 てのサービスを選択する選択指示を受け付ける。そして、制御部 11は、選択された 各サービスを特定する情報 (サービス識別子)を生成する(図示せず)。あるいは、ュ 一ザが、所望する各サービスを特定する情報 (サービス識別子)を、入力部 14を介し て直接入力するようにしてもょ 、。  [0141] First, the control unit 11 of the mobile phone 10 receives an instruction to select all the services to be used, in which user power is also input via the input unit 14 (S111). That is, the selection instruction for selecting all desired services is also accepted as the central force of each service provided by one or more servers 20 that can be connected via the network. Then, the control unit 11 generates information (service identifier) that identifies each selected service (not shown). Alternatively, the user may directly input information (service identifier) identifying each desired service via the input unit 14.

[0142] 次に、制御部 11は、暗号記憶部 15を検索し、 S111において選択された全てのサ 一ビスに対応する暗号ィ匕認証情報が記憶されて ヽるかどうかを判断する(S112)。  [0142] Next, the control unit 11 searches the encryption storage unit 15 and determines whether encryption authentication information corresponding to all the services selected in S111 is stored (S112). ).

[0143] そして、対応する全ての暗号ィ匕認識情報が暗号記憶部 15に記憶されている場合 には、初回認証処理は必要ないので、後述する 2回目以降の認証処理(図 11参照) を行う(S 113)。  [0143] Then, when all corresponding encryption key recognition information is stored in the encryption storage unit 15, the first authentication process is not necessary, so the second and subsequent authentication processes (see Fig. 11) described later are performed. Perform (S 113).

[0144] 一方、 S112において、対応する全ての暗号化認証情報が暗号記憶部 15に記憶さ れていないと判断した場合、制御部 11は、以下に説明する初回認証処理 (携帯電話 10における S114〜S119の処理、および、中 ϋサーノ 40における S121〜S129の 処理、サーノ 30a, 30bにおける S131〜S133の処理)を行う。 On the other hand, in S112, all corresponding encryption authentication information is stored in the encryption storage unit 15. If not, the control unit 11 performs the initial authentication process described below (the process of S114 to S119 in the mobile phone 10, the process of S121 to S129 in the intermediate Sano 40, the S131 in the Sano 30a, 30b. To S133).

[0145] この場合、制御部 11は、入力部 14を介してユーザ力も入力される、 S112で暗号 化認証情報を記憶して 、な 、と判断したサービスにつ 、ての初回認証情報 (ユーザ I Dおよびパスワード)を受け付ける(S114)。なお、この場合、必要に応じて、制御部 1 1が表示部 13に、暗号化認証情報を記憶して!/、な 、サービスにつ 、ての初回認証 情報の入力を促す画像を表示させるようにしてもょ 、。  [0145] In this case, the control unit 11 also receives user power through the input unit 14. The encrypted authentication information is stored in S112, and the initial authentication information (user ID and password) are accepted (S114). In this case, if necessary, the control unit 11 stores the encrypted authentication information on the display unit 13 and displays an image prompting the user to input the initial authentication information for the service! / Even so,

[0146] 次に、制御部 11は、 S114で入力された初回認証情報と、その初回認証情報に関 するサービスのサービス識別子とを、通信部 12を介して中継サーバ 40に送信する( S115)。なお、この時点では、初回認証情報は暗号ィ匕されていない非暗号ィ匕認証 情報である。表 6に、ブログ提供サービスおよび本の情報 (書籍情報)提供サービス を利用する場合の、 S115において送信される情報の一例を示す。なお、表 6に示す 例では、認証情報として、ユーザ IDおよびパスワードに加えて、各携帯電話 10に固 有の情報である端末 IDも用いるようになって 、る。  [0146] Next, the control unit 11 transmits the initial authentication information input in S114 and the service identifier of the service related to the initial authentication information to the relay server 40 via the communication unit 12 (S115). . At this time, the initial authentication information is non-encrypted authentication information that is not encrypted. Table 6 shows an example of information transmitted in S115 when the blog providing service and the book information (book information) providing service are used. In the example shown in Table 6, in addition to the user ID and password, a terminal ID that is unique to each mobile phone 10 is used as the authentication information.

[0147] [表 6]  [0147] [Table 6]

Figure imgf000027_0001
中継サーバ 40の中継サーバ制御部 41は、通信部 42を介して携帯電話 10から送 信された利用する全てのサービスに関する初回認証情報およびサービス識別子を受 信すると (S121)、受信した各サービス識別子に対応するサービスを提供するサーバ の宛先をサーバ識別情報記憶部 45から検索して特定し、特定した宛先のサーバに
Figure imgf000027_0001
When the relay server control unit 41 of the relay server 40 receives initial authentication information and service identifiers for all services to be used transmitted from the mobile phone 10 via the communication unit 42 (S121), the received service identifiers Server that provides services corresponding to Is searched from the server identification information storage unit 45 and specified.

、通信部 42を介して初回認証情報を送信する(S 122)。また、中継サーバ制御部 41 は、各サービスの初回認証情報を RAM47に記憶させる。 The initial authentication information is transmitted via the communication unit 42 (S122). In addition, the relay server control unit 41 stores the initial authentication information of each service in the RAM 47.

[0149] 例えば、表 6のようにブログ提供サービスを利用する場合、ブログ提供サービスを提 供するサーバであるサーバ 30aに、表 7に示す初回認証情報を送信する。 [0149] For example, when using the blog providing service as shown in Table 6, the initial authentication information shown in Table 7 is transmitted to the server 30a that is a server providing the blog providing service.

[0150] [表 7] [0150] [Table 7]

Figure imgf000028_0001
Figure imgf000028_0001

[0151] また、表 6に示すように本の情報提供サービスを利用する場合、本の情報提供サー ビスを提供するサーバであるサーバ 30bに、表 8に示す初回認証情報を送信する。 [0151] Further, when using the book information providing service as shown in Table 6, the initial authentication information shown in Table 8 is transmitted to the server 30b which is a server providing the book information providing service.

[0152] [表 8] [0152] [Table 8]

Figure imgf000028_0002
Figure imgf000028_0002

[0153] サーバ 30a, 30bのサーバ制御部 21は、通信部(サービス認証窓口) 22を介して 中継サーバ 40から送信された初回認証情報を受信すると (S131)、受信した初回認 証情報の認証処理を行う(S 132)。具体的には、中継サーバ 40から受信した初回認 証情報と、認証情報記憶部 26に記憶されている予め設定された認証情報とを照合し 、両者の照合結果が一致したカゝ否か、すなわち認証に成功したカゝ否かを判断する。 そして、サーバ制御部 21は、その判断結果 (認証処理結果)を中継サーバ 40に通知 する(S133)。 [0153] When the server control unit 21 of the servers 30a and 30b receives the initial authentication information transmitted from the relay server 40 via the communication unit (service authentication window) 22 (S131), it authenticates the received initial authentication information. Processing is performed (S132). Specifically, the initial authentication information received from the relay server 40 and the preset authentication information stored in the authentication information storage unit 26 are collated, and whether or not the collation results of the two match, That is, it is determined whether or not the authentication is successful. Then, the server control unit 21 notifies the determination result (authentication processing result) to the relay server 40 (S133).

[0154] 中継サーバ 40の中継サーバ制御部 41は、サーバ 30a, 30bからの認証処置結果 の通知を受信すると(S123)、各サーバ 30a,30bにおける認証処理が成功した力否 かを判断する(S 124)。 [0155] そして、中継サーバ制御部 41は、認証処理が成功したと判断したサービスの初回 認証情報を RAM47から読み出し、その初回認証情報を暗号ィ匕部 43に暗号ィ匕させ 、暗号ィ匕認証情報を作成させる(S 125)。また、作成した暗号化認証情報を RAM4 7に記憶させる(S 126)。 [0154] When the relay server control unit 41 of the relay server 40 receives the notification of the authentication processing result from the servers 30a and 30b (S123), it determines whether or not the authentication processing in each of the servers 30a and 30b is successful ( S 124). [0155] Then, the relay server control unit 41 reads from the RAM 47 the initial authentication information of the service for which the authentication process has been determined to be successful, and causes the encryption key unit 43 to encrypt the initial authentication information, thereby encrypting the authentication. Information is created (S 125). Further, the created encrypted authentication information is stored in the RAM 47 (S 126).

[0156] 一方、 S124において認証処理に失敗したと判断したサービスについては、そのサ 一ビスについての認証処理が失敗したことを示す認証失敗情報を RAM47に記憶さ せる(S127)。  On the other hand, for the service that is determined to have failed the authentication process in S124, authentication failure information indicating that the authentication process for the service has failed is stored in RAM 47 (S127).

[0157] その後、中継サーバ制御部 41は、携帯電話 10から受信した、利用する全てのサー ビス識別子に対応するサービスについて認証処理が完了したか否かを判断する(S1 28)。そして、認証処理が完了していないサービスがある場合には、 S122以降の処 理を繰り返し、全てのサービスについて認証処理を行う。一方、利用する全てのサー ビスについて認証処理が完了したと判断した場合、中継サーバ制御部 41は、 S126 において RAM47に記憶させた各暗号化認証情報および S127において RAM47 に記憶させた各認証失敗情報を読み出し、読み出したそれらの情報を一まとめにし て携帯電話 10に送信する(S129)。  Thereafter, relay server control unit 41 determines whether or not the authentication process has been completed for the services corresponding to all service identifiers received from mobile phone 10 (S128). If there is a service for which authentication processing has not been completed, the processing from S122 is repeated, and authentication processing is performed for all services. On the other hand, if it is determined that the authentication process has been completed for all the services to be used, the relay server control unit 41 determines each encrypted authentication information stored in the RAM 47 in S126 and each authentication failure information stored in the RAM 47 in S127. And the read information is collected and transmitted to the mobile phone 10 (S129).

[0158] 表 9は、ブログ提供サービスおよび本の情報提供サービスの両方にっ 、て、認証処 理に成功した場合に、中継サーバ 40から携帯電話 10に送信される情報 (サービス 識別子および暗号ィ匕認証情報)の例を示している。なお、この例では、端末 IDにつ Vヽては暗号化して ヽな 、が、これに限るものではな!/、。  [0158] Table 9 shows information (service identifier and encryption key) transmitted from the relay server 40 to the mobile phone 10 when the authentication process is successful for both the blog providing service and the book information providing service. An example of (authentication information) is shown. In this example, the terminal ID must be encrypted for V, but not limited to this! /.

[0159] [表 9] サービス識別子 a ブ口グ  [0159] [Table 9] Service identifier a

ユーザ I D (暗号化認証情報 A ' ) %iIF3i)#Ro#$#  User ID (Encrypted authentication information A ')% iIF3i) #Ro # $ #

パスワード (暗号化認証情報 A ' ) %0gO9j4O-982  Password (encrypted authentication information A ')% 0gO9j4O-982

端末 I D (暗号化認証情報 A ' ) 037323290383  Terminal ID (Encryption authentication information A ') 037323290383

サービス識別子 b 本の情報  Service identifier b information

ユーザ I D (暗号化認証情報 B ' ) %41bs09ETIJ9  User ID (Encryption authentication information B ')% 41bs09ETIJ9

パスヮード (暗号化認証情報 B, ) %23E34GDRo  Password (Encryption authentication information B,)% 23E34GDRo

端末 I D (暗号化認証情報 B ' ) 037323290383 [0160] 携帯電話 10の制御部 11は、中継サーバ 40から返信された情報を受信すると(S1 16)、受信した情報に含まれる暗号ィ匕認証情報をそれぞれのサービス識別子と関連 付けて暗号記憶部 15に記憶させる(S 117)。 Terminal ID (encrypted authentication information B ') 037323290383 [0160] Upon receiving the information returned from the relay server 40 (S116), the control unit 11 of the mobile phone 10 stores the encrypted authentication information included in the received information in association with each service identifier. Stored in section 15 (S 117).

[0161] 次に、制御部 11は、中継サーバ 40から受信した情報に認証失敗情報が含まれて いる力否かを判断する(S118)。そして、認証失敗情報が含まれていると判断した場 合、制御部 11は、そのサービスについて認証処理に失敗したことおよび認証処理を 継続するか否かの問 、合わせを表示部 13に表示する(図示せず)。  [0161] Next, the control unit 11 determines whether or not the information received from the relay server 40 includes authentication failure information (S118). If it is determined that the authentication failure information is included, the control unit 11 displays on the display unit 13 an inquiry as to whether the authentication process has failed for the service and whether or not to continue the authentication process. (Not shown).

[0162] そして、入力部 14に対して認証処理を継続しない旨の指示があった場合、あるい は何ら指示がな力つた場合には、認証に失敗したサービスの利用を断念するものと 判断し、認証処理を終了する。また、入力部 14に対して認証処理を継続する旨の指 示があった場合には、再び S 114からの処理を行う。あるいは、継続する旨の指示入 力を省略し、認証処理を継続する場合にはユーザがそのサービスについての初回認 証情報を再入力するようにしてもょ ヽ。  [0162] Then, if the input unit 14 is instructed not to continue the authentication process, or if no instruction is given, it is determined that the use of the service that has failed in authentication is abandoned. Then, the authentication process ends. If the input unit 14 is instructed to continue the authentication process, the process from S114 is performed again. Or, omit the instruction to continue and allow the user to re-enter the initial authentication information for the service when continuing the authentication process.

[0163] また、 S118において、受信した情報に認証失敗情報が含まれていないと判断した 場合、すなわち受信した情報が全て暗号ィ匕認証情報であると判断した場合、制御部 11は、初回認証処理を終了する。  [0163] Also, in S118, when it is determined that the received information does not include authentication failure information, that is, when it is determined that all the received information is encryption authentication information, the control unit 11 performs initial authentication. The process ends.

[0164] 次に、 2回目以降の認証処理、すなわち、暗号記憶部 15に、選択された全てのサ 一ビスに対応する暗号ィ匕認識情報が記憶されて 、る場合の認証処理にっ 、て図 11 に基づいて説明する。図 11は、 2回目以降の認証処理の流れを示すフロー図である  [0164] Next, the second and subsequent authentication processing, that is, authentication processing in the case where encryption key recognition information corresponding to all selected services is stored in the encryption storage unit 15, This will be described with reference to FIG. Fig. 11 is a flowchart showing the flow of authentication processing after the second time.

[0165] まず、携帯電話 10の制御部 11は、図 10で説明した S111および S112の処理を行 う。そして、 S112において、利用する全てのサービスに対応する暗号ィ匕認証情報が 暗号記憶部 15に記憶されていないと判断した場合、制御部 11は、上記した初回認 証処理(図 10における S 114以降の処理)を行う。 [0165] First, the control unit 11 of the mobile phone 10 performs the processing of S111 and S112 described with reference to FIG. When it is determined in S112 that the encryption key authentication information corresponding to all the services to be used is not stored in the encryption storage unit 15, the control unit 11 performs the above-described initial authentication process (S114 in FIG. 10). Perform the following processing).

[0166] 一方、 S112において、対応する暗号ィ匕情報が記憶されていると判断した場合、制 御部 11は、以下に説明する 2回目以降の認証処理 (携帯電話 10における S141〜S 143の処理、中 ϋサーノ 40における S151〜S157の処理、サーノ 30a,30bにおけ る S161〜S163の処理)を行う。 [0167] この場合、制御部 11は、入力部 14を介して入力されるサービスに関する詳細情報 (その他の情報)の入力を受け付ける(S141)。ここで、サービスに関する詳細情報と は、例えば、ブログの提供サービスを要求する場合には、取得するブログの URLな どである。また、本の情報提供サービスを要求する場合には、情報を取得したい本を 特定する番号などの情報が、サービスに関する詳細情報に該当する。なお、以下の 説明では、このような詳細情報とサービス識別情報とを含む情報を、サービス要求情 報と称する。 On the other hand, if it is determined in S112 that the corresponding encryption key information is stored, the control unit 11 performs the second and subsequent authentication processing described below (from S141 to S143 in the mobile phone 10). Processing, intermediate Sano 40, S151 to S157, and Sano 30a, 30b, S161 to S163). In this case, the control unit 11 receives input of detailed information (other information) related to the service input via the input unit 14 (S141). Here, the detailed information about the service is, for example, the URL of the blog to be acquired when requesting a blog provision service. In addition, when requesting a book information service, information such as the number that identifies the book for which information is to be obtained corresponds to the detailed information about the service. In the following description, information including such detailed information and service identification information is referred to as service request information.

[0168] 次に制御部 11は、利用する全てのサービスのサービス識別子に対応する暗号ィ匕 認証情報を暗号記億部 15から読み出し、読み出した各サービスに関する暗号化認 証情報と、各サービスに関するサービス要求情報 (各サービスのサービス識別子およ び各サービスの詳細情報)とを、通信部 12を介して中継サーバ 40に送信する(S14 2)。表 10に、 S 142の処理で送信される情報の一例を示す。  [0168] Next, the control unit 11 reads out the encryption authentication information corresponding to the service identifiers of all the services to be used from the encryption storage unit 15, and reads out the encrypted authentication information about each read service and each service. The service request information (service identifier of each service and detailed information of each service) is transmitted to the relay server 40 via the communication unit 12 (S142). Table 10 shows an example of information transmitted in the process of S142.

[0169] [表 10]  [0169] [Table 10]

Figure imgf000031_0001
中継サーバ 40の中継サーバ制御部 41は、携帯電話 10から通信部 42を介して、 利用する全てのサービスについての暗号ィ匕認証情報およびサービス要求情報を受 信すると(S151)、復号ィ匕部 25に受信した各暗号ィ匕認証情報を復号ィ匕させる(S15 2)。 [0171] 次に、中継サーバ制御部 41は、利用する各サービスを提供するサーバの宛先をサ ーバ識別情報記憶部 45から検索して特定し、特定した各サーバに、通信部 42を介 して、復号化した認証情報とサービスに関する詳細情報とを送信する(S153)。
Figure imgf000031_0001
When the relay server control unit 41 of the relay server 40 receives the encryption key authentication information and the service request information for all the services to be used from the mobile phone 10 via the communication unit 42 (S151), the decryption key unit Each encrypted key authentication information received is decrypted in 25 (S152). [0171] Next, the relay server control unit 41 searches the server identification information storage unit 45 to identify the destination of the server that provides each service to be used, and passes the communication unit 42 to each identified server. Then, the decrypted authentication information and detailed information about the service are transmitted (S153).

[0172] つまり、ブログ提供サービスを提供するサーバであるサーバ 30aに、表 11に示す復 号ィ匕した認証情報とサービスに関する詳細情報とを送信する。  That is, the decrypted authentication information shown in Table 11 and the detailed information about the service are transmitted to the server 30a that is a server that provides the blog providing service.

[0173] [表 11]  [0173] [Table 11]

Figure imgf000032_0001
Figure imgf000032_0001

[0174] また、本の情報提供サービスを提供するサーバであるサーバ 30bに、表 12に示す 復号化した認証情報とサービスに関する詳細情報とを送信する。 [0174] Also, the decrypted authentication information and detailed information on the service shown in Table 12 are transmitted to the server 30b which is a server that provides the information providing service of the book.

[0175] [表 12] [0175] [Table 12]

Figure imgf000032_0002
サーバ 30a,30bのサーバ制御部 21は、中継サーノ 0から復号ィ匕された認証情報 とサービス要求情報とを受信すると (S161)、受信した認証情報 (復号化認証情報) の認証処理を行う(S162)。具体的には、中継サーバ 40で復号ィ匕された認証情報と 、認証情報記憶部 26に記憶されている予め設定された認証情報とを照合する。なお 、この復号ィ匕した認証情報は、初回認証処理時に認証に成功した認証情報であるの で、認証情報記憶部 26に記憶されて 、る認証情報がその後書き換えられて 、な!/ヽ 限り、必ず一致する。ここでは、そのような書き換えは行われていないものとするが、 書き換えが行われている場合には、中継サーバ 40を介して携帯電話 10に認証失敗 を通知し、初回認証処理からやり直させるようにすればよ!ヽ(図示せず)。
Figure imgf000032_0002
When the server control unit 21 of the servers 30a and 30b receives the authentication information decrypted from the relay server 0 and the service request information (S161), it performs an authentication process on the received authentication information (decrypted authentication information) ( S162). Specifically, the authentication information decrypted by the relay server 40 is compared with preset authentication information stored in the authentication information storage unit 26. Note that the decrypted authentication information is authentication information that has been successfully authenticated at the time of the initial authentication process, so that the authentication information stored in the authentication information storage unit 26 is subsequently rewritten and Always match. Here, it is assumed that such rewriting has not been performed, If the rewriting has been performed, the mobile phone 10 is notified of the authentication failure via the relay server 40, and the initial authentication process is performed again! (Not shown).

[0177] S 162の認証処理を行った後(認証成功を確認した後)、サーバ制御部 21は、中継 サーノ Oに、提供するサービス内容を送信する(S 163)。なお、図 9 (b)では、プロ グを提供するサーバ 30aから送信されるサービス内容をサービス内容 oc、本の情報 を提供するサーバ 30bから送信されるサービス内容をサービス内容 βとしている。  [0177] After performing the authentication process of S162 (after confirming the authentication success), the server control unit 21 transmits the service content to be provided to the relay Sano O (S163). In FIG. 9 (b), the service content transmitted from the server 30a that provides the program is the service content oc, and the service content transmitted from the server 30b that provides the book information is the service content β.

[0178] 中継サーノ Οの中継サーバ制御部 41は、サーバ 30a,30b力も提供されるサービ ス内容を受信すると (S94)、受信したサービス内容を各サービスのサービス識別子と 関連付けて RAM47に記憶させる(S 155)。  [0178] When the relay server control unit 41 of the relay server receives the service content that also provides the servers 30a and 30b (S94), the received service content is stored in the RAM 47 in association with the service identifier of each service ( S 155).

[0179] その後、中継サーバ制御部 41は、利用する全てのサービス識別子に対応するサ 一ビスのサービス内容を各サーノから受信した力否かを判断する(S 156)。そして、 サービス内容をまだ受信していないサービスがある場合、中継サーバ制御部 41は、 S 152以降の処理を繰り返し、全てのサービスについてサービス内容の受信を行う。  Thereafter, the relay server control unit 41 determines whether or not the service content of the service corresponding to all the service identifiers to be used has been received from each Sano (S 156). If there is a service that has not received the service content, the relay server control unit 41 repeats the processing from S 152 onward, and receives the service content for all the services.

[0180] 一方、利用する全てのサービスについてのサービス内容を受信したと判断した場合 、中継サーバ制御部 41は、 S 155において RAM47に記憶させた各サービスのサー ビス内容を読み出し、読み出した各サービスのサービス内容を一まとめにして携帯電 話 10に送信する(S 157)。なお、各サービスのサービス内容は、各サービスのサー ビス識別子と関連付けられた状態で携帯電話 10に送信される。  [0180] On the other hand, when it is determined that the service contents for all the services to be used have been received, the relay server control unit 41 reads the service contents of each service stored in the RAM 47 in S155 and reads each service that has been read. The service contents are collectively sent to the mobile phone 10 (S157). The service content of each service is transmitted to the mobile phone 10 in a state associated with the service identifier of each service.

[0181] 携帯電話 10の制御部 11は、中継サーバ 40からサービス内容を受信すると(S 143 )、受信したサービス内容を RAM17に記憶させたり表示部 13に表示させるなどして 必要な処理を行う。これにより、 2回目以降の認証処理およびサービスの受信処理が 終了する。  [0181] Upon receiving the service content from the relay server 40 (S143), the control unit 11 of the mobile phone 10 performs the necessary processing by storing the received service content in the RAM 17 or displaying it on the display unit 13 or the like. . This completes the second and subsequent authentication processing and service reception processing.

[0182] 以上のように、本実施形態に力かるサービス提供システム 2aでは、携帯電話 10 (サ 一ビス利用装置)力も複数のサーバ 30a,30b (サービス提供装置)に対してサービス の提供を要求する場合に、各サーバ 30a, 30bに送信する認証情報を一まとめにし て携帯電話 10から中継サーバ 40 (サービス中継装置)に送信し、中継サーバ 40が 受信したそれらの認証情報をサーバ毎に振り分けて送信するようになっている。  [0182] As described above, in the service providing system 2a that is effective in the present embodiment, the mobile phone 10 (service using device) also requires the provision of services to the plurality of servers 30a, 30b (service providing devices). Authentication information to be sent to each server 30a, 30b is collectively sent from the mobile phone 10 to the relay server 40 (service relay device), and the authentication information received by the relay server 40 is distributed to each server. To send.

[0183] したがって、ユーザは、複数のサービスを利用したい場合 (初回認証時)に、各サー ヽての認証情報を一括して入力し、入力した各サービスの認証情報を一ま とめにして中継サーバ 40に送信することで、所望する複数のサービスの提供を受け ることができる。これにより、各サービスの初回認証時におけるユーザの利便性がさら に向上する。 [0183] Therefore, when a user wants to use multiple services (at the time of initial authentication), each service By inputting all the authentication information in a lump and sending the input authentication information for each service together to the relay server 40, it is possible to receive provision of a plurality of desired services. This further improves the convenience of the user at the first authentication of each service.

[0184] なお、複数のサービスにつ 、ての認証情報(例えばユーザ IDやパスワード)は、複 数のサービスにつ 、て共通に設定されてもよぐあるいはサービス毎に異なるように 設定されていもよい。  [0184] Note that authentication information (for example, user ID and password) for multiple services may be set in common for multiple services or set differently for each service. Also good.

[0185] また、サービス提供システム 2aでは、複数のサーバ 30a, 30b力も提供されるサー ビス内容が、中継サーノ 0によって一まとめにされて携帯電話 10に送信される。こ れにより、ユーザは、複数のサーバの提供するサービスを同時に利用したり、あるい はそれらを組み合わせて利用することもできる。  [0185] In the service providing system 2a, service contents that are also provided with a plurality of servers 30a and 30b are collected together by the relay server 0 and transmitted to the mobile phone 10. As a result, the user can use the services provided by multiple servers at the same time, or use them in combination.

[0186] また、中継サーノ 0は、通信可能に接続される 1つ以上のサーバについて、各サ ーバが提供するサービスを特定する情報 (サービス識別子)と各サーバの宛先とを関 連付けて記憶するサーバ識別情報記憶部 45を備えている。これにより、携帯電話 10 力も中継サーノ 0にサービス識別子を送信することで、中継サーバ 40においてそ のサービス識別子に対応するサービスを提供するサーバの宛先を検索できる。つま り、携帯電話 10では、初回認証に成功したサービスについての暗号ィ匕認証情報をそ のサービスのサービス識別子と関連付けて記憶しておくだけでよい。また、ユーザは 、利用するサービス (あるいはサービス識別子)を選択 (入力)するだけで、複数のサ ーバが提供する各サービスの中力 所望するサービスを容易に利用することができる  [0186] Relay Sano 0 associates information (service identifier) that identifies a service provided by each server and the destination of each server with respect to one or more servers that are communicably connected. A server identification information storage unit 45 for storage is provided. Accordingly, the mobile phone 10 can also transmit the service identifier to the relay server 0, so that the relay server 40 can search for the destination of the server that provides the service corresponding to the service identifier. In other words, the cellular phone 10 only needs to store the encryption authentication information for the service that has been successfully authenticated for the first time in association with the service identifier of the service. In addition, the user can easily use the desired service of each service provided by multiple servers simply by selecting (inputting) the service (or service identifier) to be used.

[0187] 〔実施形態 4〕 [Embodiment 4]

本発明のさらに他の実施形態について説明する。なお、説明の便宜上、実施形態 Still another embodiment of the present invention will be described. For convenience of explanation, the embodiment

1〜3で説明した各部材と同様の機能を有する部材については、実施形態 1〜3と同 じ符号を用い、その説明を省略する。 For members having the same functions as the members described in 1-3, the same reference numerals as in Embodiments 1-3 are used, and the description thereof is omitted.

[0188] 図 13は、本実施形態にカゝかるサービス提供システム laの概略構成を示す説明図 である。この図に示すように、サービス提供システム laは、携帯電話 (情報端末装置FIG. 13 is an explanatory diagram showing a schematic configuration of a service providing system la according to the present embodiment. As shown in this figure, the service providing system la is a mobile phone (information terminal device).

、サービス利用装置) 10aと、サーバ (サービス提供装置) 20aとを備えており、これら 力 Sインターネット等のネットワークを介して通信可能に接続されている。また、サービス 提供システム laでは、サービスの提供を許可するユーザの暗号ィ匕認証情報,端末 I D,サービス接続先を、サーバ 20aから放送基地局 50にインターネット等を介して送 信し、放送基地局 50から放送網を介して送信するようになっている。ここで、上記の 放送網としては、例えば、地上デジタル放送、 BSデジタル放送、モパイル放送、携 帯電話向け放送などを用いることができる。 , A service using device) 10a and a server (service providing device) 20a. Power S It is connected so that it can communicate via a network such as the Internet. In the service providing system la, the encrypted authentication information, the terminal ID, and the service connection destination of the user permitted to provide the service are transmitted from the server 20a to the broadcast base station 50 via the Internet or the like. 50 is transmitted via the broadcast network. Here, as the broadcasting network, for example, terrestrial digital broadcasting, BS digital broadcasting, mopile broadcasting, broadcasting for mobile phones, and the like can be used.

[0189] 図 14は、携帯電話 10a、サーバ 20a、放送基地局 50の概略構成を示すブロック図 である。 FIG. 14 is a block diagram showing a schematic configuration of the mobile phone 10a, the server 20a, and the broadcast base station 50. As shown in FIG.

[0190] 放送基地局 50は、制御部 51、通信部 52、送信部 53を備えている。制御部 51は、 通信部 52,送信部 53の動作を制御するものである。通信部 52は、サーバ 20aに備 えられた通信部 22との間で通信を行うものである。なお、通信部 52と通信部 22とを 通信可能に接続する通信媒体は特に限定されるものではな 、が、例えばインターネ ット等を用 、ることができる。  [0190] The broadcast base station 50 includes a control unit 51, a communication unit 52, and a transmission unit 53. The control unit 51 controls operations of the communication unit 52 and the transmission unit 53. The communication unit 52 communicates with the communication unit 22 provided in the server 20a. Note that the communication medium that connects the communication unit 52 and the communication unit 22 so as to communicate with each other is not particularly limited, but for example, the Internet can be used.

[0191] 携帯電話 10aは、図 2に示した携帯電話 10の構成に加えて、放送基地局 50から送 信される放送を受信するチューナ一部 18を備えている。また、制御部 11内に、チュ ーナ一部 18が受信した情報の中に、当該携帯電話 10aの端末 IDが含まれているか どうかを判定する端末 ID判定部 1 laが設けられて 、る。  [0191] In addition to the configuration of the mobile phone 10 shown in FIG. 2, the mobile phone 10a includes a tuner part 18 that receives a broadcast transmitted from the broadcast base station 50. Further, a terminal ID determination unit 1 la for determining whether or not the terminal ID of the mobile phone 10a is included in the information received by the tuner part 18 is provided in the control unit 11. .

[0192] サーバ 20aは、図 2に示したサーバ 20の構成に加えて、認証情報入力部 29を備え ている。この認証情報入力部 29は、サーバ 20aからのサービスの提供を許可するュ 一ザのユーザ ID,パスワードおよびサービスを提供する携帯電話 10aの端末 IDの入 力を受け付けるものである。認証情報入力部 29の構成は特に限定されるものではな ぐ例えば、キーボードやマウスポインタ、ジョグダイヤル、ペン入力装置、タツチパネ ル、音声入力などの各種入力手段を用いることができる。また、これらの入力手段は 、携帯電話 10aに備えられるものであってもよぐあるいは携帯電話 10aに対して無線 または有線によって接続されるものであってもよ 、。  [0192] The server 20a includes an authentication information input unit 29 in addition to the configuration of the server 20 shown in FIG. This authentication information input unit 29 accepts input of the user ID and password of the user who is permitted to provide the service from the server 20a and the terminal ID of the mobile phone 10a that provides the service. The configuration of the authentication information input unit 29 is not particularly limited. For example, various input means such as a keyboard, a mouse pointer, a jog dial, a pen input device, a touch panel, and a voice input can be used. These input means may be provided in the mobile phone 10a or may be connected to the mobile phone 10a by radio or wire.

[0193] 次に、サービス提供システム laにおける携帯電話 10aおよびサーバ 20aの動作に ついて説明する。図 15は、サービス提供システム laにおける初回認証処理の流れを 示すフロー図である。 [0194] まず、サーバ 20aのサーバ制御部 21は、認証情報入力部 29を介して入力される、 サービスの提供を許可する認証情報 (ユーザ ID,パスワード,端末 ID)の入力を受け 付ける(S171)。例えば、あらかじめ契約したユーザの認証情報を、サービス提供者 が認証情報入力部 29を介して入力する。 [0193] Next, operations of the mobile phone 10a and the server 20a in the service providing system la will be described. FIG. 15 is a flowchart showing the flow of the initial authentication process in the service providing system la. [0194] First, the server control unit 21 of the server 20a accepts input of authentication information (user ID, password, terminal ID) permitted to provide a service, which is input via the authentication information input unit 29 (S171). ). For example, the service provider inputs authentication information of a user who has contracted in advance through the authentication information input unit 29.

[0195] 次に、サーバ制御部 21は、 S171で入力された認証情報を暗号ィ匕部 24に暗号ィ匕 させ、暗号ィ匕認証情報を作成させる(S 172)。なお、暗号化の手法は特に限定され るものではない。  Next, the server control unit 21 causes the encryption unit 24 to encrypt the authentication information input in S171, and creates encryption authentication information (S172). The encryption method is not particularly limited.

[0196] 次に、サーバ制御部 21は、 S172の処理で作成した暗号ィ匕認証情報と S171で入 力された端末 IDとサービス接続先 (サーバ 20aと通信するためのアドレス)を、通信部 22を介して放送基地局 50に送信する(S173)。表 13は、サーバ 20aから放送基地 局 50に送信される暗号ィ匕認証情報 (ユーザ IDおよびパスワード)、端末 ID,サービ ス接続先の一例である。  [0196] Next, the server control unit 21 uses the encryption key authentication information created in the processing of S172, the terminal ID and the service connection destination (address for communicating with the server 20a) input in S171, as the communication unit. The data is transmitted to the broadcast base station 50 via 22 (S173). Table 13 shows an example of encryption authentication information (user ID and password), terminal ID, and service connection destination transmitted from the server 20a to the broadcast base station 50.

[0197] [表 13]  [0197] [Table 13]

Figure imgf000036_0001
Figure imgf000036_0001

[0198] 放送基地局 50の制御部 51は、通信部 52を介して暗号ィ匕認証情報、端末 ID、サー ビス接続先を受信すると (S181)、受信した暗号ィ匕認証情報、端末 、サービス接 続先を送信部 53から放送網に送信する(S182)。 [0198] When the control unit 51 of the broadcast base station 50 receives the encryption key authentication information, the terminal ID, and the service connection destination via the communication unit 52 (S181), the received encryption key authentication information, terminal, and service are received. The connection destination is transmitted from the transmission unit 53 to the broadcast network (S182).

[0199] 一方、携帯電話 10aの制御部 11は、放送基地局 50から送信された暗号ィ匕認証情 報、端末 、サービス接続先を受信すると (S191)、端末 ID判定部 11aによって受 信した端末 IDが自身の端末 IDであるかどうかを判断する(S192)。  [0199] On the other hand, when the control unit 11 of the mobile phone 10a receives the encryption key authentication information, the terminal, and the service connection destination transmitted from the broadcast base station 50 (S191), the control is received by the terminal ID determination unit 11a. It is determined whether the terminal ID is its own terminal ID (S192).

[0200] そして、自身の端末 IDであると判断した場合、制御部 11は、上記受信した暗号ィ匕 認証情報、端末 、サービス接続先を暗号記憶部 15に記憶させ (S 193)、処理を 終了する。  [0200] If the control unit 11 determines that the terminal ID is its own terminal ID, the control unit 11 stores the received encryption key authentication information, terminal, and service connection destination in the encryption storage unit 15 (S193). finish.

[0201] 一方、自身の端末 IDではないと判断した場合、制御部 11は、上記受信した暗号ィ匕 認証情報、端末 、サービス接続先を破棄し (S194)、処理を終了する。 [0201] On the other hand, if it is determined that the terminal ID is not its own, the control unit 11 receives the received encryption key. The authentication information, terminal, and service connection destination are discarded (S194), and the process ends.

[0202] その後、携帯電話 10aからサーバ 20aにサービスの提供を要求する場合には、図 4 に示したサービス提供システム 1の処理と同様の処理を行う。ただし、サービス提供シ ステム laでは、携帯電話 10aからサーバ 20aに送信するサービス要求情報に、端末 I Dを含めるようになって!/、る。  [0202] Thereafter, when the mobile phone 10a requests the server 20a to provide a service, the same processing as that of the service providing system 1 shown in Fig. 4 is performed. However, in the service providing system la, the terminal ID is included in the service request information transmitted from the mobile phone 10a to the server 20a! /.

[0203] 以上のように、本実施形態に力かるサービス提供システム laでは、サーバ 20aがサ 一ビスの提供を許可する認証情報を暗号ィ匕した暗号ィ匕認証情報とサービスの提供を 許可する携帯電話 10aの端末 IDとサービス接続先(自身の提供するサービスを携帯 電話 10aが要求する際の接続先)とを、放送網を介して送信する。  [0203] As described above, in the service providing system la according to the present embodiment, the server 20a permits the provision of the encrypted authentication information and the service obtained by encrypting the authentication information permitting the provision of the service. The terminal ID of the mobile phone 10a and the service connection destination (the connection destination when the mobile phone 10a requests the service provided by the mobile phone 10a) are transmitted via the broadcast network.

[0204] そして、携帯電話 10aは、暗号化認証情報と端末 IDとサービス接続先とを受信する と、受信した端末 IDが自身の端末 IDであるかどうかを判定し、自身の端末 IDである 場合にはその端末 IDとともに受信した、暗号化認証情報とサービス接続先とを暗号 記憶部 15に記憶させる。  [0204] When the mobile phone 10a receives the encrypted authentication information, the terminal ID, and the service connection destination, the mobile phone 10a determines whether the received terminal ID is its own terminal ID, and is the own terminal ID. In this case, the encryption authentication information and the service connection destination received together with the terminal ID are stored in the encryption storage unit 15.

[0205] これにより、携帯電話 10aのユーザは、サーバ 20aにサービスの提供を要求する場 合、認証情報 (ユーザ IDよおびパスワード)の入力操作を行う必要がない。すなわち 、ユーザは、携帯電話 10aを用いてサーバ 20aの提供するサービスを利用する際、 認証情報を一度も入力する必要がない。したがって、サービスを利用する際のユー ザの利便性を向上させることができる。  [0205] Thus, when the user of the mobile phone 10a requests the server 20a to provide a service, it is not necessary to input authentication information (user ID and password). That is, when using the service provided by the server 20a using the mobile phone 10a, the user does not need to input authentication information even once. Therefore, the convenience of the user when using the service can be improved.

[0206] なお、上記の説明では、サーバ 20aが放送網を介して暗号ィ匕認証情報、端末 、 サービス接続先を携帯電話 10aに送信しているが、これに限るものではなぐ例えば 、インターネット等を介して送信するようにしてもよい。この場合、サーバ 20aから携帯 電話 10aに、携帯電話 10aのアドレスを指定してデータを送信し、送信するデータに 端末 IDを含めないようにしてもよい。また、携帯電話 10aにおいて、受信したデータ に自身の端末 IDが含まれているか否かを判定する処理を省略し、受信した暗号ィ匕 認証情報およびサービス接続先を全て記憶させるようにしてもょ ヽ。  [0206] In the above description, the server 20a transmits the encryption key authentication information, the terminal, and the service connection destination to the mobile phone 10a via the broadcast network. However, the present invention is not limited to this. You may make it transmit via. In this case, data may be transmitted from the server 20a to the mobile phone 10a by designating the address of the mobile phone 10a so that the terminal ID is not included in the transmitted data. Also, in the mobile phone 10a, the process of determining whether or not the received data includes its own terminal ID may be omitted, and all received encryption key authentication information and service connection destinations may be stored.ヽ.

[0207] また、 S171の処理では、認証情報入力部 29を介してサービスの提供を許可する 認証情報 (ユーザ ID,パスワード,端末 ID)が入力されるものとしている力 これに限 るものではない。例えば、 S171の処理に代えて、携帯電話 10aのユーザ力 他のサ 一ビス利用装置 (他の携帯電話、あるいはパソコン等)を介して実施形態 1の図 3と同 様の方法で初回認証を済ませるとともに、携帯電話 10aの端末 IDを指定するようにし てもよい。あるいは、他のサービス利用装置で以前から当該サービスを利用している( 当該サービスと契約している)ユーザが、携帯電話 10aを用いて当該サービスを利用 するために携帯電話 10aの端末 IDを指定する場合にも適用できる。 [0207] In addition, in the processing of S171, the power that authentication information (user ID, password, terminal ID) permitting service provision is input via the authentication information input unit 29 is not limited to this. . For example, instead of the process of S171, the user power of the mobile phone 10a and other services The initial authentication may be completed by the same method as in FIG. 3 of the first embodiment via the one-service device (other mobile phone or personal computer), and the terminal ID of the mobile phone 10a may be designated. Alternatively, a user who has previously used the service on another service using device (contracted with the service) specifies the terminal ID of the mobile phone 10a to use the service using the mobile phone 10a. It can also be applied to

[0208] また、本実施形態では、携帯電話 10aのユーザがサービスの提供を要求するときに は、携帯電話 10aからサーバ 20aに暗号ィ匕認証情報、端末 ID、サービス要求情報を 送信するようになっている力 これに限るものではない。例えば、携帯電話 10aから図 5 (a)および図 5 (b)に示した中継サーノ Oを介してサーバ 20aに暗号ィ匕認証情報、 端末 、サービス要求情報 (あるいはサービス識別子)を送信するようにしてもょ ヽ。 つまり、図 16に示すように、図 9 (a)に示したサービス提供システム 2aにおいて、サー バ 30aに代えてサーバ 20aを備え、携帯電話 10に代えて携帯電話 10aを備えるよう にしてもよい。 [0208] In the present embodiment, when the user of the mobile phone 10a requests service provision, the mobile phone 10a transmits the encryption authentication information, the terminal ID, and the service request information to the server 20a. It is not limited to this. For example, encryption authentication information, terminal, and service request information (or service identifier) are transmitted from the mobile phone 10a to the server 20a via the relay Sano O shown in FIGS. 5 (a) and 5 (b). Moho. That is, as shown in FIG. 16, in the service providing system 2a shown in FIG. 9 (a), the server 20a may be provided instead of the server 30a, and the mobile phone 10a may be provided instead of the mobile phone 10. .

[0209] 図 16に示す構成では、図 10と同様の処理を行うことで、携帯電話 10aに暗号化認 証情報が記憶されていないサービスの初回認証を行うことができる。つまり、携帯電 話 10aのユーザは、初回認証時には、暗号ィ匕認証情報が当該携帯電話 10aに記憶 されて ヽな 、サービスに対してのみ、認証情報を入力すればょ 、。  In the configuration shown in FIG. 16, by performing the same processing as in FIG. 10, it is possible to perform the initial authentication of the service in which the encryption authentication information is not stored in the mobile phone 10a. In other words, when the user of the mobile phone 10a authenticates for the first time, he / she only has to enter the authentication information for the service if the encryption authentication information is stored in the mobile phone 10a.

[0210] また、図 16に示す構成では、携帯電話 10aに暗号ィ匕認証情報が記憶されているサ 一ビスを利用する場合には、図 11と同様の処理を行うだけで、サービスを利用するこ とができる。つまり、サーバ 20aの提供するサービスを利用する場合にも、携帯電話 1 Oaは図 10と同様の処理を行えばよい。したがって、放送網から暗号化認証情報を受 け取るサービスについては、ユーザは携帯電話 10aからサービスを利用する際に認 証情報を自分で入力しなくてもよ!、ため、複数のサービスを同時に利用する場合でも 、サービスを簡単に利用できる。  [0210] In addition, in the configuration shown in FIG. 16, when using the service in which the encryption key authentication information is stored in the mobile phone 10a, the service is used only by performing the same process as in FIG. can do. That is, even when the service provided by the server 20a is used, the cellular phone 1 Oa may perform the same process as in FIG. Therefore, for services that receive encrypted authentication information from the broadcast network, users do not have to enter authentication information themselves when using the service from the mobile phone 10a! Even if you use it, you can easily use the service.

[0211] また、認証情報の暗号ィ匕をサーバ 20aではなく中継サーノ Oで行うようにしてもよ い。図 17は、この場合のサービス提供システム laにおける初回認証処理の様子を示 す説明図である。  [0211] The encryption of the authentication information may be performed not by the server 20a but by the relay sano O. FIG. 17 is an explanatory diagram showing the state of the initial authentication process in the service providing system la in this case.

[0212] 図 17に示すように、サーノ 20aの認証情報入力部 29を介してサービスの提供を許 可する認証情報 (ユーザ ID, ノ スワード,端末 ID)が入力されると、サーバ制御部 21 力 入力された認証情報,端末 ID,サービス接続先 (あるいはサービス識別子),認 証に成功したこと (認証を許可したこと)を示す認証結果を中継サーバ 40に通知する 。そして、中継サーバ 40の中継サーバ制御部 41は、受信した認証情報を暗号化部 43〖こ暗号ィ匕させ、暗号化認証情報,端末 ID,サービス接続先 (あるいはサービス識 別子)を通信部 42からインターネット等を介して放送基地局 50に送信させる。そして 、放送基地局 50は、受信した暗号化認証情報,端末 ID,サービス接続先 (あるいは サービス識別子)を、放送網を用いて送信する。なお、中継サーノ 0の中継サーバ 制御部 41は、暗号化認証情報,端末 ID,サービス接続先 (あるいはサービス識別子 )を、放送網を介して携帯電話 10aに送信するのではなぐ通信部 42からインターネ ット等を介して携帯電話 10aに直接送信するようにしてもょ ヽ。 [0212] As shown in Fig. 17, it is permitted to provide the service via the authentication information input unit 29 of the Sano 20a. When valid authentication information (user ID, password, terminal ID) is input, the server control unit 21 input authentication information, terminal ID, service connection destination (or service identifier), and successful authentication ( The relay server 40 is notified of the authentication result indicating that the authentication is permitted. Then, the relay server control unit 41 of the relay server 40 causes the received authentication information to be encrypted, and the encrypted authentication information, terminal ID, and service connection destination (or service identifier) are transmitted to the communication unit. 42 is transmitted to the broadcast base station 50 via the Internet or the like. Then, the broadcast base station 50 transmits the received encrypted authentication information, terminal ID, and service connection destination (or service identifier) using the broadcast network. The relay server control unit 41 of the relay Sano 0 transmits the encrypted authentication information, the terminal ID, and the service connection destination (or service identifier) from the communication unit 42 that does not transmit to the mobile phone 10a via the broadcast network. Send directly to the mobile phone 10a via a mobile phone.

[0213] この場合にも、放送網から暗号ィ匕認証情報を受け取るサービスについては、ユー ザは携帯電話 10aからサービスを利用する際に認証情報を自分で入力しなくてもよ いため、複数のサービスを同時に利用する場合でも、サービスを簡単に利用できる。  [0213] In this case as well, for services that receive encryption authentication information from the broadcast network, the user does not have to input authentication information when using the service from the mobile phone 10a. Even if you use the service at the same time, you can easily use the service.

[0214] 〔実施形態 5〕  [Embodiment 5]

本発明のさらに他の実施形態について説明する。なお、説明の便宜上、実施形態 1〜4で説明した各部材と同様の機能を有する部材については、実施形態 1〜4と同 じ符号を用い、その説明を省略する。  Still another embodiment of the present invention will be described. For convenience of explanation, members having the same functions as those described in the first to fourth embodiments are denoted by the same reference numerals as those in the first to fourth embodiments, and the description thereof is omitted.

[0215] 図 18は、本実施形態にカゝかるサービス提供システム 2bの概略構成を示す説明図 である。この図に示すように、サービス提供システム 2bは、携帯電話 (情報端末装置 、サービス利用装置) 10aと、サーノ (サービス提供装置) 30a, 30bと、中継サーバ 4 Oaとを備えており、これら力インターネット等のネットワークを介して通信可能に接続さ れている。また、サービス提供システム 2bでは、サービスの提供を許可されているュ 一ザの暗号化認証情報,端末 ID,サービス接続先を、中継サーバ 40aから放送基 地局 50にインターネット等を介して送信し、放送基地局 50から放送網を介して送信 するようになっている。  [0215] FIG. 18 is an explanatory diagram showing a schematic configuration of a service providing system 2b according to the present embodiment. As shown in this figure, the service providing system 2b includes a mobile phone (information terminal device, service using device) 10a, Sano (service providing devices) 30a and 30b, and a relay server 4 Oa. It is connected to be able to communicate via a network such as the Internet. In the service providing system 2b, the encrypted authentication information, the terminal ID, and the service connection destination of the user permitted to provide the service are transmitted from the relay server 40a to the broadcasting base station 50 via the Internet or the like. The broadcast base station 50 transmits the data via the broadcast network.

[0216] 図 19は、携帯電話 10a、中継サーバ 40a、サーバ 30a, 30b、放送基地局 50の概 略構成を示すブロック図である。この図に示すように、中継サーノ Oaは、図 6に示し た中継サーバ 40の構成に加えて、認証情報入力部 48を備えている。 FIG. 19 is a block diagram showing a schematic configuration of the mobile phone 10a, the relay server 40a, the servers 30a and 30b, and the broadcast base station 50. As shown in this figure, the relay Sano Oa is shown in Figure 6. In addition to the configuration of the relay server 40, an authentication information input unit 48 is provided.

[0217] 認証情報入力部 48は、初回認証処理を行うユーザのユーザ ID,パスワードおよび サービスを提供する携帯電話 10aの端末 IDの入力を受け付けるものである。認証情 報入力 48の構成は特に限定されるものではなぐ例えば、キーボードやマウスポイン タ、ジョグダイヤル、ペン入力装置、タツチパネル、音声入力などの各種入力手段を 用いることができる。また、これらの入力手段は、携帯電話 10aに備えられるものであ つてもよく、ある 、は携帯電話 10aに対して無線または有線によって接続されるもの であってもよい。 [0217] The authentication information input unit 48 accepts input of the user ID, password, and terminal ID of the mobile phone 10a that provides the service for the user who performs the initial authentication process. The configuration of the authentication information input 48 is not particularly limited. For example, various input means such as a keyboard, a mouse pointer, a jog dial, a pen input device, a touch panel, and a voice input can be used. These input means may be provided in the mobile phone 10a, or may be connected to the mobile phone 10a by radio or wire.

[0218] 次に、サービス提供システム 2bにおける初回認証時の動作について説明する。図 20は、サービス提供システム 2bにおける初回認証処理の流れを示すフロー図である  Next, the operation at the time of initial authentication in the service providing system 2b will be described. FIG. 20 is a flowchart showing the flow of the initial authentication process in the service providing system 2b.

[0219] まず、中継サーバ 40aの中継サーバ制御部 41は、認証情報入力部 48を介して入 力される初回認証情報 (ユーザ ID, ノ スワード,端末 ID) ,サービス接続先の入力を 受け付ける(S201)。 [0219] First, the relay server control unit 41 of the relay server 40a accepts initial authentication information (user ID, password, terminal ID) and service connection destination input via the authentication information input unit 48 ( S201).

[0220] 次に、中継サーバ制御部 41は、 S211で入力された初回認証情報を、サービス接 続先のサーバ (ここではサーバ 30a)に送信する(S202)。また、中継サーバ制御部 4 1は、この認証情報およびサービス接続先を RAM47に記憶させる。  [0220] Next, the relay server control unit 41 transmits the initial authentication information input in S211 to the service connection destination server (in this case, the server 30a) (S202). Also, the relay server control unit 41 stores the authentication information and the service connection destination in the RAM 47.

[0221] サーバ 30aのサーバ制御部 31は、サーバ中継サーノ Oaから送信された認証情 報を受信すると (S211)、受信した認証情報の認証処理を認証処理部 23に行わせ る(S212)。そして、サーバ制御部 31は、認証結果を、通信部 22を介して中継サー バ 40aに送信する(S213)。  [0221] Upon receiving the authentication information transmitted from the server relay server Oa (S211), the server control unit 31 of the server 30a causes the authentication processing unit 23 to perform authentication processing of the received authentication information (S212). Then, the server control unit 31 transmits the authentication result to the relay server 40a via the communication unit 22 (S213).

[0222] 中継サーバ 40aの中継サーバ制御部 41は、サーバ 30aからの認証処置結果の通 知を受信すると(S203)、サーバ 30aにおける認証処理が成功したか否かを判断す る(S204)。そして、認証処理が失敗であつたと判断した場合、中継サーバ制御部 4 1は、初回認証情報,サービス接続先の再入力を待機する。なお、中継サーバ 40a に表示手段や音声出力手段などを設け、認証に失敗した旨を、認証情報入力部 48 を介して初回認証情報を入力した入力者に通知するようにしてもよい。  [0222] When receiving the notification of the authentication processing result from the server 30a (S203), the relay server control unit 41 of the relay server 40a determines whether the authentication process in the server 30a is successful (S204). If it is determined that the authentication process has failed, the relay server control unit 41 waits for re-input of the initial authentication information and the service connection destination. The relay server 40a may be provided with a display means, a voice output means, etc. so that the input person who has entered the initial authentication information is notified via the authentication information input section 48 that the authentication has failed.

[0223] 一方、 S204において、認証に成功したと判断した場合、中継サーバ制御部 41は、 RAM47に記憶させてぉ 、た初回認証情報を読み出し、その初回認証情報に含ま れるユーザ IDおよびパスワードを暗号ィ匕部 43に暗号ィ匕させ、暗号化認証情報を作 成させる(S205)。 On the other hand, if it is determined in S204 that the authentication is successful, the relay server control unit 41 The first authentication information stored in the RAM 47 is read out, and the user ID and password included in the initial authentication information are encrypted in the encryption unit 43 to generate encrypted authentication information (S205).

[0224] 次に、中継サーバ制御部 41は、 S205の処理で作成した暗号ィ匕認証情報,端末 I [0224] Next, the relay server control unit 41 uses the encryption key authentication information, terminal I, created in the process of S205.

D,サービス接続先を、通信部 42を介して放送基地局 50に送信する(S206)。 D, The service connection destination is transmitted to the broadcast base station 50 via the communication unit 42 (S206).

[0225] 放送基地局 50の制御部 51は、通信部 52を介して暗号ィ匕認証情報、端末 ID、サー ビス接続先を受信すると (S221)、受信した暗号ィ匕認証情報、端末 、サービス接 続先を送信部 53から放送網に送信する(S222)。 [0225] Upon receiving the encryption key authentication information, the terminal ID, and the service connection destination via the communication unit 52 (S221), the control unit 51 of the broadcast base station 50 receives the received encryption key authentication information, the terminal, and the service. The connection destination is transmitted from the transmission unit 53 to the broadcast network (S222).

[0226] 携帯電話 10aの制御部 11は、放送基地局 50から送信された暗号ィ匕認証情報、端 末 ID、サービス接続先を受信すると(S231)、端末 ID判定部 11aによって受信した 端末 IDが自身の端末 IDであるかどうかを判断する(S232)。 [0226] When the control unit 11 of the mobile phone 10a receives the encryption authentication information, the terminal ID, and the service connection destination transmitted from the broadcast base station 50 (S231), the terminal ID received by the terminal ID determination unit 11a is received. It is determined whether or not is its own terminal ID (S232).

[0227] そして、自身の端末 IDであると判断した場合、制御部 11は、上記受信した暗号ィ匕 認証情報、端末 、サービス接続先を暗号記憶部 15に記憶させ (S233)、処理を 終了する。 If it is determined that the terminal ID is its own terminal ID, the control unit 11 stores the received encryption key authentication information, terminal, and service connection destination in the encryption storage unit 15 (S233), and ends the process. To do.

[0228] 一方、自身の端末 IDではないと判断した場合、制御部 11は、上記受信した暗号ィ匕 認証情報、端末 、サービス接続先を破棄し (S234)、処理を終了する。  On the other hand, when determining that it is not its own terminal ID, the control unit 11 discards the received encryption authentication information, terminal, and service connection destination (S234), and ends the process.

[0229] その後、携帯電話 10aからサーバ 30aにサービスの提供を要求する場合には、図 8 に示したサービス提供システム 2の処理あるいは図 11に示したサービス提供システム 2aの処理と同様の処理を行う。ただし、サービス提供システム 2bでは、携帯電話 10a 力もサーノ 30aに送信するサービス要求情報に、端末 IDを含めるようになつている。  [0229] After that, when the mobile phone 10a requests the server 30a to provide a service, the service providing system 2 shown in FIG. 8 or the same processing as the service providing system 2a shown in FIG. Do. However, in the service providing system 2b, the mobile phone 10a power is also included in the service request information transmitted to the Sano 30a.

[0230] 以上のように、本実施形態に力かるサービス提供システム 2bでは、中継サーノ Oa が初回認証情報の入力を受け付ける認証情報入力部 48を備えており、あるサービス についての初回認証情報が入力されると、そのサービスを提供するサーバ 30aに対 して初回認証情報を送信する。そして、初回認証に成功したことを示す認証結果を 受信すると、中継サーバ 40aは、その初回認証情報 (ユーザ ID,パスワード)を暗号 化部 43に暗号化させて暗号ィ匕認証情報を作成させる。そして、この暗号化認証情報 を放送基地局 50に送信し、放送基地局 50から放送網を介して携帯電話 10aに送信 させる。 [0231] これにより、携帯電話 10aのユーザは、サーバ 30aにサービスの提供を要求する場 合、携帯電話 10aを用いて認証情報 (ユーザ IDよおびパスワード)の入力操作を行う 必要がない。すなわち、ユーザは、携帯電話 10aを用いてサーバ 20aの提供するサ 一ビスを利用する際、認証情報を一度も入力する必要がない。したがって、サービス を利用する際のユーザの利便性を向上させることができる。 [0230] As described above, in the service providing system 2b according to the present embodiment, the relay Sano Oa includes the authentication information input unit 48 that receives the input of the initial authentication information, and the initial authentication information for a certain service is input. Then, the initial authentication information is transmitted to the server 30a that provides the service. Then, when receiving the authentication result indicating that the initial authentication is successful, the relay server 40a causes the encryption unit 43 to encrypt the initial authentication information (user ID, password) and create encryption key authentication information. Then, the encrypted authentication information is transmitted to the broadcast base station 50, and transmitted from the broadcast base station 50 to the mobile phone 10a via the broadcast network. [0231] Thus, when the user of the mobile phone 10a requests the server 30a to provide a service, the mobile phone 10a does not need to input authentication information (user ID and password) using the mobile phone 10a. That is, when using the service provided by the server 20a using the mobile phone 10a, the user does not need to input authentication information even once. Therefore, the convenience of the user when using the service can be improved.

[0232] なお、上記の説明では、中継サーバ 40aが放送網を介して暗号ィ匕認証情報、端末 I D、サービス接続先を携帯電話 10aに送信しているが、これに限るものではなぐ例え ば、インターネット等を介して送信するようにしてもよい。この場合、中継サーノ Oaか ら携帯電話 10aに、携帯電話 10aのアドレスを指定してデータを送信し、送信するデ ータに端末 IDを含めないようにしてもよい。また、この場合、携帯電話 10aにおいて、 受信したデータに自身の端末 IDが含まれて ヽるか否かを判定する処理を省略し、受 信した暗号ィ匕認証情報およびサービス接続先を全て記憶させるようにしてもよ ヽ。  [0232] In the above description, the relay server 40a transmits the encryption authentication information, the terminal ID, and the service connection destination to the mobile phone 10a via the broadcast network. However, the present invention is not limited to this. Alternatively, it may be transmitted via the Internet or the like. In this case, data may be transmitted from the relay Sano Oa to the mobile phone 10a by specifying the address of the mobile phone 10a, and the terminal ID may not be included in the transmitted data. Also, in this case, the mobile phone 10a omits the process of determining whether or not the received data includes its own terminal ID, and stores all received encrypted authentication information and service connection destinations. You can let it happen.

[0233] また、 S201の処理では、認証情報入力部 48を介してサービスの提供を許可する 認証情報 (ユーザ ID,ノ スワード,端末 ID)およびサービス接続先が入力されるもの としている力 これに限るものではない。例えば、 S201の処理に代えて、携帯電話 1 Oaのユーザが、他のサービス利用装置 (他の携帯電話あるいはパソコン等)を介して 図 7あるいは図 11と同様の方法で初回認証を済ませるとともに、携帯電話 10aの端 末 IDを指定するようにしてもよい。あるいは、他のサービス利用装置 (携帯電話,パソ コン等)で以前から当該サービスを利用している(当該サービスと契約している)ユー ザが、携帯電話 10aを用いて当該サービスを利用するために携帯電話 10aの端末 I Dを指定する場合にも適用できる。  [0233] Also, in the process of S201, the authentication information (user ID, password, terminal ID) and service connection destination permitting the provision of the service via the authentication information input unit 48 are input. It is not limited. For example, instead of the processing of S201, the user of the mobile phone 1 Oa completes the initial authentication in the same manner as in FIG. 7 or FIG. 11 through another service using device (other mobile phone or personal computer), The terminal ID of the mobile phone 10a may be specified. Alternatively, a user who has previously used the service (contracted with the service) on another service use device (mobile phone, PC, etc.) to use the service using the mobile phone 10a. It can also be applied when the mobile phone 10a terminal ID is specified for.

[0234] また、上記各実施形態における携帯電話 10, 10aの制御部 11、サーバ 20,20a, 3 0,30a,30bのサーノ制御部 21、中継サーバ 40, 40aの中継サーバ制御部 41、サー バ 20, 20aの暗号化部 24,復号化部 25、中継サーバ 40, 40aの暗号化部 43,復号 化部 44は、 CPUなどの演算手段が、 ROMや RAMなどの記録媒体に格納されたプ ログラムコードを実行することで実現される機能ブロックである。したがって、本発明の 目的は、上述した各部材の機能を実現するソフトウェアであるプログラムのプログラム コード(実行形式プログラム、中間コードプログラム、ソースプログラム)をコンピュータ 読み取り可能に記録した記録媒体を、システムあるいは装置に供給し、そのシステム あるいは装置に備えられるコンピュータ (または CPU)が記録媒体に記録されている プログラムコードを読み出し実行することによって、達成することができる。 [0234] In addition, the control unit 11 of the mobile phones 10, 10a, the Sano control unit 21 of the servers 20, 20a, 30, 30a, 30b, the relay server control unit 41 of the relay servers 40, 40a, the server, The encryption unit 24, the decryption unit 25 of the servers 20, 20a, the encryption unit 43 of the relay servers 40, 40a, and the decryption unit 44 are stored in a recording medium such as a ROM or a RAM, with arithmetic means such as a CPU. This is a functional block realized by executing the program code. Therefore, an object of the present invention is to provide a program code (execution format program, intermediate code program, source program) of a program which is software for realizing the functions of the above-described members. This can be achieved by supplying a readable recording medium to a system or apparatus and reading and executing the program code recorded on the recording medium by a computer (or CPU) provided in the system or apparatus. .

[0235] 一方で、これらの部材は、上記ソフトウェアと同様の処理を行うハードウェアとして実 現してもよい。この場合、本発明の目的は、ハードウェアである携帯電話 10, 10aの ff¾¾]§ l l、サーノ 20,20a,30,30a,30bのサーノ ffiU¾]§ 21、中 ϋサーノ 40, 40a の中継サーバ制御部 41、サーバ 20, 20aの暗号化部 24,復号化部 25、中継サーバ 40, 40aの暗号ィ匕部 43,復号ィ匕部 44などによって達成されることになる。また、これら の部材は、処理の一部を行うハードウェアと、当該ハードウェアの制御や当該ハード ウェアが行う処理以外の処理を行うプログラムコードを実行する演算手段とを組み合 わせた構成としても実現できる。さらに、上記各部材のうち、ハードウ アとして説明し た部材であっても、処理の一部を行うハードウェアと、当該ハードウェアの制御や当 該ハードウェアが行う処理以外の処理を行うプログラムコードを実行する演算手段と を組み合わせた構成としても実現できる。  On the other hand, these members may be realized as hardware that performs the same processing as the above-described software. In this case, the object of the present invention is to provide the ff¾¾] §ll of the mobile phone 10, 10a as hardware, the Sano ffiU¾] §21 of the Sano 20,20a, 30,30a, 30b, and the relay server of the intermediate Sano 40, 40a. This is achieved by the control unit 41, the encryption unit 24 of the servers 20 and 20a, the decryption unit 25, the encryption unit 43 and the decryption unit 44 of the relay servers 40 and 40a. In addition, these members may be configured by combining hardware that performs a part of the processing and arithmetic means that executes program code for performing processing other than the control of the hardware and the processing performed by the hardware. realizable. Furthermore, even among the above-described members, even those described as hardware, hardware that performs part of the processing, and program code that performs processing other than control of the hardware and processing performed by the hardware It can also be realized as a configuration that combines with a calculation means for executing.

[0236] なお、上記演算手段は、単体構成であっても良いし、装置内部のバスや各種の通 信路を介して接続された複数の演算手段が協同してプログラムコードを実行する構 成であっても良い。  [0236] The arithmetic means may have a single configuration, or a configuration in which a plurality of arithmetic means connected via a bus or various communication paths in the apparatus cooperate to execute program code. It may be.

[0237] したがって、本発明に力かる携帯電話 10, 10aの制御部 11、サーバ 20,20a,30,3 0a,30bのサーノ制御部 21、中継サーバ 40, 40aの中継サーバ制御部 41、サーバ 20, 20aの暗号化部 24,復号化部 25、中継サーバ 40, 40aの暗号化部 43,復号化 部 44は、サービス提供システム内の任意の場所に備えられることができる。  Therefore, the mobile phone 10, 10a control unit 11, the server 20, 20a, 30, 30a, 30b Sano control unit 21, the relay server 40, 40a relay server control unit 41, server The encryption unit 24 and the decryption unit 25 of 20, 20a, and the encryption unit 43 and the decryption unit 44 of the relay servers 40 and 40a can be provided in any place in the service providing system.

[0238] また、上記演算手段によって直接的に実行可能なプログラムコード自体、または、 後述する解凍などの処理によってプログラムコードを生成可能なデータとしてのプロ グラムは、当該プログラム (プログラムまたは上記データ)を記録媒体に格納し、当該 記録媒体を配布したり、あるいは、上記プログラムを、有線または無線の通信路を介 して伝送するための通信手段によって送信したりして配布され、上記演算手段で実 行されるものとする。  [0238] In addition, the program code itself that can be directly executed by the arithmetic means, or a program as data that can generate a program code by a process such as decompression to be described later, is the program (the program or the data). It is stored in a recording medium and distributed, or the program is distributed by being transmitted by a communication means for transmission via a wired or wireless communication path, and is executed by the arithmetic means. Shall be executed.

[0239] なお、通信路を介して伝送する場合、通信路を構成する各種の伝送媒体が、プロ グラムを示す信号列を伝搬し合うことによって、当該通信路を介して、上記プログラム が伝送される。また、上記信号列を伝送する際、送信装置が、プログラムを示す信号 列により搬送波を変調することによって、上記信号列を搬送波に重畳してもよい。こ の場合、受信装置が搬送波を復調することによって、信号列が復元される。一方、上 記信号列を伝送する際、送信装置が、デジタルデータ列としての信号列をパケット分 割してもよい。この場合、受信装置は、受信したパケット群を連結して、上記信号列を 復元する。また、送信装置が、信号列を送信する際、時分割 Z周波数分割 Z符号分 割などの方法で、信号列を他の信号列と多重化して伝送しても良い。この場合、受信 装置は、多重化された信号列から、ここの信号列を抽出して復元する。いずれの場 合であっても、通信路を介してプログラムを伝送できれば、同様の効果を得られる。 [0239] Note that in the case of transmission via a communication path, various transmission media constituting the communication path may be The program is transmitted through the communication path by propagating a signal sequence indicating a gram. When transmitting the signal sequence, the transmission device may superimpose the signal sequence on the carrier by modulating the carrier with a signal sequence indicating a program. In this case, the signal sequence is restored by the receiving device demodulating the carrier wave. On the other hand, when transmitting the signal sequence, the transmission device may divide the signal sequence as a digital data sequence into packets. In this case, the receiving apparatus concatenates the received packet groups and restores the signal sequence. In addition, when transmitting a signal sequence, the transmission device may multiplex and transmit the signal sequence with another signal sequence by a method such as time division Z frequency division Z code division. In this case, the receiving apparatus extracts and restores the signal sequence from the multiplexed signal sequence. In either case, the same effect can be obtained if the program can be transmitted via the communication channel.

[0240] ここで、上記プログラムを配布する際の記録媒体は、取り外し可能であることが好ま しいが、プログラムを配布した後の記録媒体は、取り外し可能である力否かを問わな い。また、上記記録媒体は、上記プログラムが記録されている媒体であれば良ぐ書 き換え (書き込み)可能力否か、あるいは揮発性か否かは問われず、また、記録方法 および形状も問われない。このような記録媒体を例示すると、磁気テープやカセットテ ープなどのテープ、フロッピー(登録商標)ディスクやハードディスクなどの磁気デイス ク、 CD— ROMや光磁気ディスク(MO)、ミニディスク(MD)、デジタルビデオデイス ク(DVDなどのディスクなどである。また、上記記録媒体は、 ICカードや光カードのよ うなカード、あるいは、マスク ROMや EPROM、 EEPROMまたはフラッシュ ROMな どの半導体メモリーであってもよい。あるいは、 CPUなどの演算手段内に形成される メモリーであってもよい。  [0240] Here, it is preferable that the recording medium for distributing the program is removable, but it does not matter whether the recording medium after distributing the program is removable. In addition, the recording medium may be any rewritable (writeable) power or volatile as long as the program is recorded, and the recording method and shape are also questioned. Absent. Examples of such recording media include tapes such as magnetic tape and cassette tape, magnetic disks such as floppy (registered trademark) disks and hard disks, CD-ROMs, magneto-optical disks (MO), mini-discs (MD), Digital video disks (DVDs and other discs. The recording medium may be a card such as an IC card or optical card, or a semiconductor memory such as a mask ROM, EPROM, EEPROM, or flash ROM. Alternatively, it may be a memory formed in a calculation means such as a CPU.

[0241] なお、上記プログラムコードは、上記各部材の全処理を上記演算手段へ指示する コードであってもよいし、所定の手順で呼び出すことで、上記各部材の処理の一部ま たは全部を実行可能な基本プログラム (例えば、オペレーティングシステムやライブラ リなど)がすでに存在していれば、当該基本プログラムの呼び出しを、上記演算装置 へ指示するコードやポインタなどで、上記全処理の一部または全部を置き換えてもよ い。  [0241] The program code may be a code for instructing the arithmetic means of all the processes of the respective members, or may be a part of the processes of the respective members by calling in a predetermined procedure. If a basic program (for example, operating system or library) that can execute all of the program already exists, the basic program can be called by a code or pointer that instructs the arithmetic unit. Or you can replace everything.

[0242] また、上記記録媒体にプログラムを格納する際の形式は、例えば、実メモリーに配 置した状態のように、演算手段がアクセスして実行可能な格納形式であってもよ 、し 、実メモリーに配置する前で、演算手段が常時アクセス可能なローカルな記録媒体( 例えば、実メモリゃノヽードディスクなど)にインストールした後の格納形式、あるいは、 ネットワークや搬送可能な記録媒体などから、上記ローカルな記録媒体にインスト一 ルする前の格納形式であってもよ 、。 [0242] The format for storing the program in the recording medium is, for example, allocated to the real memory. It may be stored in a storage format that can be accessed and executed by the computing means as in the state of being installed, or a local recording medium (for example, real memory) that is always accessible by the computing means before being placed in the real memory. The storage format after installation on the Nyanode disk, etc., or the storage format prior to installation on the local recording medium from a network or a transportable recording medium.

[0243] また、プログラムは、コンパイルされた後のオブジェクトコードに限る物ではなぐソー スコードや、インタプリトまたはコンパイルの途中で生成される中間コードとして、上記 記録媒体に格納されていてもよい。いずれの場合であっても、圧縮された情報の解 凍、符号化された情報の復元、インタプリト、コンパイル、リンク、または、実メモリーへ の配置などの処理、あるいは、これらの処理の組み合わせによって、上記中間コード を上記演算手段が実行可能な形式に変換可能であれば、プログラムを記録媒体に 格納する際の形式にかかわらず、同様の効果を得ることができる。  [0243] Furthermore, the program may be stored in the recording medium as source code that is not limited to the object code after being compiled, or as intermediate code that is generated during the interpretation or compilation. In any case, by decompressing the compressed information, decompressing the encoded information, interpreting, compiling, linking, or placing in real memory, or a combination of these, If the intermediate code can be converted into a format that can be executed by the arithmetic means, the same effect can be obtained regardless of the format in which the program is stored in the recording medium.

[0244] また、上記各実施形態では、サービス利用装置として携帯電話 10を用いる場合に ついて説明したが、これに限るものではない。例えば、サービス利用装置として、携 帯電話のほか、 PHS (Personal Handyphone System;登録商標)、 PDA (personal dig ital assistants)、パソコン、ワードプロセッサ、テレビ放送受信機などを用いる構成に 適用することちできる。 [0244] Also, although cases have been described with the above embodiments where the mobile phone 10 is used as a service utilization device, the present invention is not limited to this. For example, it can be applied to a configuration using a mobile phone, PHS (Personal Handyphone System; registered trademark), PDA (personal digital assistants), personal computer, word processor, TV broadcast receiver, etc. as a service using device.

[0245] 本発明の第 1のサービス提供システムは、上記の課題を解決するために、サービス 利用装置と、ネットワークを介して接続されるサービス利用装置力 の要求に応じて 所定のサービスを提供するサービス提供装置とを含んでなるサービス提供システム であって、上記サービス利用装置は、要求するサービスを特定するためのユーザか らの入力指示を受け付ける入力部と、受信した暗号化認証情報を記憶する暗号記憶 部と、上記要求するサービスに対応する暗号ィヒ認証情報を上記要求するサービスを 提供するサービス提供装置に送信する利用装置制御部と、を備え、上記サービス提 供装置は、サービスの提供を許可するユーザの認証情報を記憶する認証情報記憶 部と、サービスの提供を要求してきたユーザの認証情報を、上記認証情報記憶部に 記憶したサービスの提供を許可するユーザの認証情報と照合する認証処理を行う認 証処理部と、暗号化認証情報を復号化して復号化認証情報を作成する復号化部と、 サービス利用装置から暗号化認証情報を受信した場合に、受信した暗号化認証情 報を上記復号ィ匕部に復号化させ、その復号ィ匕によって得られる復号ィ匕認証情報の 認証処理を上記認証処理部に行わせる提供装置制御部と、を備えていることを特徴 としている。 [0245] In order to solve the above-mentioned problem, the first service providing system of the present invention provides a predetermined service in response to a request for a service using device and a service using device connected via a network. A service providing system including a service providing device, wherein the service using device stores an input unit that receives an input instruction from a user for specifying a requested service and the received encrypted authentication information An encryption storage unit, and a utilization device control unit that transmits encrypted authentication information corresponding to the requested service to the service providing device that provides the requested service, wherein the service providing device provides the service The authentication information storage unit for storing the authentication information of the user who permits the authentication and the authentication information of the user who has requested the provision of the service are And authentication processing unit for performing an authentication process for collating the authentication information of users are allowed to provide the service stored in the storage unit, a decoding unit for creating a decrypted authentication information by decrypting the encrypted authentication information, When the encrypted authentication information is received from the service using device, the received encrypted authentication information is decrypted by the decryption key unit, and the authentication processing of the decryption key authentication information obtained by the decryption key is performed. And a providing device control unit to be executed by the processing unit.

[0246] 上記の構成によれば、利用装置制御部は、サービスの提供を要求する場合、暗号 化認証情報をサービス提供装置に送信する。そして、サービス提供装置は、受信し た暗号化認証情報を復号化して認証処理を行う。このため、ユーザは、要求するサ 一ビスに対応する認証情報を入力する操作を、従来のようにサービスを要求する毎 に行う必要がないので、認証処理に関する利便性を向上させることができる。  [0246] According to the configuration described above, the utilization device control unit transmits the encrypted authentication information to the service providing device when requesting the provision of the service. The service providing apparatus decrypts the received encrypted authentication information and performs authentication processing. For this reason, the user does not need to perform an operation of inputting authentication information corresponding to the requested service every time a service is requested as in the prior art, so that the convenience of authentication processing can be improved.

[0247] また、上記の構成によれば、サービス利用装置には、暗号ィ匕された認証情報が記 憶される。このため、例えばサービス利用装置の記憶領域が解析されたとしても、サ 一ビスに関する認証情報が盗まれることがない。したがって、認証情報に関するセキ ユリティ (安全性)を高めることができる。  [0247] Also, according to the above configuration, encrypted authentication information is stored in the service using device. For this reason, even if the storage area of the service using device is analyzed, for example, the authentication information related to the service is not stolen. Therefore, the security (security) regarding authentication information can be improved.

[0248] また、上記利用装置制御部は、上記要求するサービスに対応する暗号化認証情報 が上記暗号記憶部に記憶されて!ヽるカゝ否かを判断し、上記要求するサービスに対応 する暗号化認証情報が上記暗号記憶部に記憶されて!ヽな 、場合には、上記入力部 を介してユーザ力 入力される上記要求するサービスに関する認証情報を初回認証 情報として当該サービスを提供するサービス提供装置に送信し、上記サービス提供 装置は、認証情報を暗号ィ匕して暗号ィ匕認証情報を作成する暗号ィ匕部を備えており、 上記提供装置制御部は、サービス利用装置から初回認証情報を受信した場合には 、当該初回認証情報の認証処理を上記認証処理部に行わせ、当該初回認証情報 の認証に成功した場合に、上記暗号化部に当該初回認証情報を暗号化させ、その 暗号ィ匕によって得られた暗号ィ匕認証情報を上記初回認証情報を送信してきたサー ビス利用装置に送信する構成としてもょ ヽ。  [0248] Further, the use device control unit stores the encrypted authentication information corresponding to the requested service in the encryption storage unit! In such a case, the encryption authentication information corresponding to the requested service is stored in the encryption storage unit. In this case, the user input is made via the input unit. Authentication information related to the requested service is transmitted as initial authentication information to a service providing apparatus that provides the service, and the service providing apparatus encrypts the authentication information and creates a cipher authentication information. When the initial authentication information is received from the service using device, the providing device control unit causes the authentication processing unit to perform the authentication processing of the initial authentication information and succeeds in authenticating the initial authentication information. In this case, the encryption unit encrypts the initial authentication information, and transmits the encryption key authentication information obtained by the encryption key to the service using apparatus that has transmitted the initial authentication information. Yo ヽ even formed.

[0249] 上記の構成によれば、利用装置制御部は、要求するサービスに対応する暗号ィ匕認 証情報が暗号記憶部に記憶されて!、る場合には、その暗号ィ匕認証情報をサービス 提供装置に送信する。そして、利用装置制御部は、要求するサービスに対応する暗 号化認証情報が暗号記憶部に記憶されて ヽな ヽ場合に、入力部を介してユーザか ら要求するサービスに関する認証情報をサービス提供装置に送信する。 [0249] According to the above configuration, the user apparatus control unit stores the encryption authentication information corresponding to the requested service in the encryption storage unit! In such a case, the encryption key authentication information is transmitted to the service providing apparatus. Then, when the encrypted authentication information corresponding to the requested service is stored in the encryption storage unit, the user device control unit can determine whether the user is the user via the input unit. Authentication information related to the requested service is transmitted to the service providing apparatus.

[0250] このため、ユーザは、要求するサービスに対応する暗号化認証情報が暗号記憶部 に記憶されて 、な 、場合、すなわちそのサービスに関する認証情報の認証処理がそ れ以前に完了していない場合にのみ、認証情報の入力操作を行えばよい。したがつ て、 2回目以降の認証処理時におけるユーザによる認証情報の入力操作は不要であ り、従来のようにサービスの認証情報を毎回入力する必要がないので、認証処理に 関する利便性を向上させることができる。  [0250] For this reason, the encrypted authentication information corresponding to the service requested by the user is stored in the encryption storage unit. In other words, the authentication processing of the authentication information related to the service has not been completed before. Only in such a case, an authentication information input operation may be performed. Therefore, it is not necessary to input authentication information by the user during the second and subsequent authentication processing, and there is no need to input service authentication information every time as in the conventional case. Can be improved.

[0251] また、上記の構成によれば、初回認証情報につ!、ての認証処理に成功した場合、 その認証情報は暗号化されてサービス利用装置に記憶される。つまり、サービス利 用装置には、暗号ィ匕された認証情報が記憶される。このため、例えばサービス利用 装置の記憶領域が解析されたとしても、サービスに関する認証情報が盗まれることが ない。したがって、認証情報に関するセキュリティ (安全性)を高めることができる。  [0251] Also, according to the above configuration, when the initial authentication information is successfully authenticated, the authentication information is encrypted and stored in the service using apparatus. That is, encrypted authentication information is stored in the service using device. For this reason, even if the storage area of the service using device is analyzed, for example, authentication information related to the service is not stolen. Accordingly, security (safety) related to authentication information can be improved.

[0252] また、上記サービス提供装置は、サービスの提供を許可するユーザの認証情報の 入力を受け付ける認証情報入力部と、認証情報を暗号化して暗号ィ匕認証情報を作 成する暗号化部とを備え、上記提供装置制御部は、上記認証情報入力部に入力さ れた認証情報を上記暗号ィ匕部に暗号化させ、その暗号ィ匕によって得られた暗号ィ匕 認証情報を上記サービス利用装置に送信する構成としてもよい。  [0252] Further, the service providing apparatus includes an authentication information input unit that receives input of authentication information of a user permitted to provide a service, an encryption unit that encrypts the authentication information and creates encrypted authentication information, The providing device control unit causes the encryption information unit to encrypt the authentication information input to the authentication information input unit, and uses the encryption authentication information obtained by the encryption to use the service. It is good also as a structure which transmits to an apparatus.

[0253] 上記の構成によれば、サービス提供装置がサービスの提供を許可するユーザの認 証情報の入力を受け付け、それを暗号ィ匕してサービス利用装置に送信する。この場 合、サービス利用装置のユーザは、認証情報の入力操作を行う必要がないので、認 証処理に関する利便性を向上させることができる。  [0253] According to the above configuration, the service providing apparatus receives the input of the authentication information of the user permitted to provide the service, encrypts it, and transmits it to the service using apparatus. In this case, since the user of the service using device does not need to perform an authentication information input operation, convenience related to the authentication process can be improved.

[0254] なお、上記提供装置制御部は、上記暗号化認証情報を、放送網を介して上記サー ビス利用装置に送信する構成としてもょ ヽ。  [0254] Note that the providing apparatus control unit may transmit the encrypted authentication information to the service using apparatus via a broadcast network.

[0255] また、この場合、上記認証情報入力部は、サービスの提供を許可するサービス利用 装置を識別するための端末 IDの入力を受け付け、上記提供装置制御部は、上記暗 号化認証情報と端末 IDとを上記サービス利用装置に送信する構成としてもよ ヽ。放 送網を介して暗号化認証情報を送信する場合、サービス利用装置が、他のサービス 利用装置に送信された暗号化認証情報を受信する場合がある。そこで、暗号化認証 情報とともに端末 IDを送信することで、サービス利用装置は、自身に送信された暗号 化認証情報であるかどうかを判別することができる。 [0255] In this case, the authentication information input unit receives an input of a terminal ID for identifying a service using device that is permitted to provide a service, and the providing device control unit receives the encrypted authentication information and the encrypted authentication information. It is also possible to transmit the terminal ID to the service using device. When transmitting encrypted authentication information via a transmission network, a service using device may receive encrypted authentication information transmitted to another service using device. Therefore, encryption authentication By transmitting the terminal ID together with the information, the service using device can determine whether or not the encrypted authentication information is transmitted to itself.

[0256] 本発明の第 2のサービス提供システムは、上記の課題を解決するために、サービス 利用装置と、サービス利用装置を当該サービス利用装置の要求するサービスを提供 するサービス提供装置にネットワークを介して接続するサービス中継装置と、サービ ス中継装置とネットワークを介して接続されるサービス提供装置とを含んでなるサービ スシステムであって、上記サービス利用装置は、要求するサービスを特定するための ユーザ力 の入力指示を受け付ける入力部と、受信した暗号ィ匕認証情報を記憶する 暗号記憶部と、上記要求するサービスに対応する暗号ィ匕認証情報をサービス中継 装置に送信する利用装置制御部と、を備え、上記サービス提供装置は、サービスの 提供を許可するユーザの認証情報を記憶する認証情報記憶部と、サービス中継装 置カゝら受信した認証情報を、上記認証情報記憶部に記憶したサービスの提供を許 可するユーザの認証情報と照合する認証処理を行う認証処理部と、を備え、上記サ 一ビス中継装置は、暗号化認証情報を復号化して復号化認証情報を作成する復号 化部と、サービス利用装置から暗号化認証情報を受信した場合に、当該暗号化情報 を上記復号ィ匕部に復号化させ、その復号ィ匕によって得られた復号ィ匕認証情報を当 該暗号ィ匕認証情報を送信してきたサービス利用装置の要求するサービスを提供する サービス提供装置に送信する中継制御部と、を備えて ヽることを特徴として ヽる。  [0256] In order to solve the above problems, the second service providing system of the present invention provides a service using apparatus and a service providing apparatus that provides the service using apparatus with a service requested by the service using apparatus via a network. A service relay device connected to the service relay device and a service providing device connected to the service relay device via a network, wherein the service using device is a user for specifying a requested service. An input unit that receives an input instruction, a cryptographic storage unit that stores the received cryptographic key authentication information, a utilization device control unit that transmits the cryptographic key authentication information corresponding to the requested service to the service relay device, The service providing apparatus includes an authentication information storage unit that stores authentication information of a user who is permitted to provide the service. An authentication processing unit that performs an authentication process for verifying authentication information received from a service relay device with authentication information of a user permitted to provide a service stored in the authentication information storage unit. The service relay device decrypts the encrypted authentication information to create the decrypted authentication information, and when receiving the encrypted authentication information from the service using device, the encrypted relay information is sent to the decryption unit. A relay control unit that decrypts and transmits the decryption key authentication information obtained by the decryption key to a service providing device that provides a service requested by the service using device that has transmitted the cipher key authentication information; It is characterized by being equipped with.

[0257] 上記の構成によれば、利用装置制御部は、サービスの提供を要求する場合、暗号 化認証情報をサービス中継装置に送信する。そして、サービス中継装置は、受信し た暗号化認証情報を復号化してサービス提供装置に送信し、サービス提供装置は サービス中継装置カゝら受信した復号ィ匕認証情報の認証処理を行う。このため、ユー ザは、要求するサービスに対応する認証情報を入力する操作を、従来のようにサー ビスを要求する毎に行う必要がないので、認証処理に関する利便性を向上させること ができる。  [0257] According to the above configuration, the utilization device control unit transmits the encrypted authentication information to the service relay device when requesting the provision of a service. Then, the service relay device decrypts the received encrypted authentication information and transmits it to the service providing device, and the service providing device performs an authentication process on the decrypted key authentication information received from the service relay device. For this reason, the user does not need to perform an operation of inputting authentication information corresponding to the requested service every time the service is requested, so that the convenience of the authentication processing can be improved.

[0258] また、上記の構成によれば、サービス利用装置には、暗号ィ匕された認証情報が記 憶される。このため、例えばサービス利用装置の記憶領域が解析されたとしても、サ 一ビスに関する認証情報が盗まれることがない。したがって、認証情報に関するセキ ユリティ (安全性)を高めることができる。 [0258] Also, according to the above configuration, encrypted authentication information is stored in the service using device. For this reason, even if the storage area of the service using device is analyzed, for example, the authentication information related to the service is not stolen. Therefore, the security information The utility (safety) can be increased.

[0259] また、上記サービス提供装置は、上記認証処理の結果を示す認証結果情報を上 記サービス中継装置に送信する提供制御部を備えており、上記利用装置制御部は、 上記要求するサービスに対応する暗号化認証情報が上記暗号記憶部に記憶されて Vヽるカゝ否かを判断し、上記要求するサービスに対応する暗号ィ匕認証情報が上記暗 号記憶部に記憶されていない場合には、上記入力部を介してユーザ力も入力される 上記要求するサービスに関する認証情報を初回認証情報としてサービス中継装置 に送信し、上記サービス中継装置は、認証情報を暗号化して暗号化認証情報を作 成する暗号ィ匕部を備えており、上記中継制御部は、サービス利用装置力 初回認証 情報を受信した場合には、受信した初回認証情報をその初回認証情報を送信してき たサービス利用装置の要求するサービスを提供するサービス提供装置に送信し、当 該サービス提供装置力 上記初回認証情報についての認証処理に成功したことを 示す認証処理結果を受信した場合に、当該初回認証情報を上記暗号化部に暗号化 させ、その暗号ィ匕によって得られた暗号ィ匕認証情報を、当該初回認証情報を送信し てきたサービス利用装置に返信する構成としてもよい。  [0259] In addition, the service providing apparatus includes a providing control unit that transmits authentication result information indicating a result of the authentication process to the service relay apparatus, and the using apparatus control unit provides the service requested. When it is determined whether the corresponding encryption authentication information is stored in the encryption storage unit and the authentication is not possible, and the encryption authentication information corresponding to the requested service is not stored in the encryption storage unit The authentication information regarding the requested service is transmitted to the service relay apparatus as initial authentication information, and the user power is also input via the input unit, and the service relay apparatus encrypts the authentication information and transmits the encrypted authentication information. When the relay control unit receives the initial authentication information, the relay control unit transmits the received initial authentication information to the initial authentication information. If the authentication processing result is transmitted to the service providing device that provides the service requested by the service using device and the authentication processing result indicating that the authentication processing for the initial authentication information is successful, the initial The authentication information may be encrypted by the encryption unit, and the encryption key authentication information obtained by the encryption key may be returned to the service using apparatus that has transmitted the initial authentication information.

[0260] 上記の構成によれば、利用装置制御部は、要求するサービスに対応する暗号ィ匕認 証情報が暗号記憶部に記憶されて!、る場合には、その暗号ィ匕認証情報をサービス 中継装置に送信する。そして、利用装置制御部は、要求するサービスに対応する暗 号化認証情報が暗号記憶部に記憶されて ヽな ヽ場合に、入力部を介してユーザか ら要求するサービスに関する認証情報をサービス中継装置に送信する。  [0260] According to the above configuration, the user apparatus control unit stores the encryption authentication information corresponding to the requested service in the encryption storage unit! In such a case, the encryption key authentication information is transmitted to the service relay device. When the encrypted authentication information corresponding to the requested service is stored in the encryption storage unit, the using device control unit relays the authentication information related to the requested service from the user via the input unit. Send to device.

[0261] このため、ユーザは、要求するサービスに対応する暗号化認証情報が暗号記憶部 に記憶されて 、な 、場合、すなわちそのサービスに関する認証情報の認証処理がそ れ以前に完了していない場合にのみ、認証情報の入力操作を行えばよい。したがつ て、 2回目以降の認証処理時におけるユーザによる認証情報の入力操作は不要であ り、従来のようにサービスの認証情報を毎回入力する必要がないので、認証処理に 関する利便性を向上させることができる。  [0261] For this reason, the encrypted authentication information corresponding to the service requested by the user is stored in the encryption storage unit. In other words, the authentication processing of the authentication information related to the service has not been completed before. Only in such a case, an authentication information input operation may be performed. Therefore, it is not necessary for the user to input authentication information during the second and subsequent authentication processes, and there is no need to input service authentication information every time as in the conventional case. Can be improved.

[0262] また、上記の構成によれば、初回認証情報につ!、ての認証処理に成功した場合、 その認証情報は暗号化されてサービス利用装置に記憶される。つまり、サービス利 用装置には、暗号ィ匕された認証情報が記憶される。このため、例えばサービス利用 装置の記憶領域が解析されたとしても、サービスに関する認証情報が盗まれることが ない。したがって、認証情報に関するセキュリティ (安全性)を高めることができる。 [0262] Also, according to the above configuration, when the initial authentication information is successfully authenticated, the authentication information is encrypted and stored in the service using device. In other words, service interest The authentication device stores encrypted authentication information. For this reason, even if the storage area of the service using device is analyzed, for example, authentication information related to the service is not stolen. Accordingly, security (safety) related to authentication information can be improved.

[0263] また、上記の構成によれば、サービス利用装置を上記した構成とし、サービス中継 装置に暗号ィ匕部および復号ィ匕部を備えればよぐサービス提供装置については、従 来のサービス提供システムに用いられて 、るサービス提供装置をそのまま用いること もできる。したがって、既存のサービス提供装置を有効利用できる。  [0263] Also, according to the above configuration, a service providing apparatus that has the above-described configuration of the service using device and includes the encryption unit and the decryption unit in the service relay device, the conventional service The service providing apparatus used in the providing system can be used as it is. Therefore, the existing service providing apparatus can be used effectively.

[0264] また、この場合、上記利用装置制御部は、複数のサービスの提供を要求する場合 に、要求する各サービスについての上記初回認証情報を一まとめにして上記サービ ス中継装置に送信し、上記中継制御部は、上記サービス利用装置力 受信した各初 回認証情報を、ネットワークを介して接続される複数のサービス提供装置の中からそ れぞれの初回認証情報に対応するサービスを提供するサービス提供装置を選択し て送信し、各サービス提供装置から認証処理結果を受信すると、認証処理に成功し た各初回認証情報を上記暗号化部に暗号化させ、その暗号ィ匕によって得られた各 暗号化認証情報を、当該各初回認証情報を送信してきたサービス利用装置に返信 する構成としてちよい。  [0264] Also, in this case, when requesting provision of a plurality of services, the utilization device control unit collectively transmits the initial authentication information for each requested service to the service relay device, The relay control unit provides a service corresponding to each initial authentication information from among a plurality of service providing apparatuses connected via the network, with respect to each initial authentication information received by the service utilization apparatus power. When the service providing device is selected and transmitted, and the authentication processing result is received from each service providing device, the initial authentication information that has been successfully authenticated is encrypted by the encryption unit and obtained by the encryption key. A configuration may be adopted in which each encrypted authentication information is returned to the service using apparatus that has transmitted each initial authentication information.

[0265] 上記の構成によれば、ユーザは、複数のサービスを利用する場合に、各サービスに ついての認証情報を一括して入力すればよい。これにより、所望する複数のサービス の提供を一回の認証情報の入力操作で受けることができる。したがって、各サービス の初回認証時におけるユーザの利便性をさらに向上できる。  [0265] According to the configuration described above, when using a plurality of services, the user only has to input authentication information for each service in a lump. As a result, provision of a plurality of desired services can be received with a single authentication information input operation. Therefore, the convenience of the user at the time of initial authentication of each service can be further improved.

[0266] また、上記利用装置制御部は、複数のサービスの提供を要求する場合に、要求す る各サービスにつ 、ての暗号認証情報が上記暗号記憶部に記憶されて 、るか否か を判断し、記憶されて ヽな 、各サービスにつ 、てのユーザ力もの認証情報の入力を 受け付け、当該入力された認証情報を初回認証情報としてサービス中継装置に送信 し、上記中継制御部は、上記サービス利用装置から受信した各初回認証情報を、ネ ットワークを介して接続される複数のサービス提供装置の中からそれぞれの初回認 証情報に対応するサービスを提供するサービス提供装置を選択して送信し、各サー ビス提供装置から認証処理結果を受信すると、認証処理に成功した各初回認証情 報を上記暗号化部に暗号化させ、その暗号ィ匕によって得られた各暗号ィ匕認証情報 を、当該各初回認証情報を送信してきたサービス利用装置に返信するようにしてもよ い。 [0266] Further, when the use device control unit requests provision of a plurality of services, whether or not encryption authentication information for each requested service is stored in the encryption storage unit. For each service, it accepts the input of authentication information of the user power and sends the input authentication information to the service relay device as initial authentication information, and the relay control unit For each initial authentication information received from the service using device, a service providing device that provides a service corresponding to each initial authentication information is selected from a plurality of service providing devices connected via the network. When the authentication process result is received from each service providing device, each initial authentication information that has been successfully authenticated is received. The information may be encrypted by the encryption unit, and each encryption key authentication information obtained by the encryption key may be returned to the service using apparatus that has transmitted each initial authentication information.

[0267] 上記の構成によれば、ユーザは、複数のサービスを利用する場合に、それ以前に 認証処理が完了して!/、な!/、サービス(暗号ィ匕認証情報を記憶して!/、な!/、サービス) についての認証情報のみを入力すればよい。したがって、認証情報の入力に関する ユーザの利便性をさらに向上させることができる。  [0267] According to the above configuration, when a user uses a plurality of services, the authentication process has been completed before that! /, NA! /, Service (encryption authentication information is stored! You only need to enter authentication information for /, na! /, Service). Therefore, the convenience of the user regarding the input of authentication information can be further improved.

[0268] また、上記サービス提供装置は、サービスの提供を許可するユーザの認証情報を 受け付ける認証情報入力部を備え、上記提供装置制御部は、上記認証情報入力部 カゝら入力された認証情報をサービス中継装置に送信し、上記サービス中継装置は、 認証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部を備え、上記中継制御 部は、サービス提供装置力も認証情報を受信した場合に、当該認証情報を上記暗 号ィ匕部に暗号化させ、その暗号ィ匕によって得られた暗号ィ匕認証情報を上記サービス 利用装置に送信する構成としてもよい。  [0268] Further, the service providing apparatus includes an authentication information input unit that receives authentication information of a user permitted to provide a service, and the providing apparatus control unit includes the authentication information input from the authentication information input unit. The service relay device includes an encryption unit that encrypts authentication information to create encryption authentication information, and the relay control unit also receives the authentication information from the service providing device. In this case, the authentication information may be encrypted in the encryption key unit, and the encryption key authentication information obtained by the encryption key may be transmitted to the service using apparatus.

[0269] 上記の構成によれば、サービス提供装置がサービスの提供を許可するユーザの認 証情報の入力を受け付けると、入力された認証情報 (サービスの提供を許可するュ 一ザの認証情報)がサービス中継装置に送信される。そして、サービス中継装置は、 受信した上記の認証情報を暗号ィ匕してサービス利用装置に送信する。この場合、サ 一ビス利用装置のユーザは、認証情報の入力操作を行う必要がないので、認証処理 に関する利便性を向上させることができる。  [0269] According to the above configuration, when the service providing apparatus accepts the input of the authentication information of the user permitted to provide the service, the input authentication information (the authentication information of the user permitted to provide the service) Is transmitted to the service relay device. Then, the service relay device encrypts the received authentication information and transmits it to the service using device. In this case, since the user of the service using device does not need to perform an authentication information input operation, convenience related to the authentication processing can be improved.

[0270] また、上記サービス中継装置は、認証情報および当該認証情報を用いて認証処理 を行うサービス提供装置を特定する情報の入力を受け付ける認証情報入力部と、認 証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部とを備え、上記中継制御 部は、上記認証情報入力部を介して入力された認証情報を、当該認証情報を用い て認証処理を行うサービス提供装置に送信し、当該サービス提供装置から認証処理 に成功したことを示す認証処理結果を受信した場合に、当該認証に成功した認証情 報を上記暗号化部に暗号化させ、その暗号化によって得られた暗号化認証情報を 上記サービス利用装置に送信する構成としてもよい。 [0271] 上記の構成によれば、サービス中継装置が、認証情報および当該認証情報を用い て認証処理を行うサービス提供装置を特定する情報の入力を受け付け、上記認証情 報をサービス提供装置に送信する。そして、サービス中継装置は、サービス提供装 置から認証処理に成功したことを示す認証処理結果を受信すると、その認証情報を 暗号ィ匕してサービス利用装置に送信する。これにより、サービス利用装置のユーザは 、認証情報の入力操作を行う必要がないので、認証処理に関する利便性を向上させ ることがでさる。 [0270] Further, the service relay apparatus includes an authentication information input unit that receives input of authentication information and information specifying a service providing apparatus that performs authentication processing using the authentication information, and encrypts the authentication information by encrypting the authentication information. The relay control unit transmits the authentication information input via the authentication information input unit to a service providing apparatus that performs authentication processing using the authentication information. When the authentication processing result indicating that the authentication processing is successful is received from the service providing device, the authentication information that has succeeded in the authentication is encrypted by the encryption unit, and the encryption obtained by the encryption is encrypted. The authentication authentication information may be transmitted to the service using device. [0271] According to the above configuration, the service relay apparatus receives input of authentication information and information specifying a service providing apparatus that performs authentication processing using the authentication information, and transmits the authentication information to the service providing apparatus. To do. When the service relay device receives an authentication processing result indicating that the authentication processing is successful from the service providing device, the service relay device encrypts the authentication information and transmits it to the service using device. As a result, the user of the service using device does not need to perform an authentication information input operation, so that convenience related to authentication processing can be improved.

[0272] なお、上記提供装置制御部は、上記暗号化認証情報を、放送網を介して上記サー ビス利用装置に送信する構成としてもよい。また、この場合、上記認証情報入力部は 、サービスの提供を許可するサービス利用装置を識別するための端末 IDの入力を受 け付け、上記提供装置制御部は、上記暗号化認証情報と端末 IDとを上記サービス 利用装置に送信する構成としてもよい。  [0272] Note that the providing apparatus control unit may transmit the encrypted authentication information to the service using apparatus via a broadcast network. In this case, the authentication information input unit accepts an input of a terminal ID for identifying a service using device permitted to provide the service, and the providing device control unit receives the encrypted authentication information and the terminal ID. May be transmitted to the service using device.

[0273] また、上記利用装置制御部は、複数のサービスの提供を要求する場合に、要求す る各サービスにつ ヽての暗号化認証情報が上記暗号記憶部に記憶されて ヽるか否 かを判断し、各サービスについての暗号ィ匕認証情報が記憶されている場合には、当 該各暗号化認証情報を上記サービス中継装置に送信し、上記中継制御部は、上記 サービス利用装置から受信した各暗号化認証情報を上記復号化部に復号化させ、 その復号ィ匕によって得られた復号ィ匕認証情報を、ネットワークを介して接続される複 数のサービス提供装置の中からそれぞれの復号ィ匕認証情報に対応するサービスを 提供するサービス提供装置を選択して送信し、上記各サービス提供装置からサービ ス内容を受信するとともに、受信したサービス内容を一まとめにして上記サービスの 提供を要求したサービス利用装置に返信する構成としてもよい。  [0273] Also, when the use device control unit requests provision of a plurality of services, whether or not the encryption authentication information for each requested service is stored in the encryption storage unit. If the encrypted key authentication information for each service is stored, the encrypted authentication information is transmitted to the service relay device, and the relay control unit Each of the encrypted authentication information received is decrypted by the decryption unit, and the decryption key authentication information obtained by the decryption key is transmitted from each of a plurality of service providing apparatuses connected via the network. The service providing device that provides the service corresponding to the decryption key authentication information is selected and transmitted, and the service content is received from each of the service providing devices described above, and the received service content is grouped. It may be configured to reply to the service using apparatus that requested to provide serial services.

[0274] 上記の構成によれば、複数のサービスを利用する場合に、各サービス提供装置か ら提供されるサービス内容が、サービス中継装置によって一まとめにされてサービス 利用装置に送られる。これにより、サービス利用装置では、複数のサービス提供装置 によって提供される複数のサービスを同時に利用したり、あるいはそれらを組み合わ せて利用することができる。  [0274] According to the above configuration, when a plurality of services are used, the service contents provided from each service providing device are collected together by the service relay device and sent to the service using device. As a result, the service using apparatus can use a plurality of services provided by a plurality of service providing apparatuses at the same time, or use them in combination.

[0275] 本発明のサービス利用装置は、サービス提供装置カゝらサービスの提供を受けるサ 一ビス利用装置であって、要求するサービスを特定するためのユーザからの入力指 示を受け付ける入力部と、受信した暗号化認証情報を記憶する暗号記憶部と、上記 要求するサービスに対応する暗号化認証情報を上記要求するサービスを提供する サービス提供装置に送信する利用装置制御部と、を備えていることを特徴としている [0275] The service using apparatus of the present invention is a service receiving apparatus providing service. An input unit that receives an input instruction from a user for specifying a requested service, an encryption storage unit that stores the received encrypted authentication information, and an encryption corresponding to the requested service. And a utilization device control unit that transmits the authentication request information to the service providing device that provides the requested service.

[0276] 上記の構成によれば、ユーザは、要求するサービスを特定するための入力指示を 行うだけで、認証情報の入力操作を行うことなくサービスの提供を要求できる。また、 上記の構成によれば、サービス利用装置には、暗号ィ匕された認証情報が記憶される 。このため、例えばサービス利用装置の記憶領域が解析されたとしても、サービスに 関する認証情報が盗まれることがない。したがって、認証情報に関するセキュリティ( 安全性)を高めることができる。 [0276] According to the configuration described above, the user can request provision of a service without performing an authentication information input operation only by performing an input instruction for specifying the requested service. Further, according to the above configuration, the authentication information encrypted is stored in the service using device. For this reason, for example, even if the storage area of the service using device is analyzed, authentication information about the service is not stolen. Therefore, it is possible to improve security (security) related to authentication information.

[0277] また、上記利用装置制御部は、上記要求するサービスに対応する暗号化認証情報 が上記暗号記憶部に記憶されて 、る力否かを判断し、記憶されて 、な 、場合には上 記入力部を介してユーザ力 入力される上記要求するサービスに関する認証情報を 初回認証情報として当該サービスを提供するサービス提供装置に送信する構成とし てもよい。  [0277] Further, the use device control unit determines whether or not the encryption authentication information corresponding to the requested service is stored in the encryption storage unit, and is stored. The authentication information related to the requested service input by the user via the input unit may be transmitted to the service providing apparatus that provides the service as initial authentication information.

[0278] 上記の構成によれば、利用装置制御部は、要求するサービスに対応する暗号ィ匕認 証情報が暗号記憶部に記憶されて!、る場合には、その暗号ィ匕認証情報をサービス 提供装置に送信する。そして、利用装置制御部は、要求するサービスに対応する暗 号化認証情報が暗号記憶部に記憶されて ヽな ヽ場合に、入力部を介してユーザか ら要求するサービスに関する認証情報をサービス提供装置に送信する。  [0278] According to the above configuration, the user apparatus control unit stores the encryption authentication information corresponding to the requested service in the encryption storage unit! In such a case, the encryption key authentication information is transmitted to the service providing apparatus. Then, when the encrypted authentication information corresponding to the requested service is stored in the encryption storage unit, the using device control unit provides the authentication information related to the service requested from the user via the input unit. Send to device.

[0279] このため、ユーザは、初回認証時にのみ認証情報の入力操作を行えばよぐ 2回目 以降の認証処理時におけるユーザによる認証情報の入力操作は不要である。したが つて、認証処理に関する利便性を向上させることができる。  [0279] For this reason, the user only needs to perform the authentication information input operation at the time of the first authentication. The user does not need to input the authentication information at the second and subsequent authentication processing. Therefore, the convenience related to the authentication process can be improved.

[0280] また、放送網を用いて送信された暗号ィ匕認証情報と端末 IDとを受信する受信部と 、受信した端末 IDが当該サービス利用装置に対応する端末 IDであるかどうかを判定 する端末 ID判定部とを備え、上記利用装置制御部は、受信した端末 IDが当該サー ビス利用装置に対応する端末 IDである場合に、当該端末 IDとともに受信した暗号化 認証情報を上記暗号記憶部に記憶させる構成としてもょ ヽ。 [0280] Also, a receiving unit that receives the encryption key authentication information and the terminal ID transmitted using the broadcast network, and determines whether or not the received terminal ID is a terminal ID corresponding to the service using device. A terminal ID determination unit, and when the received terminal ID is a terminal ID corresponding to the service using device, the using device control unit receives the encryption received together with the terminal ID. The authentication information may be stored in the encryption storage unit.

[0281] 上記の構成によれば、放送網を介して送信された暗号ィ匕認証情報のうち、自身に 受信させるために送信されたものだけを選定して記憶することができる。  [0281] According to the configuration described above, it is possible to select and store only the encryption key authentication information transmitted via the broadcast network and the information transmitted to be received by itself.

[0282] 本発明のサービス提供装置は、サービス利用装置にサービスを提供するサービス 提供装置であって、サービスの提供を許可するユーザの認証情報を記憶する認証 情報記憶部と、サービスの提供を要求してきたユーザの認証情報を、上記認証情報 記憶部に記憶したサービスの提供を許可するユーザの認証情報と照合する認証処 理を行う認証処理部と、認証情報を暗号化して暗号化認証情報を作成する暗号ィ匕 部と、暗号化認証情報を復号化して復号化認証情報を作成する復号化部と、初回認 証情報を受信した場合には、当該初回認証情報の認証処理を上記認証処理部に行 わせ、当該初回認証情報の認証に成功した場合に、上記暗号ィ匕部に当該初回認証 情報を暗号化させ、その暗号ィ匕によって得られた暗号ィ匕認証情報を返信し、暗号ィ匕 認証情報を受信した場合には、受信した暗号化認証情報を上記復号化部に復号ィ匕 させ、その復号化によって得られる復号化認証情報の認証処理を上記認証処理部 に行わせる提供装置制御部と、を備えて 、ることを特徴として 、る。  [0282] The service providing apparatus of the present invention is a service providing apparatus that provides a service to a service using apparatus, and an authentication information storage unit that stores authentication information of a user permitted to provide the service, and a request for providing the service The authentication processing unit that performs authentication processing for verifying the authentication information of the user who has been registered with the authentication information of the user permitted to provide the service stored in the authentication information storage unit, and the encrypted authentication information by encrypting the authentication information When the initial authentication information is received, the authentication process for the initial authentication information is the authentication process described above when the encryption unit to be created, the decryption unit for decrypting the encrypted authentication information to create the decryption authentication information, and the initial authentication information are received If the initial authentication information is successfully authenticated, the initial encryption information is encrypted by the encryption key unit, and the encryption key authentication information obtained by the encryption key is returned. When the authentication information is received, the received encrypted authentication information is decrypted by the decryption unit, and the authentication processing unit performs authentication processing of the decryption authentication information obtained by the decryption. And a providing device control unit.

[0283] 上記の構成によれば、サービス利用装置は、初回認証時にのみ暗号化認証情報 をサービス提供装置に送信すればよい。したがって、認証情報の入力に力かるユー ザの負担を軽減できる。  [0283] According to the above configuration, the service using apparatus only needs to transmit the encrypted authentication information to the service providing apparatus at the time of initial authentication. Therefore, it is possible to reduce the burden on the user who is required to input authentication information.

[0284] 本発明の第 2のサービス提供装置は、サービス利用装置にサービスを提供するサ 一ビス提供装置であって、サービスの提供を許可するユーザの認証情報を記憶する 認証情報記憶部と、サービスの提供を要求してきたユーザの認証情報を、上記認証 情報記憶部に記憶したサービスの提供を許可するユーザの認証情報と照合する認 証処理を行う認証処理部と、サービスの提供を許可するユーザの認証情報の入力を 受け付ける認証情報入力部と、認証情報を暗号化して暗号化認証情報を作成する 暗号ィヒ部と、サービスの提供を許可するユーザの認証情報を上記暗号ィヒ部に暗号 化させ、その暗号化によって得られた暗号化認証情報を上記サービス利用装置に送 信する提供装置制御部を備えて ヽることを特徴として ヽる。  [0284] A second service providing apparatus of the present invention is a service providing apparatus that provides a service to a service using apparatus, an authentication information storage unit that stores authentication information of a user permitted to provide the service, An authentication processing unit that performs authentication processing for verifying the authentication information of the user who has requested the provision of service with the authentication information of the user permitted to provide the service stored in the authentication information storage unit, and permits the provision of the service The authentication information input unit that accepts input of user authentication information, the encryption unit that encrypts the authentication information to create encrypted authentication information, and the authentication information of the user permitted to provide the service are stored in the encryption unit. It is characterized by comprising a providing device control unit that encrypts and transmits the encrypted authentication information obtained by the encryption to the service using device.

[0285] 上記の構成によれば、サービス利用装置は、サービス提供装置力も受信した暗号 化認証情報を用いてサービスの提供を要求すればよい。したがって、ユーザが認証 情報を入力操作する必要がな 、ので、認証情報の入力にかかるユーザの負担を軽 減できる。 [0285] According to the above configuration, the service using device receives the encryption of the service providing device. The provision of the service may be requested using the authentication information. Accordingly, since the user does not need to input authentication information, the burden on the user for inputting authentication information can be reduced.

[0286] なお、上記提供装置制御部は、上記暗号化認証情報を、放送網を介して上記サー ビス利用装置に送信する構成としてもよい。また、上記認証情報入力部は、サービス の提供を許可するサービス利用装置を識別するための端末 IDの入力を受け付け、 上記提供装置制御部は、上記暗号化認証情報と端末 IDとを上記サービス利用装置 に送信する構成としてもょ 、。  [0286] Note that the providing apparatus control unit may transmit the encrypted authentication information to the service using apparatus via a broadcast network. The authentication information input unit accepts an input of a terminal ID for identifying a service using device permitted to provide a service, and the providing device control unit uses the encrypted authentication information and the terminal ID for the service use. As a configuration to send to the device.

[0287] 本発明のサービス中継装置は、サービス利用装置と上記サービス利用装置にサー ビスを提供するサービス提供装置とを中継するサービス中継装置であって、認証情 報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部と、暗号ィ匕認証情報を復号ィ匕 して復号化認証情報を作成する復号化部と、サービス利用装置から初回認証情報を 受信した場合には、受信した初回認証情報を上記サービスを提供するサービス提供 装置に送信し、サービス利用装置カゝら暗号ィ匕認証情報を受信した場合には、当該暗 号ィ匕情報を上記復号ィ匕部に復号化させ、その復号ィ匕によって得られた復号ィ匕認証 情報を上記サービス提供装置に送信し、上記初回認証情報をサービス提供装置に 送信した場合であって、当該サービス提供装置からその初回認証情報につ!ヽての認 証処理に成功したことを示す認証処理結果を受信した場合に、当該初回認証情報を 上記暗号ィ匕部に暗号化させ、その暗号ィ匕によって得られた暗号ィ匕認証情報を、当該 初回認証情報を送信してきたサービス利用装置に返信する中継制御部と、を備えて 、ることを特徴として 、る。  [0287] The service relay device of the present invention is a service relay device that relays between a service using device and a service providing device that provides services to the service using device, and encrypts authentication information to encrypt authentication. When the initial authentication information is received from the service using device, the decryption unit that creates the decryption authentication information by decrypting the encryption key authentication information, and the initial authentication information received from the service using device When the authentication information is transmitted to the service providing device that provides the service and the encryption key authentication information is received from the service using device, the encryption key information is decrypted by the decryption key unit. The decryption key authentication information obtained by the decryption key is transmitted to the service providing apparatus, and the initial authentication information is transmitted to the service providing apparatus. When the authentication process result indicating that the authentication process has been successfully completed is received, the initial authentication information is encrypted in the above cipher part and the cipher obtained by the cipher key is used. And a relay control unit that returns the authentication information to the service using apparatus that has transmitted the initial authentication information.

[0288] 上記の構成によれば、サービス利用装置は、初回認証時にのみ暗号化認証情報 をサービス提供装置に送信すればよい。したがって、認証情報の入力に力かるユー ザの負担を軽減できる。  [0288] According to the above configuration, the service using device only needs to transmit the encrypted authentication information to the service providing device only at the time of the initial authentication. Therefore, it is possible to reduce the burden on the user who is required to input authentication information.

[0289] 本発明の第 2のサービス中継装置は、サービス利用装置と上記サービス利用装置 にサービスを提供するサービス提供装置とを中継するサービス中継装置であって、 認証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部と、サービス提供装置 力 受信したサービスの提供を許可するユーザの認証情報を上記暗号ィ匕部に暗号 化させ、その暗号化によって得られた暗号化認証情報を上記サービス利用装置に送 信する中継制御部とを備えて 、ることを特徴として 、る。 [0289] A second service relay device of the present invention is a service relay device that relays between a service using device and a service providing device that provides a service to the service using device, and encrypts authentication information and encrypts the encrypted information. Cryptographic unit for creating authentication information and service providing device Encrypt the authentication information of the user who is permitted to provide the received service in the above ciphering unit. And a relay control unit for transmitting the encrypted authentication information obtained by the encryption to the service using device.

[0290] 上記の構成によれば、サービス利用装置は、サービス中継装置から受信した暗号 化認証情報を記憶しておき、サービスの提供を要求する場合には、その暗号化認証 情報をサービス中継装置に送信すればよい。したがって、認証情報の入力にかかる ユーザの負担を軽減できる。  [0290] According to the above configuration, the service using device stores the encrypted authentication information received from the service relay device, and when requesting the provision of service, the service using device stores the encrypted authentication information. To send to. Therefore, the burden on the user for inputting authentication information can be reduced.

[0291] 本発明の第 3のサービス中継装置は、サービス利用装置と上記サービス利用装置 にサービスを提供するサービス提供装置とを中継するサービス中継装置であって、 認証情報および当該認証情報を用いて認証処理を行うサービス提供装置を特定す る情報の入力を受け付ける認証情報入力部と、認証情報を暗号化して暗号化認証 情報を作成する暗号化部と、上記認証情報入力部を介して入力された認証情報を、 当該認証情報を用いて認証処理を行うサービス提供装置に送信し、当該サービス提 供装置から認証処理に成功したことを示す認証処理結果を受信した場合に、当該認 証に成功した認証情報を上記暗号ィ匕部に暗号ィ匕させ、その暗号ィ匕によって得られた 暗号化認証情報を上記サービス利用装置に送信する中継制御部とを備えて ヽること を特徴としている。  [0291] A third service relay device of the present invention is a service relay device that relays between a service using device and a service providing device that provides a service to the service using device, and uses authentication information and the authentication information. An authentication information input unit that receives input of information specifying a service providing apparatus that performs authentication processing, an encryption unit that encrypts authentication information to create encrypted authentication information, and the authentication information input unit. Authentication information is sent to a service providing device that performs authentication processing using the authentication information, and when the authentication processing result indicating that the authentication processing is successful is received from the service providing device, the authentication is successful. And a relay control unit that encrypts the encrypted authentication information in the encryption key unit and transmits the encrypted authentication information obtained by the encryption key to the service using device. It is characterized in that Ru.

[0292] 上記の構成によれば、サービス利用装置は、サービス中継装置から受信した暗号 化認証情報を記憶しておき、サービスの提供を要求する場合には、その暗号化認証 情報をサービス中継装置に送信すればよい。したがって、認証情報の入力にかかる ユーザの負担を軽減できる。  [0292] According to the above configuration, the service using device stores the encrypted authentication information received from the service relay device, and when requesting the provision of service, the service using device stores the encrypted authentication information. To send to. Therefore, the burden on the user for inputting authentication information can be reduced.

[0293] なお、上記中継制御部は、上記暗号化認証情報を、放送網を介して上記サービス 利用装置に送信する構成であってもよい。また、この場合、上記中継制御部は、上記 暗号ィ匕認証情報とともに、サービスの提供を許可するサービス利用装置を識別する ための端末 IDを上記サービス利用装置に送信する構成であってもよい。  [0293] Note that the relay control unit may be configured to transmit the encrypted authentication information to the service using apparatus via a broadcast network. In this case, the relay control unit may transmit a terminal ID for identifying a service using device permitted to provide a service to the service using device together with the encryption key authentication information.

[0294] 本発明の認証方法は、サービス利用装置と、ネットワークを介して接続されるサービ ス利用装置力ゝらの要求に応じて所定のサービスを提供するサービス提供装置とを含 んでなるサービス提供システムにおいてサービスを要求するユーザを認証する認証 方法であって、サービスの提供を許可するユーザの認証情報を暗号ィ匕して暗号ィ匕認 証情報を生成する暗号化工程と、上記暗号化認証情報をサービス利用装置に記憶 させる暗号記憶工程と、要求するサービスを特定するためのユーザ力 の入力指示 を上記サービス利用装置において受け付ける入力工程と、上記要求するサービスに 対応する暗号化認証情報を上記サービス利用装置からサービス提供装置に送信す るサービス要求工程と、上記送信された暗号ィ匕認証情報を復号ィ匕して復号ィ匕認証情 報を作成する復号化工程と、上記復号化認証情報をサービスの提供を許可するュ 一ザの認証情報と照合する認証処理工程と、を含むことを特徴として ヽる。 [0294] An authentication method of the present invention provides a service providing apparatus including a service using apparatus and a service providing apparatus that provides a predetermined service in response to a request from a service using apparatus connected via a network. An authentication method for authenticating a user who requests a service in the system, and encrypting authentication information of a user who is permitted to provide the service. An encryption step for generating certificate information, an encryption storage step for storing the encrypted authentication information in the service using device, and an input step for accepting an input instruction of user power for specifying the requested service in the service using device. A service request step for transmitting encrypted authentication information corresponding to the requested service from the service using apparatus to the service providing apparatus; and decrypting the transmitted encrypted authentication information to decrypt the encrypted authentication information. A decryption step of generating information, and an authentication processing step of collating the decryption authentication information with the authentication information of the user who is permitted to provide the service.

[0295] 上記の認証方法によれば、要求するサービスに対応する認証情報を入力する操作 を、従来のようにサービスを要求する毎に行う必要がないので、認証処理に関する利 便性を向上させることができる。また、上記の構成によれば、サービス利用装置には、 暗号化された認証情報が記憶される。したがって、認証情報に関するセキュリティ (安 全性)を高めることができる。  [0295] According to the above authentication method, it is not necessary to perform an operation for inputting authentication information corresponding to a requested service every time a service is requested, so that convenience related to authentication processing is improved. be able to. Further, according to the above configuration, the authentication information stored in the service use device is stored. Therefore, the security (security) related to authentication information can be improved.

[0296] また、上記入力指示によって特定されるサービスについての暗号ィ匕認証情報がサ 一ビス利用装置に記憶されているかどうかを判定する判定工程と、上記入力指示に よって特定されるサービスについての暗号ィ匕認証情報がサービス利用装置に記憶さ れて 、な 、場合に、ユーザからの認証情報の入力を受け付ける初回認証情報入力 工程と、上記初回認証情報入力工程で入力された認証情報を、サービスの提供を許 可するユーザの認証情報と照合する初回認証処理工程とを含み、上記認証処理ェ 程の結果、上記初回認証情報入力工程で入力された認証情報がサービスの提供を 許可するユーザの認証情報と一致した場合に、当該認証情報を暗号化して暗号ィ匕 認証情報を作成する暗号化工程と、上記暗号化認証情報をサービス利用装置に記 憶させる暗号記憶工程とを行うようにしてもょ 、。  [0296] Also, a determination step for determining whether or not the encryption authentication information for the service specified by the input instruction is stored in the service using device, and for the service specified by the input instruction In the case where the encryption key authentication information is stored in the service using device, the initial authentication information input step for accepting the input of the authentication information from the user, and the authentication information input in the initial authentication information input step, A user who is permitted to provide the service by the authentication information input in the first authentication information input step as a result of the authentication processing step. If the authentication information matches the authentication information, the encryption step of encrypting the authentication information to create encrypted authentication information, and the encrypted authentication information to the service using device Yo, it is performed and the encryption storage step of memorize in.

[0297] また、上記暗号化工程および上記復号化工程を、上記サービス利用装置とサービ ス提供装置とを中継するサービス中継装置にぉ 、て実行するようにしてもょ 、。  [0297] Further, the encryption step and the decryption step may be executed by a service relay device that relays between the service using device and the service providing device.

[0298] 上記の認証方法によれば、認証情報の入力操作に関するユーザの利便性を向上 させること、および、認証情報に関するセキュリティを高めることができる。また、サー ビス提供装置にっ 、ては、従来のサービス提供システムに用いられて 、るサービス 提供装置をそのまま用いることもできる。したがって、既存のサービス提供装置を有 効利用できる。 [0298] According to the authentication method described above, it is possible to improve the convenience of the user related to the authentication information input operation and to increase the security related to the authentication information. In addition, the service providing apparatus used in the conventional service providing system can be used as it is. Therefore, existing service providing devices are It can be used effectively.

[0299] 本発明の第 1の認証プログラムは、上記した認証方法における各工程の処理を、コ ンピュータに実行させるためのものである。コンピュータにこのプログラムを読み取ら せることで、本発明の認証方法における各工程の処理を、そのコンピュータによって 実現することが可能となる。  [0299] A first authentication program of the present invention is for causing a computer to execute processing of each step in the above-described authentication method. By causing the computer to read this program, the processing of each step in the authentication method of the present invention can be realized by the computer.

[0300] また、本発明の第 2の認証プログラムは、上記した認証方法における暗号記憶工程 、入力工程、サービス要求工程の処理を、上記サービス利用装置に備えられたコン ピュータまたは上記サービス利用装置に接続されたコンピュータに実行させるための ものである。コンピュータにこのプログラムを読み取らせることで、本発明の認証方法 における暗号記憶工程、入力工程、サービス要求工程の処理を、そのコンピュータ によって実現することが可能となる。  [0300] Further, the second authentication program of the present invention performs the processes of the encryption storage step, the input step, and the service request step in the authentication method described above on the computer provided in the service use device or the service use device. It is intended to be executed by a connected computer. By causing the computer to read this program, it is possible to realize the encryption storage step, the input step, and the service request step in the authentication method of the present invention by the computer.

[0301] また、本発明の第 3の認証プログラムは、上記した認証プログラムにおける暗号ィ匕 工程、復号ィ匕工程、認証処理工程の処理を、上記サービス提供装置に備えられたコ ンピュータまたは上記サービス提供装置に接続されたコンピュータに実行させるため のものである。コンピュータにこのプログラムを読み取らせることで、本発明の認証方 法における暗号ィ匕工程、復号ィ匕工程、認証処理工程の処理を、そのコンピュータに よって実現することが可能となる。  [0301] Further, the third authentication program of the present invention provides a computer provided in the service providing apparatus or the service described above for the encryption process, the decryption process, and the authentication process in the authentication program. This is to be executed by a computer connected to the providing device. By causing the computer to read this program, the encryption process, the decryption process, and the authentication process in the authentication method of the present invention can be realized by the computer.

[0302] また、本発明の第 4の認証プログラムは、上記した認証方法における、暗号化工程 および復号化工程の処理を、上記サービス利用装置とサービス提供装置とを中継す るサービス中継装置に備えられたコンピュータまたは上記サービス中継装置に接続 されたコンピュータに実行させるためのものである。コンピュータにこのプログラムを読 み取らせることで、暗号ィ匕工程および復号ィ匕工程の処理を、そのコンピュータによつ て実現することが可能となる。  [0302] Further, a fourth authentication program of the present invention comprises a service relay device that relays the process of encryption and decryption in the above authentication method between the service utilization device and the service providing device. To be executed by a connected computer or a computer connected to the service relay device. By causing the computer to read this program, the encryption process and the decryption process can be realized by the computer.

[0303] また、上記いずれかの認証プログラムをコンピュータによって読み取り可能な記録 媒体に記録させておくことで、そのプログラムの保存 ·流通を容易に行えるようになる 。さらに、その記録媒体を読み込ませることで、コンピュータによって、本発明の認証 方法における各工程の処理を実施できる。  [0303] Also, by storing any of the above authentication programs on a computer-readable recording medium, the program can be easily stored and distributed. Furthermore, by reading the recording medium, it is possible to carry out the processing of each step in the authentication method of the present invention by a computer.

[0304] 本発明は上述した各実施形態に限定されるものではなぐ請求項に示した範囲で 種々の変更が可能であり、異なる実施形態にそれぞれ開示された技術的手段を適 宜組み合わせて得られる実施形態についても本発明の技術的範囲に含まれる。 [0304] The present invention is not limited to the embodiments described above, but within the scope of the claims. Various modifications are possible, and embodiments obtained by appropriately combining technical means disclosed in different embodiments are also included in the technical scope of the present invention.

[0305] 発明の詳細な説明の項においてなされた具体的な実施形態または実施例は、あく までも、本発明の技術内容を明らかにするものであって、そのような具体例にのみ限 定して狭義に解釈されるべきものではなぐ本発明の精神と次に記載する特許請求 事項の範囲内で、いろいろと変更して実施することができるものである。  [0305] The specific embodiments or examples made in the detailed description section of the invention are to clarify the technical contents of the present invention, and are limited to such specific examples. Therefore, various modifications can be made within the spirit of the present invention and the scope of the following claims, which should not be interpreted in a narrow sense.

産業上の利用の可能性  Industrial applicability

[0306] 本発明は、情報端末装置と情報端末装置に対してサービスを提供するサービス提 供装置とを含んでなるサービス提供システムであって、サービスを提供する際にユー ザの認証を行うサービス提供システム、そのサービス提供システムに用いられる情報 端末装置、サービス提供装置、サービス中継装置、認証方法に適用できる。 [0306] The present invention is a service providing system including an information terminal device and a service providing device that provides a service to the information terminal device, and a service that authenticates a user when providing the service. The present invention can be applied to a providing system, an information terminal device used in the service providing system, a service providing device, a service relay device, and an authentication method.

Claims

請求の範囲 The scope of the claims [1] サービス利用装置と、ネットワークを介して接続されるサービス利用装置力もの要求 に応じて所定のサービスを提供するサービス提供装置とを含んでなるサービス提供 システムであって、  [1] A service providing system comprising a service using device and a service providing device that provides a predetermined service in response to a request of a service using device connected via a network, 上記サービス利用装置は、  The service using device is 要求するサービスを特定するためのユーザ力 の入力指示を受け付ける入力部と、 受信した暗号化認証情報を記憶する暗号記憶部と、  An input unit for receiving an input instruction of user power for specifying a requested service, an encryption storage unit for storing the received encrypted authentication information, 上記要求するサービスに対応する暗号化認証情報を上記要求するサービスを提供 するサービス提供装置に送信する利用装置制御部と、を備え、  A utilization device controller that transmits encrypted authentication information corresponding to the requested service to a service providing device that provides the requested service, and 上記サービス提供装置は、  The service providing apparatus includes: サービスの提供を許可するユーザの認証情報を記憶する認証情報記憶部と、 サービスの提供を要求してきたユーザの認証情報を、上記認証情報記憶部に記憶 したサービスの提供を許可するユーザの認証情報と照合する認証処理を行う認証処 理部と、  Authentication information storage unit for storing authentication information of a user who is permitted to provide a service, and authentication information of a user who is permitted to provide a service stored in the authentication information storage unit in which the authentication information of a user who has requested the service provision is stored An authentication processing unit that performs an authentication process for checking with 暗号化認証情報を復号化して復号化認証情報を作成する復号化部と、 サービス利用装置から暗号化認証情報を受信した場合に、受信した暗号化認証情 報を上記復号ィ匕部に復号化させ、その復号ィ匕によって得られる復号ィ匕認証情報の 認証処理を上記認証処理部に行わせる提供装置制御部と、を備えていることを特徴 とするサービス提供システム。  A decryption unit that decrypts the encrypted authentication information to create decryption authentication information, and when the encrypted authentication information is received from the service using device, the received encrypted authentication information is decrypted by the decryption unit. And a providing device control unit that causes the authentication processing unit to perform authentication processing of the decryption key authentication information obtained by the decryption key. [2] 上記利用装置制御部は、  [2] The utilization device control unit 上記要求するサービスに対応する暗号化認証情報が上記暗号記憶部に記憶され て!ヽるカゝ否かを判断し、上記要求するサービスに対応する暗号ィ匕認証情報が上記暗 号記憶部に記憶されていない場合には、上記入力部を介してユーザ力も入力される 上記要求するサービスに関する認証情報を初回認証情報として当該サービスを提供 するサービス提供装置に送信し、  It is determined whether the encryption authentication information corresponding to the requested service is stored in the encryption storage unit, and the encryption authentication information corresponding to the requested service is stored in the encryption storage unit. If it is not stored, user power is also input via the input unit. Authentication information regarding the requested service is transmitted as initial authentication information to a service providing apparatus that provides the service. 上記サービス提供装置は、  The service providing apparatus includes: 認証情報を暗号ィ匕して暗号ィ匕認証情報を作成する暗号ィ匕部を備えており、 上記提供装置制御部は、 サービス利用装置から初回認証情報を受信した場合には、当該初回認証情報の 認証処理を上記認証処理部に行わせ、当該初回認証情報の認証に成功した場合に 、上記暗号化部に当該初回認証情報を暗号化させ、その暗号ィ匕によって得られた暗 号ィ匕認証情報を上記初回認証情報を送信してきたサービス利用装置に送信すること を特徴とする請求項 1に記載のサービス提供システム。 An encryption unit that encrypts the authentication information to create encryption authentication information, and the providing device control unit includes: When the initial authentication information is received from the service using device, the authentication processing unit performs the authentication process of the initial authentication information, and when the initial authentication information is successfully authenticated, the encryption unit performs the initial authentication. 2. The service providing system according to claim 1, wherein the information is encrypted, and the encryption key authentication information obtained by the encryption key is transmitted to the service using apparatus that has transmitted the initial authentication information. [3] 上記サービス提供装置は、 [3] The service providing apparatus is サービスの提供を許可するユーザの認証情報の入力を受け付ける認証情報入力 部と、  An authentication information input unit that receives input of authentication information of a user permitted to provide a service; 認証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部とを備え、 上記提供装置制御部は、  An encryption unit that encrypts authentication information and creates encryption authentication information, and the providing device control unit includes: 上記認証情報入力部に入力された認証情報を上記暗号化部に暗号化させ、その 暗号ィ匕によって得られた暗号ィ匕認証情報を上記サービス利用装置に送信することを 特徴とする請求項 1に記載のサービス提供システム。  The authentication information input to the authentication information input unit is encrypted by the encryption unit, and the encryption key authentication information obtained by the encryption key is transmitted to the service using device. Service providing system described in 1. [4] 上記提供装置制御部は、 [4] The providing device control unit 上記暗号化認証情報を、放送網を介して上記サービス利用装置に送信することを 特徴とする請求項 3に記載のサービス提供システム。  4. The service providing system according to claim 3, wherein the encrypted authentication information is transmitted to the service using apparatus via a broadcast network. [5] 上記認証情報入力部は、サービスの提供を許可するサービス利用装置を識別する ための端末 IDの入力を受け付け、 [5] The authentication information input unit receives an input of a terminal ID for identifying a service using device permitted to provide a service, 上記提供装置制御部は、上記暗号化認証情報と端末 IDとを上記サービス利用装 置に送信することを特徴とする請求項 4に記載のサービス提供システム。  5. The service providing system according to claim 4, wherein the providing device control unit transmits the encrypted authentication information and the terminal ID to the service using device. [6] サービス利用装置と、サービス利用装置を当該サービス利用装置の要求するサー ビスを提供するサービス提供装置にネットワークを介して接続するサービス中継装置 と、サービス中継装置とネットワークを介して接続されるサービス提供装置とを含んで なるサービスシステムであって、 [6] A service use device, a service relay device that connects the service use device to a service providing device that provides a service requested by the service use device, and is connected to the service relay device via the network A service system comprising a service providing device, 上記サービス利用装置は、  The service using device is 要求するサービスを特定するためのユーザ力 の入力指示を受け付ける入力部と、 受信した暗号化認証情報を記憶する暗号記憶部と、  An input unit for receiving an input instruction of user power for specifying a requested service, an encryption storage unit for storing the received encrypted authentication information, 上記要求するサービスに対応する暗号化認証情報をサービス中継装置に送信す る利用装置制御部と、を備え、 Send encrypted authentication information corresponding to the requested service to the service relay device. A utilization device control unit, 上記サービス提供装置は、  The service providing apparatus includes: サービスの提供を許可するユーザの認証情報を記憶する認証情報記憶部と、 サービス中継装置から受信した認証情報を、上記認証情報記憶部に記憶したサー ビスの提供を許可するユーザの認証情報と照合する認証処理を行う認証処理部と、 を備え、  The authentication information storage unit that stores the authentication information of the user permitted to provide the service, and the authentication information received from the service relay device are compared with the authentication information of the user permitted to provide the service stored in the authentication information storage unit. An authentication processing unit for performing authentication processing to be performed, and 上記サービス中継装置は、  The service relay device 暗号化認証情報を復号化して復号化認証情報を作成する復号化部と、 サービス利用装置から暗号化認証情報を受信した場合に、当該暗号化情報を上 記復号化部に復号化させ、その復号化によって得られた復号化認証情報を当該暗 号ィ匕認証情報を送信してきたサービス利用装置の要求するサービスを提供するサー ビス提供装置に送信する中継制御部と、を備えて ヽることを特徴とするサービス提供 システム。  A decryption unit that decrypts the encrypted authentication information and creates the decryption authentication information; and when the encrypted authentication information is received from the service using device, the decryption unit decrypts the encrypted information, and A relay control unit for transmitting the decryption authentication information obtained by the decryption to the service providing device that provides the service requested by the service using device that has transmitted the encryption key authentication information. Service providing system characterized by 上記サービス提供装置は、上記認証処理の結果を示す認証結果情報を上記サー ビス中継装置に送信する提供制御部を備えており、  The service providing apparatus includes a provision control unit that transmits authentication result information indicating a result of the authentication processing to the service relay apparatus. 上記利用装置制御部は、  The utilization device controller is 上記要求するサービスに対応する暗号化認証情報が上記暗号記憶部に記憶され て!ヽるカゝ否かを判断し、上記要求するサービスに対応する暗号ィ匕認証情報が上記暗 号記憶部に記憶されていない場合には、上記入力部を介してユーザ力も入力される 上記要求するサービスに関する認証情報を初回認証情報としてサービス中継装置 に送信し、  It is determined whether the encryption authentication information corresponding to the requested service is stored in the encryption storage unit, and the encryption authentication information corresponding to the requested service is stored in the encryption storage unit. If it is not stored, user power is also input via the input unit. Authentication information regarding the requested service is transmitted to the service relay device as initial authentication information. 上記サービス中継装置は、  The service relay device 認証情報を暗号ィ匕して暗号ィ匕認証情報を作成する暗号ィ匕部を備えており、 上記中継制御部は、  An encryption unit that encrypts authentication information and creates encryption key authentication information, and the relay control unit includes: サービス利用装置力 初回認証情報を受信した場合には、受信した初回認証情報 をその初回認証情報を送信してきたサービス利用装置の要求するサービスを提供す るサービス提供装置に送信し、当該サービス提供装置から上記初回認証情報につ Vヽての認証処理に成功したことを示す認証処理結果を受信した場合に、当該初回認 証情報を上記暗号化部に暗号化させ、その暗号化によって得られた暗号化認証情 報を、当該初回認証情報を送信してきたサービス利用装置に返信することを特徴と する請求項 6に記載のサービス提供システム。 Service use device capability When the initial authentication information is received, the received first authentication information is transmitted to the service providing device that provides the service requested by the service using device that has transmitted the initial authentication information, and the service providing device When the authentication process result indicating that the authentication process for V is successful for the above initial authentication information is received from 7. The authentication information is encrypted by the encryption unit, and the encrypted authentication information obtained by the encryption is returned to the service using apparatus that transmitted the initial authentication information. Service provision system. [8] 上記利用装置制御部は、 [8] The utilization device control unit 複数のサービスの提供を要求する場合に、要求する各サービスについての上記初 回認証情報を一まとめにして上記サービス中継装置に送信し、  When requesting the provision of multiple services, the initial authentication information for each requested service is collectively sent to the service relay device, 上記中継制御部は、  The relay control unit 上記サービス利用装置力も受信した各初回認証情報を、ネットワークを介して接続 される複数のサービス提供装置の中カゝらそれぞれの初回認証情報に対応するサー ビスを提供するサービス提供装置を選択して送信し、  Select the service providing device that provides the service corresponding to each initial authentication information from among the plurality of service providing devices connected via the network. Send 各サービス提供装置から認証処理結果を受信すると、認証処理に成功した各初回 認証情報を上記暗号化部に暗号化させ、その暗号ィ匕によって得られた各暗号ィ匕認 証情報を、当該各初回認証情報を送信してきたサービス利用装置に返信することを 特徴とする請求項 7に記載のサービス提供システム。  When the authentication processing result is received from each service providing device, the initial authentication information that has been successfully authenticated is encrypted by the encryption unit, and each encryption authentication information obtained by the encryption key is stored in the corresponding encryption information. 8. The service providing system according to claim 7, wherein the service providing system replies to the service using apparatus that has transmitted the initial authentication information. [9] 上記利用装置制御部は、 [9] The utilization device control unit 複数のサービスの提供を要求する場合に、要求する各サービスについての暗号認 証情報が上記暗号記憶部に記憶されて!、るか否かを判断し、記憶されて!、な!/ヽ各サ 一ビスにつ 1、てのユーザ力もの認証情報の入力を受け付け、当該入力された認証情 報を初回認証情報としてサービス中継装置に送信し、  When requesting the provision of multiple services, the encryption authentication information for each requested service is stored in the encryption storage unit! Judge whether or not, remember! Wow! / ヽ Each service accepts input of authentication information of all user power, sends the input authentication information to the service relay device as initial authentication information, 上記中継制御部は、  The relay control unit 上記サービス利用装置力も受信した各初回認証情報を、ネットワークを介して接続 される複数のサービス提供装置の中カゝらそれぞれの初回認証情報に対応するサー ビスを提供するサービス提供装置を選択して送信し、  Select the service providing device that provides the service corresponding to each initial authentication information from among the plurality of service providing devices connected via the network. Send 各サービス提供装置から認証処理結果を受信すると、認証処理に成功した各初回 認証情報を上記暗号化部に暗号化させ、その暗号ィ匕によって得られた各暗号ィ匕認 証情報を、当該各初回認証情報を送信してきたサービス利用装置に返信することを 特徴とする請求項 7に記載のサービス提供システム。  When the authentication processing result is received from each service providing device, the initial authentication information that has been successfully authenticated is encrypted by the encryption unit, and each encryption authentication information obtained by the encryption key is stored in the corresponding encryption information. 8. The service providing system according to claim 7, wherein the service providing system replies to the service using apparatus that has transmitted the initial authentication information. [10] 上記サービス提供装置は、 サービスの提供を許可するユーザの認証情報を受け付ける認証情報入力部を備 え、 [10] The service providing apparatus includes: It has an authentication information input unit that accepts authentication information of users who are allowed to provide services. 上記提供装置制御部は、  The providing device control unit 上記認証情報入力部から入力された認証情報をサービス中継装置に送信し、 上記サービス中継装置は、  The authentication information input from the authentication information input unit is transmitted to a service relay device. 認証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部を備え、  A cryptographic key section for encrypting the authentication information to create the cryptographic key authentication information, 上記中継制御部は、  The relay control unit サービス提供装置から認証情報を受信した場合に、当該認証情報を上記暗号ィ匕 部に暗号化させ、その暗号ィ匕によって得られた暗号ィ匕認証情報を上記サービス利用 装置に送信することを特徴とする請求項 7に記載のサービス提供システム。  When the authentication information is received from the service providing device, the authentication information is encrypted by the encryption key unit, and the encryption key authentication information obtained by the encryption key is transmitted to the service using device. The service providing system according to claim 7. [11] 上記サービス中継装置は、 [11] The service relay device 認証情報および当該認証情報を用いて認証処理を行うサービス提供装置を特定 する情報の入力を受け付ける認証情報入力部と、  An authentication information input unit that receives input of authentication information and information specifying a service providing apparatus that performs authentication processing using the authentication information; 認証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部とを備え、 上記中継制御部は、  An encryption unit that encrypts authentication information and creates encryption authentication information, and the relay control unit includes: 上記認証情報入力部を介して入力された認証情報を、当該認証情報を用いて認 証処理を行うサービス提供装置に送信し、当該サービス提供装置から認証処理に成 功したことを示す認証処理結果を受信した場合に、当該認証に成功した認証情報を 上記暗号化部に暗号化させ、その暗号化によって得られた暗号化認証情報を上記 サービス利用装置に送信することを特徴とする請求項 7に記載のサービス提供システ ム。  Authentication processing result indicating that the authentication information input via the authentication information input unit is transmitted to a service providing apparatus that performs authentication processing using the authentication information, and that the authentication processing is successful from the service providing apparatus. 8. When receiving the authentication information, the authentication information successful in the authentication is encrypted by the encryption unit, and the encrypted authentication information obtained by the encryption is transmitted to the service using device. Service providing system described in 1. [12] 上記中継制御部は、  [12] The relay control unit 上記暗号化認証情報を、放送網を介して上記サービス利用装置に送信することを 特徴とする請求項 10または 11に記載のサービス提供システム。  12. The service providing system according to claim 10, wherein the encrypted authentication information is transmitted to the service using device via a broadcast network. [13] 上記中継制御部は、 [13] The relay control unit 上記暗号化認証情報とともに、サービスの提供を許可するサービス利用装置を識 別するための端末 IDを上記サービス利用装置に送信することを特徴とする請求項 1 2に記載のサービス提供システム。 [14] 上記利用装置制御部は、 The service providing system according to claim 12, wherein a terminal ID for identifying a service using device permitted to provide a service is transmitted to the service using device together with the encrypted authentication information. [14] The utilization device control unit 複数のサービスの提供を要求する場合に、要求する各サービスについての暗号ィ匕 認証情報が上記暗号記憶部に記憶されて 、る力否かを判断し、各サービスにつ 、て の暗号化認証情報が記憶されて ヽる場合には、当該各暗号化認証情報を上記サー ビス中継装置に送信し、  When requesting the provision of a plurality of services, the encryption authentication information for each requested service is stored in the encryption storage unit, and it is determined whether or not it is powerful. If the information is stored, the encrypted authentication information is sent to the service relay device, and 上記中継制御部は、  The relay control unit 上記サービス利用装置から受信した各暗号化認証情報を上記復号化部に復号ィ匕 させ、その復号ィ匕によって得られた復号ィ匕認証情報を、ネットワークを介して接続さ れる複数のサービス提供装置の中からそれぞれの復号ィ匕認証情報に対応するサー ビスを提供するサービス提供装置を選択して送信し、  A plurality of service providing devices connected to each other through the network by causing the decryption unit to decrypt each encrypted authentication information received from the service using device, and decrypting the authentication information obtained by the decryption The service providing device that provides the service corresponding to each decryption key authentication information is selected and transmitted, 上記各サービス提供装置カゝらサービス内容を受信するとともに、受信したサービス 内容を一まとめにして上記サービスの提供を要求したサービス利用装置に返信する ことを特徴とする請求項 7に記載のサービス提供システム。  8. The service provision according to claim 7, wherein the service contents are received from each of the service provision apparatuses, and the received service contents are collectively returned to the service use apparatus that has requested the provision of the service. system. [15] サービス提供装置力 サービスの提供を受けるサービス利用装置であって、 [15] Service providing device capability A service using device that receives a service, 要求するサービスを特定するためのユーザ力 の入力指示を受け付ける入力部と、 受信した暗号化認証情報を記憶する暗号記憶部と、  An input unit for receiving an input instruction of user power for specifying a requested service, an encryption storage unit for storing the received encrypted authentication information, 上記要求するサービスに対応する暗号化認証情報を上記要求するサービスを提供 するサービス提供装置に送信する利用装置制御部と、を備えていることを特徴とする サービス利用装置。  A service utilization apparatus comprising: a utilization apparatus control unit that transmits encrypted authentication information corresponding to the requested service to a service provision apparatus that provides the requested service. [16] 上記利用装置制御部は、 [16] The utilization device control unit 上記要求するサービスに対応する暗号化認証情報が上記暗号記憶部に記憶され て!、る力否かを判断し、記憶されて 、な 、場合には上記入力部を介してユーザから 入力される上記要求するサービスに関する認証情報を初回認証情報として当該サー ビスを提供するサービス提供装置に送信することを特徴とする請求項 15に記載のサ 一ビス利用装置。  The encryption authentication information corresponding to the requested service is stored in the encryption storage unit !, and is stored in the encryption storage unit. In such a case, it is input from the user via the input unit. 16. The service using apparatus according to claim 15, wherein authentication information related to the requested service is transmitted as initial authentication information to a service providing apparatus that provides the service. [17] 放送網を用いて送信された暗号ィ匕認証情報と端末 IDとを受信する受信部と、 受信した端末 IDが当該サービス利用装置に対応する端末 IDであるかどうかを判定 する端末 ID判定部とを備え、 上記利用装置制御部は、 [17] A receiving unit that receives the encryption key authentication information and the terminal ID transmitted using the broadcast network, and a terminal ID that determines whether the received terminal ID is a terminal ID corresponding to the service using device. A determination unit, The utilization device controller is 受信した端末 IDが当該サービス利用装置に対応する端末 IDである場合に、当該 端末 IDとともに受信した暗号化認証情報を上記暗号記憶部に記憶させることを特徴 とする請求項 15に記載のサービス利用装置。  The service use according to claim 15, wherein when the received terminal ID is a terminal ID corresponding to the service using device, the encrypted authentication information received together with the terminal ID is stored in the encryption storage unit. apparatus. [18] サービス中継装置を介して上記サービス提供装置と通信を行うことを特徴とする請 求項 15に記載のサービス利用装置。 [18] The service utilization device according to claim 15, wherein the service utilization device communicates with the service providing device via a service relay device. [19] サービス利用装置にサービスを提供するサービス提供装置であって、 [19] A service providing device that provides a service to a service using device, サービスの提供を許可するユーザの認証情報を記憶する認証情報記憶部と、 サービスの提供を要求してきたユーザの認証情報を、上記認証情報記憶部に記憶 したサービスの提供を許可するユーザの認証情報と照合する認証処理を行う認証処 理部と、  Authentication information storage unit for storing authentication information of a user who is permitted to provide a service, and authentication information of a user who is permitted to provide a service stored in the authentication information storage unit in which the authentication information of a user who has requested to provide a service is stored. An authentication processing unit that performs an authentication process for checking with 認証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部と、  An encryption part for encrypting authentication information to create encryption key authentication information; 暗号化認証情報を復号化して復号化認証情報を作成する復号化部と、 初回認証情報を受信した場合には、当該初回認証情報の認証処理を上記認証処 理部に行わせ、当該初回認証情報の認証に成功した場合に、上記暗号ィ匕部に当該 初回認証情報を暗号化させ、その暗号ィ匕によって得られた暗号ィ匕認証情報を返信し 暗号化認証情報を受信した場合には、受信した暗号化認証情報を上記復号化部 に復号ィヒさせ、その復号化によって得られる復号化認証情報の認証処理を上記認 証処理部に行わせる提供装置制御部と、を備えていることを特徴とするサービス提供 装置。  A decryption unit that decrypts encrypted authentication information to create decryption authentication information, and when initial authentication information is received, causes the authentication processing unit to perform authentication processing of the initial authentication information, and When the authentication of the information is successful, the initial authentication information is encrypted in the encryption key part, the encryption authentication information obtained by the encryption key is returned, and the encrypted authentication information is received. A providing device control unit that causes the decryption unit to decrypt the received encrypted authentication information and causes the authentication processing unit to perform authentication processing of the decryption authentication information obtained by the decryption. A service providing apparatus characterized by that. [20] サービス利用装置にサービスを提供するサービス提供装置であって、  [20] A service providing device that provides a service to a service using device, サービスの提供を許可するユーザの認証情報を記憶する認証情報記憶部と、 サービスの提供を要求してきたユーザの認証情報を、上記認証情報記憶部に記憶 したサービスの提供を許可するユーザの認証情報と照合する認証処理を行う認証処 理部と、  Authentication information storage unit for storing authentication information of a user who is permitted to provide a service, and authentication information of a user who is permitted to provide a service stored in the authentication information storage unit in which the authentication information of a user who has requested to provide a service is stored. An authentication processing unit that performs an authentication process for checking with サービスの提供を許可するユーザの認証情報の入力を受け付ける認証情報入力 部と、 認証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部と、 An authentication information input unit that receives input of authentication information of a user permitted to provide a service; An encryption part for encrypting authentication information to create encryption key authentication information; サービスの提供を許可するユーザの認証情報を上記暗号ィ匕部に暗号化させ、その 暗号ィ匕によって得られた暗号ィ匕認証情報を上記サービス利用装置に送信する提供 装置制御部を備えていることを特徴とするサービス提供装置。  A providing device control unit for encrypting authentication information of a user permitted to provide a service in the encryption key unit and transmitting the encryption key authentication information obtained by the encryption key to the service using device; A service providing apparatus characterized by that. [21] 上記提供装置制御部は、  [21] The providing device control unit includes: 上記暗号化認証情報を、放送網を介して上記サービス利用装置に送信することを 特徴とする請求項 20に記載のサービス提供装置。  21. The service providing apparatus according to claim 20, wherein the encrypted authentication information is transmitted to the service using apparatus via a broadcast network. [22] 上記認証情報入力部は、サービスの提供を許可するサービス利用装置を識別する ための端末 IDの入力を受け付け、 [22] The authentication information input unit receives an input of a terminal ID for identifying a service using device permitted to provide a service, 上記提供装置制御部は、上記暗号化認証情報と端末 IDとを上記サービス利用装 置に送信することを特徴とする請求項 21に記載のサービス提供装置。  The service providing apparatus according to claim 21, wherein the providing apparatus control unit transmits the encrypted authentication information and the terminal ID to the service using apparatus. [23] サービス利用装置と上記サービス利用装置にサービスを提供するサービス提供装 置とを中継するサービス中継装置であって、 [23] A service relay device that relays between a service using device and a service providing device that provides a service to the service using device, 認証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部と、  An encryption part for encrypting authentication information to create encryption key authentication information; 暗号化認証情報を復号化して復号化認証情報を作成する復号化部と、 サービス利用装置力 初回認証情報を受信した場合には、受信した初回認証情報 を上記サービスを提供するサービス提供装置に送信し、  Decryption unit that decrypts encrypted authentication information to create decryption authentication information, and service use device power When initial authentication information is received, the received initial authentication information is transmitted to the service providing device that provides the service And サービス利用装置から暗号化認証情報を受信した場合には、当該暗号化情報を 上記復号ィ匕部に復号化させ、その復号ィ匕によって得られた復号ィ匕認証情報を上記 サービス提供装置に送信し、  When receiving encrypted authentication information from the service using device, the decryption key is decrypted by the decryption key, and the decryption key authentication information obtained by the decryption key is transmitted to the service providing device. And 上記初回認証情報をサービス提供装置に送信した場合であって、当該サービス提 供装置からその初回認証情報についての認証処理に成功したことを示す認証処理 結果を受信した場合に、当該初回認証情報を上記暗号ィ匕部に暗号化させ、その暗 号ィ匕によって得られた暗号ィ匕認証情報を、当該初回認証情報を送信してきたサービ ス利用装置に返信する中継制御部と、を備えていることを特徴とするサービス中継装 置。  When the initial authentication information is transmitted to the service providing apparatus and the authentication process result indicating that the authentication process for the initial authentication information is successful is received from the service providing apparatus, the initial authentication information is A relay control unit that encrypts the cipher key unit and returns the cipher key authentication information obtained by the cipher key to the service using device that has transmitted the initial authentication information. This is a service relay device. [24] サービス利用装置と上記サービス利用装置にサービスを提供するサービス提供装 置とを中継するサービス中継装置であって、 認証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部と、 [24] A service relay device that relays between a service using device and a service providing device that provides a service to the service using device, An encryption part for encrypting authentication information to create encryption key authentication information; サービス提供装置カゝら受信したサービスの提供を許可するユーザの認証情報を上 記暗号化部に暗号化させ、その暗号化によって得られた暗号化認証情報を上記サ 一ビス利用装置に送信する中継制御部とを備えていることを特徴とするサービス中継 装置。  The authentication information of the user permitted to provide the service received from the service providing device is encrypted by the encryption unit, and the encrypted authentication information obtained by the encryption is transmitted to the service using device. A service relay device comprising a relay control unit. [25] サービス利用装置と上記サービス利用装置にサービスを提供するサービス提供装 置とを中継するサービス中継装置であって、  [25] A service relay device that relays between a service using device and a service providing device that provides a service to the service using device, 認証情報および当該認証情報を用いて認証処理を行うサービス提供装置を特定 する情報の入力を受け付ける認証情報入力部と、  An authentication information input unit that receives input of authentication information and information specifying a service providing apparatus that performs authentication processing using the authentication information; 認証情報を暗号化して暗号ィ匕認証情報を作成する暗号ィ匕部と、  An encryption part for encrypting authentication information to create encryption key authentication information; 上記認証情報入力部を介して入力された認証情報を、当該認証情報を用いて認 証処理を行うサービス提供装置に送信し、当該サービス提供装置から認証処理に成 功したことを示す認証処理結果を受信した場合に、当該認証に成功した認証情報を 上記暗号化部に暗号化させ、その暗号化によって得られた暗号化認証情報を上記 サービス利用装置に送信する中継制御部とを備えていることを特徴とするサービス中 継装置。  Authentication processing result indicating that the authentication information input via the authentication information input unit is transmitted to a service providing apparatus that performs authentication processing using the authentication information, and that the authentication processing is successful from the service providing apparatus. A relay control unit that causes the encryption unit to encrypt authentication information that has been successfully authenticated, and transmits the encrypted authentication information obtained by the encryption to the service using device. Service relay device characterized by this. [26] 上記中継制御部は、 [26] The relay control unit 上記暗号化認証情報を、放送網を介して上記サービス利用装置に送信することを 特徴とする請求項 24または 25に記載のサービス中継装置。  26. The service relay device according to claim 24, wherein the encrypted authentication information is transmitted to the service utilization device via a broadcast network. [27] 上記中継制御部は、 [27] The relay control unit 上記暗号化認証情報とともに、サービスの提供を許可するサービス利用装置を識 別するための端末 IDを上記サービス利用装置に送信することを特徴とする請求項 2 6に記載のサービス中継装置。  27. The service relay apparatus according to claim 26, wherein a terminal ID for identifying a service utilization apparatus permitted to provide a service is transmitted to the service utilization apparatus together with the encrypted authentication information. [28] サービス利用装置と、ネットワークを介して接続されるサービス利用装置力もの要求 に応じて所定のサービスを提供するサービス提供装置とを含んでなるサービス提供 システムにおいてサービスを要求するユーザを認証する認証方法であって、 サービスの提供を許可するユーザの認証情報を暗号化して暗号化認証情報を生 成する暗号化工程と、 上記暗号化認証情報をサービス利用装置に記憶させる暗号記憶工程と、 要求するサービスを特定するためのユーザ力 の入力指示を上記サービス利用装 置において受け付ける入力工程と、 [28] Authenticates a user who requests a service in a service providing system including a service using device and a service providing device that provides a predetermined service in response to a request from a service using device connected via a network An encryption method for generating encrypted authentication information by encrypting authentication information of a user permitted to provide a service; and An encryption storage step of storing the encrypted authentication information in the service using device; an input step of accepting an input instruction of user power for specifying the requested service in the service using device; 上記要求するサービスに対応する暗号化認証情報を上記サービス利用装置から サービス提供装置に送信するサービス要求工程と、  A service requesting step for transmitting encrypted authentication information corresponding to the requested service from the service using device to the service providing device; 上記送信された暗号ィ匕認証情報を復号化して復号ィ匕認証情報を作成する復号ィ匕 工程と、  A decryption step for decrypting the transmitted encryption key authentication information to create decryption key authentication information; 上記復号化認証情報をサービスの提供を許可するユーザの認証情報と照合する 認証処理工程と、を含むことを特徴とする認証方法。  An authentication method comprising: an authentication processing step of collating the decrypted authentication information with authentication information of a user permitted to provide a service. [29] 上記入力指示によって特定されるサービスにつ 、ての暗号ィ匕認証情報がサービス 利用装置に記憶されているかどうかを判定する判定工程と、  [29] For a service specified by the input instruction, a determination step for determining whether or not all encryption authentication information is stored in the service using device; 上記入力指示によって特定されるサービスについての暗号ィ匕認証情報がサービス 利用装置に記憶されて 、な 、場合に、ユーザからの認証情報の入力を受け付ける 初回認証情報入力工程と、  In the case where the encryption key authentication information for the service specified by the input instruction is stored in the service using device, an initial authentication information input step for accepting input of authentication information from the user, 上記初回認証情報入力工程で入力された認証情報を、サービスの提供を許可す るユーザの認証情報と照合する初回認証処理工程とを含み、  Including a first authentication processing step of verifying the authentication information input in the first authentication information input step with the authentication information of a user permitted to provide the service, 上記認証処理工程の結果、上記初回認証情報入力工程で入力された認証情報が サービスの提供を許可するユーザの認証情報と一致した場合に、当該認証情報を暗 号化して暗号化認証情報を作成する暗号化工程と、上記暗号化認証情報をサービ ス利用装置に記憶させる暗号記憶工程とを行うことを特徴とする請求項 28に記載の 認証方法。  As a result of the authentication process, if the authentication information entered in the initial authentication information input process matches the authentication information of the user permitted to provide the service, the authentication information is encrypted to create encrypted authentication information. 30. The authentication method according to claim 28, further comprising: an encryption step for performing encryption, and an encryption storage step for storing the encrypted authentication information in a service using device. [30] 上記暗号化工程および上記復号化工程を、上記サービス利用装置とサービス提供 装置とを中継するサービス中継装置において実行することを特徴とする請求項 28に 記載の認証方法。  30. The authentication method according to claim 28, wherein the encryption step and the decryption step are executed in a service relay device that relays between the service using device and the service providing device. [31] 請求項 28に記載した認証方法における各工程の処理を、コンピュータに実行させ るための認証プログラム。  [31] An authentication program for causing a computer to execute processing of each step in the authentication method according to claim 28. [32] 請求項 28に記載した認証方法における暗号記憶工程、入力工程、サービス要求 工程の処理を、上記サービス利用装置に備えられたコンピュータまたは上記サービ ス利用装置に接続されたコンピュータに実行させるための認証プログラム。 [32] The computer or the service provided in the service using device performs the processes of the encryption storage step, the input step, and the service request step in the authentication method according to claim 28. An authentication program to be executed by a computer connected to a device using a service. [33] 請求項 28に記載の認証方法における、暗号ィ匕工程、復号ィ匕工程、認証処理工程 の処理を、上記サービス提供装置に備えられたコンピュータまたは上記サービス提 供装置に接続されたコンピュータに実行させるための認証プログラム。  [33] A computer provided in the service providing apparatus or a computer connected to the service providing apparatus for performing the encryption process, the decryption process, and the authentication process in the authentication method according to claim 28. Authentication program to be executed. [34] 請求項 28に記載の認証方法における、暗号ィ匕工程および復号ィ匕工程の処理を、 上記サービス利用装置とサービス提供装置とを中継するサービス中継装置に備えら れたコンピュータまたは上記サービス中継装置に接続されたコンピュータに実行させ るための認証プログラム。  [34] The computer or the service provided in the service relay device that relays the encryption process and the decryption process in the authentication method according to claim 28 between the service utilization device and the service providing device. An authentication program that is executed by a computer connected to a relay device. [35] 請求項 31〜34のいずれか 1項に記載の認証プログラムを記録した、コンピュータ 読み取り可能な記録媒体。  [35] A computer-readable recording medium on which the authentication program according to any one of claims 31 to 34 is recorded.
PCT/JP2005/017757 2005-04-18 2005-09-27 Service providing system, service utilization device, service providing device, service relay device, authentication method, authentication program, and recording medium for the program Ceased WO2006114906A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2007514452A JP4627316B2 (en) 2005-04-18 2005-09-27 Service providing system, authentication method, authentication program, and recording medium therefor

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2005120213 2005-04-18
JP2005-120213 2005-04-18
JP2005-252771 2005-08-31
JP2005252771 2005-08-31

Publications (1)

Publication Number Publication Date
WO2006114906A1 true WO2006114906A1 (en) 2006-11-02

Family

ID=37214540

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/017757 Ceased WO2006114906A1 (en) 2005-04-18 2005-09-27 Service providing system, service utilization device, service providing device, service relay device, authentication method, authentication program, and recording medium for the program

Country Status (2)

Country Link
JP (1) JP4627316B2 (en)
WO (1) WO2006114906A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008181253A (en) * 2007-01-23 2008-08-07 Nippon Telegr & Teleph Corp <Ntt> Authentication apparatus, authentication method, and authentication program
JP2009237774A (en) * 2008-03-26 2009-10-15 Advanced Media Inc Authentication server, service providing server, authentication method, communication terminal, and log-in method
JP2012191270A (en) * 2011-03-08 2012-10-04 Kddi Corp Authentication system, terminal apparatus, authentication server and program
JP2018107667A (en) * 2016-12-27 2018-07-05 大日本印刷株式会社 Electronic information storage medium, authentication system, authentication method, and authentication application program
JP2021197134A (en) * 2020-06-11 2021-12-27 株式会社Osk Information processing apparatus, control method of computer, and control program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05227162A (en) * 1992-02-13 1993-09-03 Fuji Xerox Co Ltd Network connecting device
JP2002183094A (en) * 2000-12-19 2002-06-28 Nec Corp Cooperative system for log-in among a plurality of servers, client device, log-in management device, server device and storage medium
JP2002198957A (en) * 2000-10-19 2002-07-12 Sony Corp Wireless communication system, client device, server device, and wireless communication method
JP2003186764A (en) * 2001-09-27 2003-07-04 Hewlett Packard Co <Hp> Communication network with controlled access to web resources
JP2004032311A (en) * 2002-06-25 2004-01-29 Nec Corp Method, system and program for confirming pki certificate

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4303988B2 (en) * 2003-03-18 2009-07-29 大日本印刷株式会社 User authentication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05227162A (en) * 1992-02-13 1993-09-03 Fuji Xerox Co Ltd Network connecting device
JP2002198957A (en) * 2000-10-19 2002-07-12 Sony Corp Wireless communication system, client device, server device, and wireless communication method
JP2002183094A (en) * 2000-12-19 2002-06-28 Nec Corp Cooperative system for log-in among a plurality of servers, client device, log-in management device, server device and storage medium
JP2003186764A (en) * 2001-09-27 2003-07-04 Hewlett Packard Co <Hp> Communication network with controlled access to web resources
JP2004032311A (en) * 2002-06-25 2004-01-29 Nec Corp Method, system and program for confirming pki certificate

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
TAHIRA S. AND SATO N.: "Nyumon e Business Web Marketing", NIPPON JITSUGYO PUBLISHING CO., LTD., vol. 1ST EDITION, 30 September 2000 (2000-09-30), pages 72, XP003004091 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008181253A (en) * 2007-01-23 2008-08-07 Nippon Telegr & Teleph Corp <Ntt> Authentication apparatus, authentication method, and authentication program
JP2009237774A (en) * 2008-03-26 2009-10-15 Advanced Media Inc Authentication server, service providing server, authentication method, communication terminal, and log-in method
JP2012191270A (en) * 2011-03-08 2012-10-04 Kddi Corp Authentication system, terminal apparatus, authentication server and program
JP2018107667A (en) * 2016-12-27 2018-07-05 大日本印刷株式会社 Electronic information storage medium, authentication system, authentication method, and authentication application program
JP2021197134A (en) * 2020-06-11 2021-12-27 株式会社Osk Information processing apparatus, control method of computer, and control program

Also Published As

Publication number Publication date
JP4627316B2 (en) 2011-02-09
JPWO2006114906A1 (en) 2008-12-11

Similar Documents

Publication Publication Date Title
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
JP4907895B2 (en) Method and system for recovering password-protected private data over a communication network without exposing the private data
US9430211B2 (en) System and method for sharing information in a private ecosystem
US10397008B2 (en) Management of secret data items used for server authentication
CN113179323B (en) HTTPS request processing method, device and system for load balancing equipment
KR20030094337A (en) Controlled distribution of application code and content data within a computer network
CN112039826A (en) Login method and device applied to applet terminal
US10230762B2 (en) System and method for sharing information in a private ecosystem
WO2016188127A1 (en) Virtual keyboard-based encryption method and apparatus
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
Zubair et al. A hybrid algorithm-based optimization protocol to ensure data security in the cloud
CN110881015B (en) System and method for processing user information
CN114448629A (en) Identity authentication method and device, storage medium and electronic equipment
US20100088743A1 (en) Personal-information managing apparatus and personal-information handling apparatus
JP2011221729A (en) Id linking system
JP4979210B2 (en) Login information management apparatus and method
JP4627316B2 (en) Service providing system, authentication method, authentication program, and recording medium therefor
CN118349988A (en) Unified authentication method, device, equipment and storage medium for application program
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
CN114978620B (en) Encryption method and decryption method of identity identification number
EP4123534A1 (en) Transaction security techniques
CN116318776A (en) Digital identity login method, device, computer equipment and storage medium
WO2023145240A1 (en) Information processing device and information processing system
US20040267870A1 (en) Method of single sign-on emphasizing privacy and minimal user maintenance
CN113645239A (en) Application login method and device, user terminal and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2007514452

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU

WWW Wipo information: withdrawn in national office

Country of ref document: RU

122 Ep: pct application non-entry in european phase

Ref document number: 05787765

Country of ref document: EP

Kind code of ref document: A1

WWW Wipo information: withdrawn in national office

Ref document number: 5787765

Country of ref document: EP