MOBILE TERMINAL, DATA COMMUNICATION METHOD, AND COMPUTER PROGRAM
First Claim
1. A mobile terminal comprising:
- a near-field communication device capable of performing near-field wireless communication with an external device; and
a controller configured to instruct the external device or the near-field communication device to execute a command, wherein the near-field communication device has a storage unit in which a controller authentication key storage area for storing a controller authentication key used for mutual authentication with the controller and an external device access key storage area for storing an external device access key used for accessing the external device are allocated, a first mutual authentication unit for authenticating, in response to a mutual authentication request given by the controller, the controller as being valid on the basis of the controller authentication key and for requesting the controller to authenticate the near-field communication device as being valid, a first communication key setting unit for setting a first communication key used between the controller and the near-field communication device on the basis of a result of the authentication operation performed by the first mutual authentication unit, a second mutual authentication unit for authenticating, in response to a mutual authentication request applied between the near-field communication device and the external device given by the controller, the external device as being valid on the basis of the external device access key and for requesting the external device to authenticate the near-field communication device as being valid, and a second communication key setting unit for setting a second communication key used between the near-field communication device and the external device on the basis of a result of the authentication operation performed by the second mutual authentication unit, and wherein the controller and the near-field communication device, which have authenticated each other, perform secure communication using the first communication key, and the near-field communication device and the external device, which have authenticated each other, perform secure communication using the second communication key.
2 Assignments
0 Petitions
Accused Products
Abstract
A mobile terminal includes a near-field communication device capable of performing near-field wireless communication with an external device, and a controller configured to instruct the external device or the near-field communication device to execute a command. The near-field communication device has a storage unit, a first mutual authentication unit for authenticating the controller and for requesting the controller to authenticate the near-field communication device, a first communication key setting unit for setting a first communication key, a second mutual authentication unit for authenticating the external device and for requesting the external device to authenticate the near-field communication device, and a second communication key setting unit for setting a second communication key. The controller and the near-field communication device perform secure communication using the first communication key, and the near-field communication device and the external device perform secure communication using the second communication key.
196 Citations
7 Claims
-
1. A mobile terminal comprising:
-
a near-field communication device capable of performing near-field wireless communication with an external device; and
a controller configured to instruct the external device or the near-field communication device to execute a command, wherein the near-field communication device has a storage unit in which a controller authentication key storage area for storing a controller authentication key used for mutual authentication with the controller and an external device access key storage area for storing an external device access key used for accessing the external device are allocated, a first mutual authentication unit for authenticating, in response to a mutual authentication request given by the controller, the controller as being valid on the basis of the controller authentication key and for requesting the controller to authenticate the near-field communication device as being valid, a first communication key setting unit for setting a first communication key used between the controller and the near-field communication device on the basis of a result of the authentication operation performed by the first mutual authentication unit, a second mutual authentication unit for authenticating, in response to a mutual authentication request applied between the near-field communication device and the external device given by the controller, the external device as being valid on the basis of the external device access key and for requesting the external device to authenticate the near-field communication device as being valid, and a second communication key setting unit for setting a second communication key used between the near-field communication device and the external device on the basis of a result of the authentication operation performed by the second mutual authentication unit, and wherein the controller and the near-field communication device, which have authenticated each other, perform secure communication using the first communication key, and the near-field communication device and the external device, which have authenticated each other, perform secure communication using the second communication key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A data communication method for a mobile terminal having a near-field communication device capable of performing near-field wireless communication with an external device and a controller configured to instruct the external device or the near-field communication device to execute a command, the method comprising:
-
a step of allocating a controller authentication key storage area for storing a controller authentication key used for mutual authentication with the controller and an external device access key storage area for storing an external device access key used for accessing the external device in a storage unit included in the near-field communication device;
a first mutual authentication step of authenticating, in response to a mutual authentication request given by the controller, the controller as being valid on the basis of the controller authentication key and of requesting the controller to authenticate the near-field communication device as being valid;
a first communication key setting step of setting a first communication key used between the controller and the near-field communication device on the basis of a result of the authentication operation performed at the first mutual authentication step;
a second mutual authentication step of authenticating, in response to a mutual authentication request applied between the near-field communication device and the external device given by the controller, the external device as being valid on the basis of the external device access key and of requesting the external device to authenticate the near-field communication device as being valid; and
a second communication key setting step of setting a second communication key used between the near-field communication device and the external device on the basis of a result of the authentication operation performed at the second mutual authentication step, and wherein the controller and the near-field communication device, which have authenticated each other, perform secure communication using the first communication key, and the near-field communication device and the external device, which have authenticated each other, perform secure communication using the second communication key.
-
-
7. A computer program causing a mobile terminal to execute a data communication process, the mobile terminal having a near-field communication device capable of performing near-field wireless communication with an external device and a controller configured to instruct the external device or the near-field communication device to execute a command, the process comprising:
-
a step of allocating a controller authentication key storage area for storing a controller authentication key used for mutual authentication with the controller and an external device access key storage area for storing an external device access key used for accessing the external device in a storage unit included in the near-field communication device;
a first mutual authentication step of authenticating, in response to a mutual authentication request given by the controller, the controller as being valid on the basis of the controller authentication key and of requesting the controller to authenticate the near-field communication device as being valid;
a first communication key setting step of setting a first communication key used between the controller and the near-field communication device on the basis of a result of the authentication operation performed at the first mutual authentication step;
a second mutual authentication step of authenticating, in response to a mutual authentication request applied between the near-field communication device and the external device given by the controller, the external device as being valid on the basis of the external device access key and of requesting the external device to authenticate the near-field communication device as being valid; and
a second communication key setting step of setting a second communication key used between the near-field communication device and the external device on the basis of a result of the authentication operation performed at the second mutual authentication step, and wherein the controller and the near-field communication device, which have authenticated each other, perform secure communication using the first communication key, and the near-field communication device and the external device, which have authenticated each other, perform secure communication using the second communication key.
-
Specification