×

Proxy system for security processing without entrusting certified secret information to a proxy

  • US 9,729,311 B2
  • Filed: 09/28/2012
  • Issued: 08/08/2017
  • Est. Priority Date: 09/29/2011
  • Status: Active Grant
First Claim
Patent Images

1. A security processing proxy system, comprising:

  • a first communication unit in a wireless multihop network that communicates with a further network, the first communication unit being one of a plurality of multihop communication units that relay messages among themselves in hops so as to communicate with the further network;

    a second communication unit outside the wireless multihop network which communicates with the further network; and

    a proxy server between the wireless multihop network and the further network which communicates with the further network and which acts for said first communication unit to conduct security processing with said second communication unit via the further communication network, the security processing including key exchange processing, authentication processing, or processing for providing compatibility of an encryption scheme,wherein each of the second communication unit and the proxy server is connected to the further network independently of each other, and the wireless multihop network is connected to the further network via the proxy server,wherein said first communication unit holds a public key of said first communication unit certified by a certification authority on a public key infrastructure (PKI) as well as secret information associated with a public key certificate of said first communication unit,wherein said first communication unit includes;

    a delegation information generator using the secret information of said first communication unit to generate delegation information required for the security processing; and

    a delegation information notifier supplying the delegation information to said proxy server via the multihop network,wherein said proxy server includes;

    a delegation information acquirer acquiring the delegation information from said first communication unit; and

    a security processing proxy transmitting the delegation information to said second communication unit via the further network to perform the security processing with said second communication unit,wherein said second communication unit includes;

    a receiver receiving the delegation information from said proxy server via the further network; and

    a security processor using a certification authority public key held for verifying the public key certificate as being issued by the certification authority on the PKI to certify that the delegation information is generated by said first communication unit to thereby carry out the security processing with said proxy server, andwherein at least one of said first communication unit, said second communication unit, and said proxy server is implemented on a computer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×