Information processing device, information processing method, and computer program

ABSTRACT

There is provided an information processing device including an information storage unit configured to store information about a state in which a first secret key used during authentication is held in devices, and information about connection between the devices, and a communication unit configured to send the first secret key so that the first secret key is delivered to the devices based on the information stored in the information storage unit.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of Japanese Priority PatentApplication JP 2013-254030 filed Dec. 9, 2013, the entire contents ofwhich are incorporated herein by reference.

BACKGROUND

The present disclosure relates to information processing devices,information processing methods, and computer programs.

Because of the widespread use of small-size and high-performance mobiletelephones called smartphones and the advent of small-size devicescalled wearable devices, which can be put on the arm, face, etc., thereare increasing opportunities to use these devices as an authenticationdevice for authentication to obtain various services.

A service is contemplated in which a public facility, a company, etc.,temporarily lends an authentication device to a user to allow the userto use a system without associating the individual to the authenticationdevice. For example, an authentication device might be temporarily lentto a user in order to provide authentication to use equipment, such as aPC, etc., which is lent by a public facility or a company, or in orderto unlock or lock the entrance to a facility. As the number ofauthentication devices thus increases, there is a demand for moreefficient maintenance of secret keys for authentication. For example, JP2000-224163A describes a technique of transmitting information forunlocking a door to enter a room between a plurality of keys and aplurality of locks to update the information.

SUMMARY

JP 2000-224163A above discloses a technique of causing all keys andlocks to store and transmit all information which should be delivered.Therefore, in the technique disclosed in JP 2000-224163A above, as thenumber of keys or locks increases, the amount of information whichshould be delivered increases inevitably. Some keys may not have achance to encounter some or most of the locks. Nevertheless, allinformation about access right is stored in each key and lock.Therefore, the amount of memory usage in each key and lock adverselyincreases, and also, the amount of communication traffic between eachkey and each lock adversely increases.

Therefore, the present disclosure proposes a novel and improvedinformation processing device, information processing method, andcomputer program which can efficiently maintain a secret key forauthentication by using information about connection between devices.

According to an embodiment of the present disclosure, there is providedan information processing device including an information storage unitconfigured to store information about a state in which a first secretkey used during authentication is held in devices, and information aboutconnection between the devices, and a communication unit configured tosend the first secret key so that the first secret key is delivered tothe devices based on the information stored in the information storageunit.

According to another embodiment of the present disclosure, there isprovided an information processing method including storing informationabout a state in which a first secret key used during authentication isheld in devices, and information about connection between the devices,and sending the first secret key so that the first secret key isdelivered to the devices based on the stored information.

According to another embodiment of the present disclosure, there isprovided a program for causing a computer to execute storing informationabout a state in which a first secret key used during authentication isheld in devices, and information about connection between the devices,and sending the first secret key so that the first secret key isdelivered to the devices based on the stored information.

As described above, according to the present disclosure, a novel andimproved information processing device, information processing method,and computer program can be provided which can efficiently maintain asecret key for authentication by using information about connectionbetween devices.

Note that the above advantages are not necessarily limiting. In additionto or instead of the above advantages, any of advantages describedhereinafter or other advantages that will be understood from thefollowing description, may be achieved.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram for describing an example configuration of aninformation processing system including an information processing deviceaccording to one embodiment of the present disclosure;

FIG. 2 is a diagram for describing example secret keys possessed bydevices according to this embodiment;

FIG. 3 is a diagram for describing an example authentication secret keylist;

FIG. 4 is a diagram for describing example directions in whichauthentication secret keys are sent;

FIG. 5 is a diagram for describing an example adjacent device list;

FIG. 6 is a diagram for describing an example device connection list;

FIG. 7 is a diagram for describing an example key addition/update list;

FIG. 8 is a diagram for describing an example functional configurationof a master authentication device according to one embodiment of thepresent disclosure;

FIG. 9 is a diagram for describing an example functional configurationof an authentication device according to one embodiment of the presentdisclosure;

FIG. 10 is a sequence diagram for describing an example operation of aninformation processing system according to one embodiment of the presentdisclosure;

FIG. 11 is a sequence diagram for describing an example operation of aninformation processing system according to one embodiment of the presentdisclosure;

FIG. 12 is a sequence diagram for describing an example operation of aninformation processing system according to one embodiment of the presentdisclosure;

FIG. 13 is a sequence diagram for describing an example operation of aninformation processing system according to one embodiment of the presentdisclosure;

FIG. 14 is a diagram for describing how a key addition/update list istransmitted;

FIG. 15 is a diagram for describing how a key addition/update list istransmitted;

FIG. 16 is a diagram for describing how a key addition/update list istransmitted;

FIG. 17 is a diagram for describing a relationship between devices whichcan send a signal when an authentication device 200 a is removed;

FIG. 18 is a diagram for describing a relationship between devices whichcan send a signal when an authentication device 200 d is removed; and

FIG. 19 is a diagram for describing an example hardware configuration.

DETAILED DESCRIPTION OF THE EMBODIMENT(S)

Hereinafter, preferred embodiments of the present disclosure will bedescribed in detail with reference to the appended drawings. Note that,in this specification and the appended drawings, structural elementsthat have substantially the same function and structure are denoted withthe same reference numerals, and repeated explanation of thesestructural elements is omitted.

Note that the description will be given in the following order.

1. One Embodiment of Present Disclosure

-   -   1. 1. Example System Configuration    -   1. 2. Example Functional Configuration    -   1. 3. Example Operation

2. Example Hardware Configuration

3. Summary

1. One Embodiment of Present Disclosure 1. 1. Example SystemConfiguration

As an authentication device which is used for authentication to obtainvarious services, not only devices which can connect to a network, suchas a smartphone, etc., but also accessories, such as a ring, watch,etc., which are put on the body all the time and difficult to connect toa network, seem to be increasingly popular. These mobile devices may bechanged daily or depending on the destination or purpose of going out.As a result, individuals may possess a plurality of authenticationdevices. It is also contemplated that services or functions which arepermitted by authentication may be frequently changed or added, andsecret keys for authentication may also be frequently added or updatedin connection with the change or addition of services or functions.Therefore, one embodiment of the present disclosure shows a technique ofeasily maintaining secret keys for authentication with respect to suchauthentication devices. Firstly, an example system configurationaccording to one embodiment of the present disclosure will be described.FIG. 1 is a diagram for describing an example configuration of aninformation processing system including an information processing deviceaccording to one embodiment of the present disclosure. The exampleconfiguration of the information processing system will now be describedwith reference to FIG. 1.

As shown in FIG. 1, the information processing system 1 including theinformation processing device according to one embodiment of the presentdisclosure includes a PC 10, a master authentication device 100, andauthentication devices 200. In the example of FIG. 1, the authenticationdevices 200 include five authentication devices 200 a, 200 b, 200 c, 200d, and 200 e.

The information processing system 1 of FIG. 1 authenticates the user byusing a secret key (also referred to as an “authentication secret key”)held in an authentication devices 200 before allowing a user to use thePC 10, for example. The authentication secret keys held in theauthentication devices 200 are managed and distributed to theauthentication devices 200 by the master authentication device 100. Themaster authentication device 100 manages authentication secret keys usedfor all services with respect to the authentication devices 200.

FIG. 1 illustrates that the authentication device 200 a is a smartphone,the authentication device 200 b is an IC card, the authentication device200 c is a ring, the authentication device 200 d is a watch, and theauthentication device 200 e is a USB flash drive. The authenticationdevice 200 is not limited to these examples. The authentication device200 may, for example, be a tablet-type mobile terminal, oralternatively, something that a human wears, such as a bracelet,necklace, glasses, etc.

Although, in this embodiment, for example, the authentication devices200 are used in authentication which is performed before the user isallowed to use the PC 10, the present disclosure is not limited to thisexample. For example, needless to say, the present disclosure isapplicable to a system which allows a user to log in to a web serviceusing the PC 10, or a system which allows a user to unlock and lock adoor, etc.

In the foregoing, an example system configuration according to oneembodiment of the present disclosure has been described. Terms usedherein will now be defined.

(Authentication Secret Key)

A secret key which is used when authentication is performed during useof a service using an authentication device 200, is referred to as an“authentication secret key” in this embodiment. The authenticationsecret key may be one that is used in any of password authentication,public-key cryptography, symmetric-key cryptography, etc. In passwordauthentication, the authentication secret key is a password. Inpublic-key cryptography, the authentication secret key is a secret keypaired with a public key possessed by a party which performsauthentication. In symmetric-key cryptography, the authentication secretkey is a private key which is common to a party which is subjected toauthentication and a party which performs authentication.

(Device Secret Key)

A secret key which is specific to each authentication device 200 and isused in encryption and decryption of the above authentication secret keyis referred to as a “device secret key” in this embodiment. The devicesecret key is held in the master authentication device 100 in additionto the authentication device 200.

Note that a device secret key common to all the information processingsystem 1 may be held in the master authentication device 100 and theauthentication devices 200. If the device secret key common to all theinformation processing system 1 is held in the master authenticationdevice 100 and the authentication devices 200, authentication secretkeys can be encrypted and decrypted using the device secret key asdescribed below.

In the description that follows, a device secret key is represented byK_(X) (X is a letter of the alphabet), and an authentication secret keyis represented by K_(i) (I is an integer). The device secret keyspossessed by the authentication devices 200 a, 200 b, 200 c, 200 d, and200 e are represented by K_(A), K_(B), K_(C), K_(D), and K_(E),respectively. The device secret key common to all the informationprocessing system 1 is represented by K_(S).

(Authentication Secret Key List)

A list of the device secret keys and the authentication secret keyspossessed by the authentication devices 200 is referred to as an“authentication secret key list” in this embodiment. This authenticationsecret key list is held only in the master authentication device 100.FIG. 2 is a diagram for describing example secret keys possessed by themaster authentication device 100 and the authentication devices 200 a,200 b, 200 c, 200 d, and 200 e according to this embodiment. FIG. 2shows which of the secret keys is held in the master authenticationdevice 100 and each authentication device 200.

In the example of FIG. 2, the master authentication device 100 holds allof the device secret keys K_(A), K_(B), K_(C), K_(D), and K_(E), and thedevice secret key K_(S) common to all the information processing system1.

Also in the example of FIG. 2, the authentication device 200 a holds thedevice secret keys K_(A) and K_(S). Similarly, the authenticationdevices 200 b-200 e each hold a device secret key specific to itself andthe device secret key K_(S) common to all the information processingsystem 1.

In the example of FIG. 2, the master authentication device 100 holds allof the authentication secret keys K₁, K₂, K₃, K₄, K₅, and K₆. Also inthe example of FIG. 2, the authentication device 200 a also holds all ofthe authentication secret keys K₁, K₂, K₃, K₄, K₅, and K₆.

In the example of FIG. 2, the authentication devices 200 b and 200 ceach hold the authentication secret keys K₁, K₂, K₃, and K₄, theauthentication device 200 d holds only the authentication secret key K₂,and the authentication device 200 e holds the authentication secret keysK₂, K₄, K₅, and K₆.

FIG. 3 is a diagram for describing an example authentication secret keylist which is generated from the example secret keys possessed by themaster authentication device 100 and the authentication devices 200 a,200 b, 200 c, 200 d, and 200 e of FIG. 2. The authentication secret keylist of FIG. 3, which is held only by the master authentication device100 as described above, is a table which describes device IDs foridentifying the authentication device 200 a, 200 b, 200 c, 200 d, and200 e in the horizontal direction, and authentication secret key IDs foridentifying the authentication secret keys in the vertical direction.

The device IDs for identifying the authentication devices 200 a, 200 b,200 c, 200 d, and 200 e are represented by A, B, C, D, and E,respectively. The authentication secret key IDs for identifying theauthentication secret keys K₁, K₂, K₃, K₄, K₅, and K₆ are represented byKey 1, Key 2, Key 3, Key 4, Key 5, and Key 6, respectively. Also in theauthentication secret key list of FIG. 3, “0” indicates that noauthentication secret key is held, and “1” indicates that anauthentication secret key is held.

In the authentication secret key list of FIG. 3, the authenticationdevice 200 a whose device ID is A holds all of the authentication secretkeys K₁, K₂, K₃, K₄, K₅, and K₆ whose authentication secret key IDs areKey 1, Key 2, Key 3, Key 4, Key 5, and Key 6. The other authenticationdevices 200 b-200 e are similar to the authentication device 200 a.Specifically, the authentication device 200 b whose device ID is B andthe authentication device 200 c whose device ID is C each hold theauthentication secret keys K₁, K₂, K₃, and K₄ whose authenticationsecret key IDs are Key 1, Key 2, Key 3, and Key 4. The authenticationdevice 200 d whose device ID is D holds only the authentication secretkey K₂ whose authentication secret key ID is Key 2. The authenticationdevice 200 e whose device ID is E holds the authentication secret keysK₂, K₄, K₅, and K₆ whose authentication secret key IDs are Key 2, Key 4,Key 5, and Key 6.

The authentication secret key list is sent from a device which sends anauthentication secret key or a device which receives an authenticationsecret key to the other device in response to the occurrence of apredetermined trigger. For example, the predetermined trigger may be thecompletion of a mutual authentication process between devices whichcommunicate an authentication secret key with each other. In thedescription that follows, for example, the trigger for sending of theauthentication secret key list is the completion of a mutualauthentication process between devices which communicate anauthentication secret key with each other. Alternatively, for example,the trigger for sending of the authentication secret key list may be anexplicit input of an instruction by a user.

(Adjacent Device List)

A list which indicates whether or not authentication devices aredirectly connected together based on a connection scheme (e.g., NFC,Bluetooth, USB, etc.) with which the authentication devices arecompliant so that an authentication secret key can be directlycommunicated between the authentication devices, is referred to as an“adjacent device list” in this embodiment. The adjacent device list isheld only by the master authentication device 100 in this embodiment.

FIG. 4 is a diagram for describing example directions in which theauthentication secret keys of the authentication devices 200 a, 200 b,200 c, 200 d, and 200 e according to one embodiment of the presentdisclosure are sent. In FIG. 4, the authentication device 200 a can sendan authentication secret key to the authentication devices 200 b, 200 d,and 200 e. Of the authentication devices 200 b, 200 d, and 200 e, theauthentication device 200 a can receive an authentication secret keyfrom the authentication device 200 d, and cannot send an authenticationsecret key to the authentication device 200 c.

Similarly, in FIG. 4, the authentication devices 200 b and 200 e canonly receive an authentication secret key from the authentication device200 a. The authentication device 200 c can only receive anauthentication secret key from the authentication device 200 d. In FIG.4, the authentication device 200 d can receive an authentication secretkey from the authentication device 200 a, and can send an authenticationsecret key to the authentication devices 200 a and 200 c.

Note that communication of information other than authentication secretkeys may not be limited to the directions indicated by the arrows inFIG. 4. For example, as described below, when an authentication secretkey is sent from the authentication device 200 a to the authenticationdevice 200 b, mutual authentication is previously performed between theauthentication device 200 a and the authentication device 200 b, andduring the mutual authentication, a message is also sent from theauthentication device 200 b to the authentication device 200 a.

FIG. 5 is a diagram for describing an example adjacent device list whichis generated based on the directions in which authentication secret keysare sent as shown in FIG. 4. The adjacent device list, which is heldonly by the master authentication device 100, may be input and generatedby a user who manages the information processing system 1.

The adjacent device list of FIG. 5 indicates that when the element inthe row I and the column J is “1,” an authentication secret key can bedirectly sent from the authentication device I to the authenticationdevice J, and when the element is “0,” an authentication secret keycannot be directly sent from the authentication device I to theauthentication device J. Note that it is assumed that an authenticationsecret key can be directly sent within the same device. In other words,an element in any row and column having the same number (e.g., theelement in the row I and the column I) is “1.”

As can be seen from the adjacent device list of FIG. 5, theauthentication device 200 a whose device ID is A can directly send anauthentication secret key to other authentication devices, i.e., 200 b,200 d, and 200 e. For the other authentication devices 200 b, 200 c, 200d, and 200 e, it can be determined which of the authentication devicesan authentication secret key can be directly sent to by referring to theadjacent device list of FIG. 5.

(Device Connection List)

Unlike the adjacent device list, a list which indicates whether or notan authentication secret key can be directly or indirectly sent betweenauthentication devices, is referred to as a “device connection list” inthis embodiment. The device connection list is held by the masterauthentication device 100 and the authentication devices 200 a, 200 b,200 c, 200 d, and 200 e in this embodiment.

FIG. 6 is a diagram for describing an example device connection listwhich is generated based on the directions in which authenticationsecret keys are sent as shown in FIG. 4. The device connection list maybe input and generated by a user who manages the information processingsystem 1.

The device connection list of FIG. 6 indicates that when the element inthe row I and the column J is “1,” an authentication secret key can bedirectly or indirectly sent from the authentication device I to theauthentication device J, and when the element is “0,” an authenticationsecret key cannot be directly or indirectly sent from the authenticationdevice I to the authentication device J. Note that it is assumed that anauthentication secret key can be sent within the same device. In otherwords, an element in any row and column having the same number (e.g.,the element in the row I and the column I) is “1.”

As can be seen from the device connection list of FIG. 6, theauthentication device 200 a whose device ID is A can directly orindirectly send an authentication secret key to all the otherauthentication devices 200 b, 200 c, 200 d, and 200 e. For the otherauthentication devices 200 b, 200 c, 200 d, and 200 e, it can bedetermined which of the authentication devices an authentication secretkey can be directly or indirectly sent to by referring to the deviceconnection list of FIG. 6.

In the adjacent device list, the element in the row 1 and the column 3is “0,” i.e., the authentication device 200 a whose device ID is Acannot directly send an authentication secret key to the authenticationdevice 200 c. However, the authentication device 200 a can send anauthentication secret key to the authentication device 200 c through theauthentication device 200 d. Therefore, an authentication secret key canbe indirectly sent from the authentication device 200 a to theauthentication device 200 c, and therefore, the element in the row 1 andthe column 3 is “1” in the device connection list of FIG. 6.

Similarly, in the adjacent device list, the element in the row 4 and thecolumn 2 is “0,” i.e., the authentication device 200 b whose device IDis D cannot directly send an authentication secret key to theauthentication device 200 d. However, the authentication device 200 dcan send an authentication secret key to the authentication device 200 bthrough the authentication device 200 a. Therefore, an authenticationsecret key can be indirectly sent from the authentication device 200 dto the authentication device 200 b, and therefore, the element in therow 4 and the column 2 is “1” in the device connection list of FIG. 6.

(Key Addition/Update List)

A list which is generated when an authentication secret key is updatedor added, or an authentication secret key is replaced with anotherauthentication secret key, is referred to as a “key addition/updatelist” in this embodiment. The key addition/update list is generated bythe master authentication device 100, and is held by the masterauthentication device 100 and the authentication devices 200 a, 200 b,200 c, 200 d, and 200 e.

FIG. 7 is a diagram for describing an example key addition/update listaccording to one embodiment of the present disclosure. The keyaddition/update list according to one embodiment of the presentdisclosure is generated in a format <(an authentication secret keyID):(a version number):(the devices ID of authentication devices forwhich addition/update of a key has not been completed)>. In other words,the key addition/update list is generated for each authentication secretkey. The key addition/update list of FIG. 7 shows that, for anauthentication secret key whose authentication secret key ID is Key 1and whose version number is v2, update has not been completed in theauthentication devices 200 b, 200 c, and 200 e whose device IDs are B,C, and E.

The information processing system 1 according to one embodiment of thepresent disclosure has a feature that an authentication secret key isefficiently transmitted between authentication devices using a pluralityof lists described above.

In the foregoing, terms used in this embodiment have been defined. Next,example functional configurations of the master authentication device100 and the authentication device 200 according to one embodiment of thepresent disclosure will be described.

1. 2. Example Functional Configuration

FIG. 8 is a diagram for describing an example functional configurationof the master authentication device 100 according to one embodiment ofthe present disclosure. The example functional configuration of themaster authentication device 100 according to one embodiment of thepresent disclosure will now be described with reference to FIG. 8.

As shown in FIG. 8, the master authentication device 100 according toone embodiment of the present disclosure includes an encryption functionunit 110, a list editing unit 120, an information storage unit 130, atransmission/reception unit 140, and a notification unit 150.

The encryption function unit 110 performs an encryption process on anauthentication secret key which is to be sent from the masterauthentication device 100 to an authentication device 200.

The list editing unit 120 performs an editing process on the adjacentdevice list, the device connection list, and the key addition/updatelist. In this embodiment, the list editing unit 120 particularlyperforms an editing process on the key addition/update list.

The information storage unit 130, which is an example informationstorage unit according to an embodiment of the present disclosure,stores the adjacent device list, the device connection list, and the keyaddition/update list. The information storage unit 130 may also holddevice secret keys or authentication secret keys.

The transmission/reception unit 140 communicates with other devices,i.e., the PC 10 and the authentication devices 200. Thetransmission/reception unit 140 communicates with other devices through,for example, a wireless LAN, near field communication (NFC), Bluetooth(registered trademark), USB, etc. The transmission/reception unit 140sends an authentication secret key encrypted by the encryption functionunit 110 or the key addition/update list to other devices, or receivesthe key addition/update list from other devices.

The notification unit 150 performs a process of notifying ofinformation. In this embodiment, if there is still an authenticationdevice 200 for which addition or update of an authentication secret keyhas not been performed, the notification unit 150 performs a process ofnotifying of such a situation. Specifically, the notification unit 150is an example information output unit according to an embodiment of thepresent disclosure. The notification unit 150 may include hardware, suchas a liquid crystal display, organic EL display, LED indicator,loudspeaker, etc. The notification unit 150 may include software whichperforms a process of mailing information of an authentication device200 for which addition or update of an authentication secret key has notbeen performed, or a process of displaying using a web application.

In the foregoing, an example functional configuration of the masterauthentication device 100 according to one embodiment of the presentdisclosure has been described with reference to FIG. 8. Next, an examplefunctional configuration of the authentication device 200 according toone embodiment of the present disclosure will be described.

FIG. 9 is a diagram for describing an example functional configurationof the authentication device 200 according to one embodiment of thepresent disclosure. The example functional configuration of theauthentication device 200 according to one embodiment of the presentdisclosure will now be described with reference to FIG. 9.

As shown in FIG. 9, the authentication device 200 according to oneembodiment of the present disclosure includes an encryption functionunit 210, a list editing unit 220, an information storage unit 230, anda transmission/reception unit 240.

The encryption function unit 210 performs a decryption process on anencrypted authentication secret key which has been sent from the masterauthentication device 100 to the authentication device 200. Theencryption function unit 210 also performs an encryption process on anauthentication secret key which is to be sent from the authenticationdevice 200 to another authentication device 200.

The list editing unit 220 performs an editing process on the adjacentdevice list, the device connection list, and the key addition/updatelist. In this embodiment, the list editing unit 220 particularlyperforms an editing process on the key addition/update list.

The information storage unit 230, which is an example informationstorage unit according to an embodiment of the present disclosure,stores the adjacent device list, the device connection list, and the keyaddition/update list. The information storage unit 230 may also holddevice secret keys or authentication secret keys.

The transmission/reception unit 240 communicates with other devices,i.e., the master authentication device 100 and another authenticationdevice 200. The transmission/reception unit 240 communicates with otherdevices through, for example, a wireless LAN, NFC, Bluetooth (registeredtrademark), USB, etc. The transmission/reception unit 240 sends anauthentication secret key encrypted by the encryption function unit 210or the key addition/update list to other devices (the masterauthentication device 100 and another authentication device 200), orreceives the key addition/update list from other devices.

In the foregoing, an example functional configuration of theauthentication device 200 according to one embodiment of the presentdisclosure has been described with reference to FIG. 9. Next, an exampleoperation of the information processing system 1 according to oneembodiment of the present disclosure will be described.

1. 3. Example System Operation

FIG. 10 is a sequence diagram for describing an example operation of theinformation processing system 1 according to one embodiment of thepresent disclosure. The example operation of FIG. 10 is performed whenan authentication secret key whose authentication secret key ID is Key iis updated from K_(i) to K_(i)′, and the updated authentication secretkey is sent from the master authentication device 100 to theauthentication device 200 a. The example operation of the informationprocessing system 1 according to one embodiment of the presentdisclosure will now be described with reference to FIG. 10.

For example, when an authentication secret key whose authenticationsecret key ID is Key 1, which is used by the authentication device 200a, has been updated from K₁ to K₁′ by the manager of the authenticationsecret key, etc., the master authentication device 100 obtains theupdated authentication secret key K₁′ from, for example, the PC 10, etc.(step S101). The master authentication device 100 obtains the updatedauthentication secret key K₁′ by receiving it from, for example, the PC10, etc., using the transmission/reception unit 140.

The master authentication device 100, when obtaining the updatedauthentication secret key K₁′ in step S101, then generates a key updatelist L_(i, M) based on a device ID having Key i in order to allow theauthentication device 200 to update the authentication secret key K₁′(step S102). The process of generating the key update list in step S102may, for example, be performed by the list editing unit 120. Thesubscript “i” of the key update list L_(i, M) corresponds to theauthentication secret key ID (here, Key 1), and M indicates that the keyupdate list has been generated by the master authentication device.

In the authentication secret key list of FIG. 3, there are three deviceshaving Key 1, whose device ID are A, B, and C. When the version of theauthentication secret key to be updated is v2, the key update list isL_(1, M)=<Key 1:v2:A, B, C>.

The master authentication device 100, when generating the key updatelist in step S102, then encrypts the updated authentication secret keyK₁′ obtained in step S101 (step S103). This encryption may, for example,be performed by the encryption function unit 110.

The master authentication device 100 may encrypt an authenticationsecret key using the device secret key of a device whose device ID isamong the device IDs in the key update list L_(i, M) for which keyupdate has not been completed. Alternatively, the master authenticationdevice 100 may also encrypt an authentication secret key using thesystem key K_(S) and the key K_(i) before update. In the former case,the same number of encrypted authentication secret keys as there aredevices in which the authentication secret key to be updated is stored,are generated. On the other hand, in the latter case, there is only oneencrypted authentication secret key.

The devices A, B, and C have the authentication secret key K₁corresponding to Key 1. When the authentication secret key whoseauthentication secret key ID is Key 1 has been updated from K₁ to K₁′,the master authentication device 100 encrypts the updated authenticationsecret key K₁′ into Enc(K_(A), K₁′), Enc(K_(B), K₁′), and Enc(K_(C),K₁′) using the device secret keys K_(A), K_(B), and K_(C) of theauthentication device 200 a, 200 b, and 200 c having the authenticationsecret key K₁. Enc(X, Y) means that information Y is encrypted using akey X. Alternatively, the master authentication device 100 may, forexample, encrypt the updated authentication secret key K₁′ intoEnc(K₁+K_(S), K₁′) (“+” means the exclusive OR of two key bit strings)using the system key K_(S) and the key K₁ before update.

After encrypting the authentication secret key K₁′ in step S103, themaster authentication device 100 performs a mutual authenticationprocess between itself and the authentication device 200 a to which themaster authentication device 100 is to send the authentication secretkey K₁′ (step S104). The master authentication device 100 may use thesystem key K_(S) in the mutual authentication process between itself andthe authentication device 200 a.

After performing the mutual authentication process between itself andthe master authentication device 100 in step S104, the authenticationdevice 200 a sends all the authentication secret key IDs and versioninformation to the master authentication device 100 (step S105). Forexample, the authentication device 200 a sends the version informationof each of the authentication secret key IDs=Key 1, . . . , and Key 6 tothe master authentication device 100. When the version information ofthe authentication secret key ID=Key 1 is v1, the authentication device200 a sends information represented by <Key 1, v1> to the masterauthentication device 100.

The master authentication device 100, when receiving all theauthentication secret key IDs and version information from theauthentication device 200 a, selects an authentication secret key ID tobe updated, which has old version information, by referring to the keyupdate list L_(i, M) generated in step S102 (step S106). In this case,while the version information of the authentication secret key ID Key 1sent from the authentication device 200 a is v1, the version informationof the authentication secret key ID Key 1 which is held by the masterauthentication device 100 is v2. Therefore, the master authenticationdevice 100 selects Key 1 as an authentication secret key ID having oldversion information.

Next, the master authentication device 100 generates a key update listfor the authentication device 200 a based on the key update listcorresponding to the selected authentication secret key ID.Specifically, the master authentication device 100 compares a device IDin the key update list for which key update has not been completed, witha device ID in the device connection list to which the authenticationdevice 200 a can send a signal, to select a device ID which is common toboth of the lits (also referred to as a “common device ID”).

For example, the device IDs of authentication devices in the key updatelist L_(1, M)=<Key 1:v2:A, B, C> for which key update has not beencompleted are A, B, and C. According to the device connection list ofFIG. 6, the authentication device 200 a whose device ID is A can connectto the authentication devices 200 a, 200 b, 200 c, 200 d, and 200 e.Therefore, the master authentication device 100 selects the deviceIDs=A, B, and C, which are common to the authentication devices forwhich key update has not been completed and the authentication devicesto which the authentication device 200 a can connect.

Next, the master authentication device 100 generates a key update listL_(i, X) based on the common devices ID. Device IDs in this key updatelist for which key update has not been completed are the above commondevice IDs. Thereafter, the master authentication device 100 sends anauthentication secret key which has been encrypted using the encryptionkey of a device in the key update list for which key update has not beencompleted, or the system key and the authentication secret key beforeupdate, and the key update list L_(i, X), to the authentication device200 a (step S107). Note that when all authentication secret keys havealready been updated, the master authentication device 100 sends nullinformation.

For example, the master authentication device 100 sends the encryptedauthentication secret keys Enc(K_(A), K₁′), Enc(K_(B), K₁′), andEnc(K_(C), K₁′), or Enc(K₁+K_(S), K₁′), and the key update listL_(1, A)=<Key 1:v2:A, B, C>, to the authentication device 200 a.

The authentication device 200 a, when receiving the encryptedauthentication secret key and the key update list L_(1, A) from themaster authentication device 100, determines whether or not its owndevice ID is included in the key update list L_(1, A). If the result ofthe determination is positive, the authentication device 200 a decryptsthe authentication secret key based on the device secret key, or thesystem key and the authentication secret key before update, which areheld by itself (step S108). The authentication device 200 a stores theother encrypted authentication secret keys Enc(K_(B), K₁′) andEnc(K_(C), K₁′), or Enc(K₁+K_(S), K₁′) sent from the masterauthentication device 100.

The master authentication device 100 updates the key update listL_(i, M) by deleting the device ID (X) of the authentication device 200which has been sent, from the device IDs for which key update has notbeen completed (step S109). Specifically, the master authenticationdevice 100 updates the key update list to L_(1, M)=<Key 1:v2:B, C>.

The authentication device 200 a also updates the key update listL_(i, X) by deleting its own device ID (X) from the device IDs for whichkey update has not been completed. Specifically, the authenticationdevice 200 a updates the key update list to L_(1, A)=<Key 1:v2:B, C>(step S110).

The master authentication device 100 can send an authentication secretkey which has not been updated by the authentication device 200 a byperforming the above operation. Also, the authentication device 200 acan receive an authentication secret key which has not been updated,from the master authentication device 100, by performing the aboveoperation.

Note that, in the above example, the authentication secret key whoseauthentication secret key ID is Key 1 is updated from K₁ to K₁′ by themanager of the authentication secret key, etc. Even when anauthentication secret key is replaced with another authentication secretkey having a different authentication secret key ID, the masterauthentication device 100 and the authentication device 200 a canperform replacement of an authentication secret key by a similarprocess.

FIG. 11 is a sequence diagram for describing an example operation of theinformation processing system 1 according to one embodiment of thepresent disclosure. In the example operation of FIG. 11, when anauthentication secret key whose authentication secret key ID is Key ihas been updated from K_(i) to K_(i)′, the updated authentication secretkey is sent from the authentication device 200 a to the authenticationdevice 200 d. The example operation of the information processing system1 according to one embodiment of the present disclosure will now bedescribed with reference to FIG. 11. Note that each process shown inFIG. 11 is assumed to be performed if the process of the sequencediagram of FIG. 10 has been completed, i.e., the authentication secretkey whose authentication secret key ID is Key 1, of the authenticationdevice 200 a, has been updated from K₁ to K₁′.

Initially, the authentication device 200 a and the authentication device200 d are caused to be ready to communicate with each other (step S121).For example, in the case of USB, the ready state is established byconnecting the devices together. In the case of Bluetooth (registeredtrademark) or active NFC, the ready state is established by causing onedevice to be in a state in which the device can be searched for whilecausing the other device to be in a state in which the device isperforming search. In the case of passive NFC, the ready state isestablished by causing one device to be in a state in which the deviceis performing search. Thereafter, one authentication device determinesan authentication device to which that authentication device sends asignal with priority.

When the authentication device 200 a and the authentication device 200 dare caused to be ready in step S121, then the authentication device 200a and the authentication device 200 d perform a mutual authenticationprocess (step S122). The authentication device 200 a and theauthentication device 200 d may perform the mutual authenticationprocess using the system key K_(S).

After performing the mutual authentication process with theauthentication device 200 d in step S122, the authentication device 200a sends all the authentication secret key IDs and version information tothe authentication device 200 d (step S123). For example, theauthentication device 200 a sends all the versions of the authenticationsecret key IDs=Key 1, . . . , and Key 6 to the authentication device 200d. In the process of the sequence diagram of FIG. 10, an authenticationsecret key whose authentication secret key ID is Key 1, of theauthentication device 200 a, has been updated to version v2. Therefore,as a piece of version information, the authentication device 200 asends, for example, <Key 1:v2> to the authentication device 200 d.

The authentication device 200 d receives the authentication secret keyIDs and the version information from the authentication device 200 a,and compares the versions of the authentication secret keys with thosestored in itself. Thereafter, the authentication device 200 d selects alist having an old key version. Specifically, the authentication device200 d, when receiving the information <Key 1:v2> from the authenticationdevice 200 a, compares the information <Key 1:v2> with the version ofthe authentication secret key whose authentication secret key ID is Key1, of itself

After selecting the list having an old key version, the authenticationdevice 200 d sends the authentication secret key ID having the old keyversion and the updated version information (step S124). Specifically,the authentication device 200 d sends the information <Key 1:v2> to theauthentication device 200 a.

The authentication device 200 a, when receiving the authenticationsecret key ID and the version information of the authentication secretkey from the authentication device 200 d, compares a device ID for whichkey update has not been completed in the key update list related to theauthentication secret key ID which is possessed by the authenticationdevice 200 a, with a device ID in the device connection list to whichthe authentication device 200 d can send a signal. The authenticationdevice 200 a extracts a device ID common to both of the lists.Thereafter, the authentication device 200 a newly generates a key updatelist L_(i, D) which is to be sent from the authentication device 200 ato the authentication device 200 d. In the key update list L_(i, D), thekey version is changed to the new version, and the device for which keyupdate has not been completed is changed to the common device ID.

The authentication device 200 a also selects an authentication secretkey encrypted using the secret key of the common device ID from theencrypted authentication secret keys, and sends that encryptedauthentication secret key together with the key update list L_(i, D) tothe authentication device 200 d. If there is at least one common deviceID, the authentication device 200 a sends the encrypted authenticationsecret key after update together with the key update list L_(i, D). Ifthere is no common device ID, the authentication device 200 a sends onlythe list having the null device ID field to the authentication device200 d.

Specifically, for the authentication secret key ID Key 1 of theauthentication device 200 a, devices for which key update has not beencompleted in the key update list L_(1, A) are B and C. The device IDs ofauthentication devices to which the authentication device 200 d can senda signal are A, B, C, D, and E. Therefore, the common device IDs are Band C. Therefore, the authentication device 200 a sends a key updatelist L_(1, D)=<Key 1:v2:B, C>, and encrypted authentication secret keysEnc(K_(B), K₁′) and Enc(K_(C), K₁′), or an encrypted authenticationsecret key Enc(K₁+K_(S), K₁′), to the authentication device 200 d.

The authentication device 200 d, when its own device ID is included inthe key update list L_(1, D) sent from the authentication device 200 a,decrypts the authentication secret key after update based on its owndevice secret key K_(D), or the system key K_(S) and the authenticationsecret key K₁ before update. Note that, here, the device ID (D) of theauthentication device 200 d is not included in the key update listL_(1, D) sent from the authentication device 200 a, and therefore, theauthentication device 200 d does not perform the decryption process.

The authentication device 200 d updates the key update list L_(1, D) bydeleting its own device ID (D) from the device IDs in the key updatelist L_(1, D) for which key update has not been completed. Note that, inthis example, the device ID (D) of the authentication device 200 d isnot included in the key update list L_(1, D) sent from theauthentication device 200 a, and therefore, the authentication device200 d does not update the key update list L_(1, D). The authenticationdevice 200 d also stores the device secret key of a device for which keyupdate has not been completed, or the system key and an authenticationsecret key encrypted using the authentication secret key before update.Specifically, the authentication device 200 d stores the authenticationsecret keys Enc(K_(B), K₁′) and Enc(K_(C), K₁′), or the authenticationsecret key Enc(K₁+K_(S), K₁′).

The authentication device 200 a and the authentication device 200 d cancommunicate an authentication secret key with each other. Therefore,when the authentication device 200 d updates the key update listL_(1, D), then the authentication device 200 d sends the authenticationsecret key to the authentication device 200 a. Thereafter, processessimilar to the processes of steps S124 to S127 are performed between theauthentication device 200 a and the authentication device 200 d, wherethe sender and the receiver are switched. By performing the aboveoperation, the authentication device 200 a and the authentication device200 d can mutually transmit an authentication secret key which has notbeen updated.

FIGS. 10 and 11 show the process which is performed when an updatedauthentication secret key is transmitted from the master authenticationdevice 100 to an authentication device 200, or between authenticationdevices 200. In addition, by a similar process, a newly addedauthentication secret key may be transmitted from the masterauthentication device 100 to an authentication device 200, or betweenauthentication devices 200.

For example, a case will be described in which, as shown in FIG. 3, theauthentication secret key K₆ whose authentication secret key ID is Key 6is added to authentication devices 200 whose device IDs are A and E,i.e., the authentication devices 200 a and 200 e. In the descriptionthat follows, a process of transmitting an added authentication secretkey will be described with reference to the sequence diagrams of FIGS.10 and 11.

Initially, the master authentication device 100 obtains the addedauthentication secret key K₆ from, for example, the PC 10, etc. (stepS101). After obtaining the added authentication secret key in step S101,the master authentication device 100 generates a key addition listL_(6, M) in order to add the authentication secret key to theauthentication device 200 (step S102). The key addition list L_(6, M) is<Key 6:v1:A, E>.

After generating the key addition list in step S102, the masterauthentication device 100 encrypts the added authentication secret keyK₆ obtained in step S101 (step S103). This encryption may, for example,be performed by the encryption function unit 110. The masterauthentication device 100 encrypts the authentication secret key usingthe key of an authentication device 200 included in device IDs for whichkey addition has not been completed in the key addition list L_(6, M).Specifically, the master authentication device 100 encrypts the addedauthentication secret key K₆ to obtain Enc(K_(A), K₆) and Enc(K_(E),K₆).

After encrypting the added authentication secret key K₆ in step S103,the master authentication device 100 performs a mutual authenticationprocess between itself and the authentication device 200 a to which theauthentication secret key is to be sent (step S104). The masterauthentication device 100 uses the system key K_(S) in the mutualauthentication process with the authentication device 200 a.

After performing the mutual authentication process with the masterauthentication device 100 in step S104, the authentication device 200 asends all authentication secret key IDs and version information to themaster authentication device 100 (step S105). The master authenticationdevice 100, when receiving all the authentication secret key IDs andversion information from the authentication device 200 a, selects theauthentication secret key K₆ whose authentication secret key ID is Key6, which is not possessed by the authentication device 200 a, byreferring to the key addition list L_(6, M) (step S106).

Next, the master authentication device 100 generates a key addition listfor the authentication device 200 a based on a key update listcorresponding to the selected authentication secret key ID. The deviceIDs for which key addition has not been completed in the authenticationsecret key list L_(6, M)=<Key 6:v1:A, E> are A and E. According to thedevice connection list of FIG. 6, authentication devices to which theauthentication device 200 a whose device ID is A can connect are theauthentication devices 200 a, 200 b, 200 c, 200 d, and 200 e. Therefore,the master authentication device 100 selects the device IDs=A and E,which are common to both of the lists.

Next, the master authentication device 100 generates a key addition listL_(6, A) based on the common device IDs. Device IDs for which keyaddition has not been completed in the key update list are the abovecommon device IDs. Thereafter, the master authentication device 100sends the added authentication secret key K₆ encrypted using anencryption key of the device for which key addition has not beencompleted in the key addition list, and the key addition list L_(6, A),to the authentication device 200 a (step S107).

For example, the master authentication device 100 sends the encryptedauthentication secret keys Enc(K_(A), K₆) and Enc(K_(E), K₆), and thekey update list L_(6, A)=<Key 6:v1:A, E>, to the authentication device200 a.

The authentication device 200 a, when receiving the encryptedauthentication secret key K₆ and the key addition list L_(6, A) from themaster authentication device 100, determines whether or not its owndevice ID is included in the received key addition list L_(6, A). If theresult of the determination is positive, the authentication device 200 adecrypts the authentication secret key K₆ based on the device secret keyheld by itself (step S108). The authentication device 200 a stores theother encrypted authentication secret key Enc(K_(E), K₆) sent from themaster authentication device 100.

The master authentication device 100 updates the key update listL_(6, M) by deleting the device ID (A) of the sender authenticationdevice 200 from the device IDs for which key addition has not beencompleted in the key addition list L_(6, M) (step S109). Specifically,the master authentication device 100 updates the key update listL_(6, M) to <Key 6:v1:E>.

The authentication device 200 a also updates the key addition listL_(6, M) by deleting its own device ID (A) from the device IDs for whichkey addition has not been completed in the key addition list L_(6, M).Specifically, the authentication device 200 a updates the key additionlist L_(6, M) to <Key 6:v1:E> (step S110).

By performing the above operation, the master authentication device 100can send an authentication secret key which has not been added to theauthentication device 200 a. By performing the above operation, theauthentication device 200 a can receive an authentication secret keywhich has not been added from the master authentication device 100.

Next, an operation which is performed when the newly addedauthentication secret key K₆ is transmitted between authenticationdevices 200, will be described. Note that, in the description thatfollows, it is assumed that the authentication device 200 d of FIG. 11is replaced with the authentication device 200 e.

Initially, the authentication device 200 a and the authentication device200 e are caused to be ready to communicate with each other (step S121).Next, the authentication device 200 a and the authentication device 200e perform a mutual authentication process (step S122). Theauthentication device 200 a and the authentication device 200 e performsa mutual authentication process using the system key K_(S).

After performing the mutual authentication process with theauthentication device 200 e in step S122, the authentication device 200a sends all the authentication secret key IDs and version information tothe authentication device 200 e (step S123). For example, theauthentication device 200 a sends all the versions of the authenticationsecret key IDs=Key 1, . . . , and Key 6 to the authentication device 200e. As a piece of version information, the authentication device 200 asends, for example, <Key 6:v1> to the authentication device 200 e.

The authentication device 200 e receives the authentication secret keyIDs and the version information from the authentication device 200 a,and compares the versions of the authentication secret keys with thosestored in itself. Thereafter, the authentication device 200 e selects alist of authentication secret keys which are not held by itself.Specifically, the authentication device 200 e, when receiving theinformation <Key 6:v1> from the authentication device 200 a, canrecognize that Key 6 is not stored in itself.

After selecting the list of authentication secret keys which are notheld by itself, the authentication device 200 e sends the authenticationsecret key ID of an authentication secret key which is not held byitself (step S124). Specifically, the authentication device 200 e sendsthe information <Key 6> to the authentication device 200 a.

The authentication device 200 a, when receiving the authenticationsecret key ID which has not been added from the authentication device200 e, compares a device ID for which key addition has not beencompleted in a key addition list related to the authentication secretkey ID, which is possessed by the authentication device 200 a, with adevice ID to which the authentication device 200 e can send a signal inthe device connection list. The authentication device 200 a extracts adevice ID common to both of the lists. Thereafter, the authenticationdevice 200 a newly generates a key addition list L_(6, E), which is tobe sent from the authentication device 200 a to the authenticationdevice 200 d. In the key addition list L_(6, E), the key version is setto “v1,” and the devices for which key addition has not been completedare set to the above common device IDs.

The authentication device 200 a also selects an authentication secretkey encrypted using the secret key of the common device ID from theencrypted authentication secret keys, and sends that encryptedauthentication secret key together with the key addition list L_(6, E)to the authentication device 200 e. If there is at least one commondevice ID, the authentication device 200 a sends the encryptedauthentication secret key which is to be newly added together with thekey addition list L_(6, E). If there is no common device ID, theauthentication device 200 a sends only the list having the null deviceID field to the authentication device 200 e.

Specifically, for the authentication secret key ID Key 6 of theauthentication device 200 a, a device for which key addition has notbeen completed in the key addition list L_(6, E) is E. The device IDs ofauthentication devices to which the authentication device 200 e can senda signal are A, B, C, D, and E. Therefore, a device ID common to both ofthe lists is E. Therefore, the authentication device 200 a sends the keyupdate list L_(6, E)=<Key 6:v1:E> and the encrypted authenticationsecret key Enc(K_(E), K₆) to the authentication device 200 e.

The authentication device 200 e, when its own device ID (E) is includedin the key addition list L_(6, E) sent from the authentication device200 a, decrypts the authentication secret key K₆ to be added based onthe device secret key K_(E) held by itself.

The authentication device 200 e updates the key addition list L_(6, E)by deleting its own device ID (E) from the device IDs for which keyaddition has not been completed in the key addition list L_(6, E). Theauthentication device 200 e also stores an authentication secret keyencrypted using the device secret key of a device for which key additionhas not been completed. However, in this example, there is no otherencrypted authentication secret keys, and therefore, the authenticationdevice 200 e stores no other encrypted authentication secret keys.

The authentication device 200 a and the authentication device 200 ecannot communicate an authentication secret key with each other.Therefore, when the authentication device 200 e has updated the keyaddition list L_(6, E), the above series of processes is ended.

By performing the above operation, the authentication device 200 a andthe authentication device 200 e can transmit an authentication secretkey which has not been added from the authentication device 200 a to theauthentication device 200 e.

As described above, the information processing system 1 according to oneembodiment of the present disclosure can transmit an authenticationsecret key which has been updated or added, from the masterauthentication device 100 to an authentication device 200, or betweenauthentication devices 200. However, as the number of authenticationdevices 200 increases, some authentication secret keys may fail to beadded or updated with respect to some authentication devices 200.Therefore, the information processing system 1 according to oneembodiment of the present disclosure has a feature that keyaddition/update lists are transmitted and collected in the masterauthentication device 100, whereby it is easy to find any authenticationdevice 200 in which an authentication secret key has not been added orupdated.

FIG. 12 is a sequence diagram for describing an example operation of theinformation processing system 1 according to one embodiment of thepresent disclosure. The example operation of FIG. 12 is performed when akey addition/update list is transmitted from the authentication device200 a to the authentication device 200 d.

Initially, the authentication device 200 a and the authentication device200 d are caused to be ready to communicate with each other (step S131).Next, the authentication device 200 a and the authentication device 200d perform a mutual authentication process (step S132). Theauthentication device 200 a and the authentication device 200 d performthe mutual authentication process using the system key K_(S).

After performing the mutual authentication process with theauthentication device 200 d in step S132, the authentication device 200a sends all key addition/update lists possessed by itself (e.g., keyaddition/update lists L_(1, A)=<Key 1:v2:C>, . . . , and L_(6, A)=<Key6:v1:E>) to the authentication device 200 d (step S133).

When the authentication device 200 d receives all the keyaddition/update lists from the authentication device 200 a, then ifthere is an authentication secret key which has not been updated oradded in itself, the authentication device 200 d updates or adds anauthentication secret key in accordance with the sequence diagram ofFIG. 11. Also, when the authentication device 200 d receives all the keyaddition/update lists from the authentication device 200 a, then ifthere is no authentication secret key which has not been updated oradded in itself, the authentication device 200 d compares a device IDfor which key addition or update has not been completed with the deviceID of an authentication device to which the authentication device 200 dcan send a signal, to search for a device ID which is excluded from thedevices ID for which key addition or update has not been completed. Theexcluded device ID is the device ID of an authentication device 200 forwhich addition or update is not required.

Thereafter, the authentication device 200 d compares a device IDexcluded from the devices ID for which addition or update has not beencompleted, with all its own key addition/update lists, and if there is adevice ID for which addition or update is not required, deletes thatdevice ID from the key addition/update lists, and also deletes acorresponding encrypted authentication secret key (step S134). Note thatthe authentication device 200 d may delete the following two types ofencrypted authentication secret keys: an authentication secret keyencrypted using a device secret key of a device ID for which addition orupdate has not been completed; and an authentication secret keyencrypted using the system key and the authentication secret key beforeupdate. In the latter case, such an encrypted authentication secret keyis deleted only after there is no device ID for which key addition orupdate has not been completed.

Also, the authentication device 200 d compares a device ID for which keyaddition or update has not been completed in all its own keyaddition/update lists, with the device ID of an authentication device200 to which the authentication device 200 d can send a signal, tosearch for a device ID which is excluded from the device IDs for whichkey addition or update has not been completed. The excluded device ID iscompared with the key addition/update list sent by the authenticationdevice 200 a. If there is a device ID for which key addition or updateis not required in the key addition/update list sent by theauthentication device 200 a, the authentication device 200 d notifiesthe authentication device 200 a that there is such a device ID (stepS135).

The authentication device 200 a, when notified by the authenticationdevice 200 d that there is a device ID for which key addition or updateis not required in the key addition/update list sent by theauthentication device 200 a, deletes the device ID from the keyaddition/update list, and also deletes a corresponding encryptedauthentication secret key (step S136). Note that the authenticationdevice 200 a may delete the following two types of encryptedauthentication secret keys: an authentication secret key encrypted usinga device secret key of a device ID for which addition or update has notbeen completed; and an authentication secret key encrypted using thesystem key and the authentication secret key before update. In thelatter case, such an encrypted authentication secret key is deleted onlyafter there is no device ID for which addition or update has not beencompleted.

By performing the above operation, the authentication device 200 a andthe authentication device 200 d can transmit a key addition/update listfrom the authentication device 200 a to the authentication device 200 d.

Next, a technique of transmitting a key addition/update list from anauthentication device 200 to the master authentication device 100 willbe described. FIG. 13 is a sequence diagram for describing an exampleoperation of the information processing system 1 according to oneembodiment of the present disclosure. The example operation of FIG. 13is performed when a key addition/update list is transmitted from theauthentication device 200 a to the master authentication device 100.

Initially, the master authentication device 100 and the authenticationdevice 200 a perform a mutual authentication process (step S141). Themaster authentication device 100 and the authentication device 200 aperform the mutual authentication process using the system key K_(S).

After performing the mutual authentication process with the masterauthentication device 100 in step S141, the authentication device 200 asends all key addition/update lists possessed by itself (e.g., keyaddition/update lists L_(1, A)=<Key 1:v2:C>, . . . , and L_(6, A)=<Key6:v1:E>) to the master authentication device 100 (step S142).

The master authentication device 100, when receiving all the keyaddition/update lists from the authentication device 200 a, compares adevice ID for which key addition or update has not been completed, withthe device ID of an authentication device to which the authenticationdevice 200 a can send a signal, to search for a device ID which isexcluded from the device IDs for which addition or update has not beencompleted. The excluded device ID is the device ID of an authenticationdevice 200 for which addition or update is not required.

Thereafter, the master authentication device 100 compares a device IDexcluded from the devices ID for which addition or update has not beencompleted, with all its own key addition/update lists, and if there is adevice ID for which addition or update is not required, deletes thatdevice ID from the key addition/update lists, and also deletes acorresponding encrypted authentication secret key (step S143). Note thatthe master authentication device 100 may delete the following two typesof encrypted authentication secret keys: an authentication secret keyencrypted using a device secret key of a device ID for which addition orupdate has not been completed; and an authentication secret keyencrypted using the system key and the authentication secret key beforeupdate. In the latter case, such an encrypted authentication secret keyis deleted only after there is no device ID for which addition or updatehas not been completed.

The master authentication device 100, when there is an authenticationdevice 200 for which addition or update has not been completed for allauthentication secret keys, notifies of information of thatauthentication device 200 using the notification unit 150 (step S144).The notification of an authentication device 200 for which addition orupdate of an authentication secret key has not been completed may beperformed by displaying a message on a display (e.g., sending of a mail,a web application, etc.), outputting audio through a loudspeaker,emitting light using an LED indicator, etc.

Thereafter, if there is a device ID for which addition or update is notrequired in the key addition/update list sent by the authenticationdevice 200 a, the master authentication device 100 notifies theauthentication device 200 a that there is such a device ID (step S145).

The authentication device 200 a, when notified by the masterauthentication device 100 that there is a device ID for which additionor update is not required in the key addition/update list sent by theauthentication device 200 a, deletes the device ID from the keyaddition/update list, and also deletes a corresponding encryptedauthentication secret key (step S146). Note that the authenticationdevice 200 a may delete the following two types of encryptedauthentication secret keys: an authentication secret key encrypted usinga device secret key of a device ID for which addition or update has notbeen completed; and an authentication secret key encrypted using thesystem key and the authentication secret key before update. In thelatter case, such an encrypted authentication secret key is deleted onlyafter there is no device ID for which addition or update has not beencompleted.

FIG. 14 is a diagram for describing how a key addition/update list istransmitted. FIG. 14 shows an example in which while the authenticationdevice 200 c should update an authentication secret key, theauthentication device 200 c has not updated the authentication secretkey. In this case, the master authentication device 100 obtains a keyupdate list <Key 1:v2:C> from the authentication device 200 a.Thereafter, the master authentication device 100 can notify the manager2 of the information processing system 1 that the authentication device200 c has not updated the authentication secret key, by referring to thekey update list.

By performing the above operation, the master authentication device 100and the authentication device 200 a can transmit a key addition/updatelist from the authentication device 200 a to the master authenticationdevice 100. Also, by performing the above operation, the masterauthentication device 100 can easily detect the presence of anauthentication device 200 for which addition or update of anauthentication secret key has not been performed, and can also notifythat there is such an authentication device 200.

When an authentication device 200 has a function of connecting to anetwork, it is considered that addition or update of an authenticationsecret key may be performed for a plurality of authentication devices200 having such a function simultaneously. In the above example, when anauthentication secret key is sent from the master authentication device100 to the authentication device 200 a, an authentication secret keywhich is used for the other authentication devices 200 b, 200 c, 200 d,and 200 e is sent together with that authentication secret key. In thedescription that follows, a technique of reducing the number ofauthentication secret keys transmitted to a plurality of authenticationdevices 200 by performing addition or update of an authentication secretkey for the authentication devices 200 simultaneously, will bedescribed.

FIG. 15 shows a case where only the authentication device 200 a firstupdates an authentication secret key, and thereafter, the authenticationsecret key is transmitted to the other authentication devices 200 b, 200c, 200 d, and 200 e. In this case, an authentication secret key used bythe other authentication devices 200 b, 200 c, 200 d, and 200 e is alsotransmitted from the master authentication device 100 to theauthentication device 200 a.

FIG. 16 shows a case where the authentication device 200 a and theauthentication device 200 d first update an authentication secret key,and thereafter, the authentication secret key is transmitted to theother authentication devices 200 b, 200 c, and 200 e. In this case, anauthentication secret key used by the authentication devices 200 b and200 e is transmitted from the master authentication device 100 to theauthentication device 200 a, and an authentication secret key used bythe authentication devices 200 b and 200 c is transmitted from themaster authentication device 100 to the authentication device 200 d.Thus, by performing addition or update of an authentication secret keyfor a plurality of authentication devices 200 simultaneously, the numberof authentication secret keys possessed by each authentication device200 can be reduced.

An example operation will be described which is performed when additionor update of an authentication secret key from the master authenticationdevice 100 to a plurality of authentication devices 200 is performedsimultaneously. Here, it is assumed that the key K₂ whose authenticationsecret key ID is Key 2 is updated to K2′. The master authenticationdevice 100 selects the authentication device 200 a and theauthentication device 200 d for which an authentication secret key is tobe updated simultaneously.

The master authentication device 100 generates a key update list for theauthentication device 200 a and the authentication device 200 d. For anauthentication secret key whose authentication secret key ID is Key 2,the device IDs of authentication devices for which update is to beperformed are A, B, C, D, and E. The authentication device 200 a and theauthentication device 200 d can each send a signal to all of theauthentication devices 200. Therefore, the device IDs of devices towhich each of the authentication device 200 a and the authenticationdevice 200 d to be updated simultaneously can send a signal are A, B, C,D, and E.

Next, the master authentication device 100 deletes a device ID for whichkey update has not been completed in the key update list. FIG. 17 is adiagram for describing a relationship between devices which can send asignal when the authentication device 200 a is removed. When attentionis paid to the authentication device 200 a, devices which can send asignal when the authentication device 200 a is removed have therelationship of FIG. 17. Because the authentication device 200 d cannotsend a signal to the authentication device 200 a or 200 e, the deviceIDs={A, E} are the device IDs of authentication devices 200 which cannotbe reached from the authentication device 200 d. When the authenticationdevice 200 a is removed, device IDs for which key update has not beencompleted are {D, C} after the removal.

FIG. 18 is a diagram for describing a relationship between devices whichcan send a signal when the authentication device 200 d is removed. Whenattention is paid to the authentication device 200 d, devices which cansend a signal when the authentication device 200 d is removed have therelationship of FIG. 18. Because the authentication device 200 a cannotsend a signal to the authentication device 200 c or 200 d, the deviceIDs={C, D} are the device IDs of authentication devices 200 which cannotbe reached from the authentication device 200 a. When the authenticationdevice 200 d is removed, device IDs for which key update has not beencompleted are {B, E} after the removal.

Next, the master authentication device 100 generates an encryptedauthentication secret key and a key update list which are to be sent tothe authentication devices 200 a and 200 d for which update is to beperformed simultaneously, based on the device ID for which key updatehas not been completed after the device ID removal.

In the above example, the master authentication device 100 sends a keyupdate list L_(2, A)=<Key 2:v2:A, B, E> and encrypted authenticationsecret keys after update Enc(K_(A), K₂′), Enc(K_(B), K₂′), andEnc(K_(E), K₂′), or Enc(K_(S)+K₂, K₂′), to the authentication device 200a. Thereafter, the master authentication device 100 sends a key updatelist L_(2, D)=<Key 2:v2:C, D> and encrypted authentication secret keysafter update Enc(K_(D), K₂′), and Enc(K_(C), K₂′), or Enc(K_(S)+K₂,K₂′), to the authentication device 200 d.

Thus, by sending an encrypted authentication secret key to theauthentication devices 200 a and 200 d for which update is to beperformed simultaneously from the master authentication device 100, thenumber of authentication secret keys which are possessed by theauthentication devices 200 a and 200 d can be reduced. Because of thereduction in the number of authentication secret keys which should beheld, the authentication devices 200 a and 200 d can allocate space in astorage medium, such as an internal memory, etc., for holding otherinformation.

In the foregoing, the embodiment of the present disclosure has beendescribed. Note that, in the above embodiment, the master authenticationdevice 100 may not hold a device secret key or an authentication secretkey. Device secret keys or authentication secret keys may be held by thePC 10 or a server on the Internet. When an authentication secret key isdistributed to authentication devices 200, a device secret key or anauthentication secret key may be obtained from the PC 10 or the serveron the Internet when necessary.

2. Hardware Configuration

Each of the algorithms described above can be performed by using, forexample, the hardware configuration of the information processingapparatus shown in FIG. 19. That is, the processing of each of thealgorithms can be realized by controlling the hardware shown in FIG. 19using a computer program. Additionally, the mode of this hardware isarbitrary, and may be a personal computer, a mobile information terminalsuch as a mobile phone, a PHS or a PDA, a game machine, a contact ornon-contact IC chip, a contact or non-contact IC card, or various typesof information appliances. Moreover, the PHS is an abbreviation forPersonal Handy-phone System. Also, the PDA is an abbreviation forPersonal Digital Assistant.

As shown in FIG. 19, this hardware mainly includes a CPU 902, a ROM 904,a RAM 906, a host bus 908, and a bridge 910. Furthermore, this hardwareincludes an external bus 912, an interface 914, an input unit 916, anoutput unit 918, a storage unit 920, a drive 922, a connection port 924,and a communication unit 926. Moreover, the CPU is an abbreviation forCentral Processing Unit. Also, the ROM is an abbreviation for Read OnlyMemory. Furthermore, the RAM is an abbreviation for Random AccessMemory.

The CPU 902 functions as an arithmetic processing unit or a controlunit, for example, and controls entire operation or a part of theoperation of each structural element based on various programs recordedon the ROM 904, the RAM 906, the storage unit 920, or a removablerecording medium 928. The ROM 904 is a unit for storing, for example, aprogram to be loaded on the CPU 902 or data or the like used in anarithmetic operation. The RAM 906 temporarily or perpetually stores, forexample, a program to be loaded on the CPU 902 or various parameters orthe like arbitrarily changed in execution of the program.

These structural elements are connected to each other by, for example,the host bus 908 capable of performing high-speed data transmission. Forits part, the host bus 908 is connected through the bridge 910 to theexternal bus 912 whose data transmission speed is relatively low, forexample. Furthermore, the input unit 916 is, for example, a mouse, akeyboard, a touch panel, a button, a switch, or a lever. Also, the inputunit 916 may be a remote control that can transmit a control signal byusing an infrared ray or other radio waves.

The output unit 918 is, for example, a display device such as a CRT, anLCD, a PDP or an ELD, an audio output device such as a speaker orheadphones, a printer, a mobile phone, or a facsimile, that can visuallyor auditorily notify a user of acquired information. Moreover, the CRTis an abbreviation for Cathode Ray Tube. The LCD is an abbreviation forLiquid Crystal Display. The PDP is an abbreviation for Plasma DisplayPanel. Also, the ELD is an abbreviation for Electro-LuminescenceDisplay.

The storage unit 920 is a device for storing various data. The storageunit 920 is, for example, a magnetic storage device such as a hard diskdrive (HDD), a semiconductor storage device, an optical storage device,or a magneto-optical storage device. The HDD is an abbreviation for HardDisk Drive.

The drive 922 is a device that reads information recorded on theremovable recording medium 928 such as a magnetic disk, an optical disk,a magneto-optical disk, or a semiconductor memory, or writes informationin the removable recording medium 928. The removable recording medium928 is, for example, a DVD medium, a Blu-ray medium, an HD-DVD medium,various types of semiconductor storage media, or the like. Of course,the removable recording medium 928 may be, for example, an electronicdevice or an IC card on which a non-contact IC chip is mounted. The ICis an abbreviation for Integrated Circuit.

The connection port 924 is a port such as an USB port, an IEEE1394 port,a SCSI, an RS-232C port, or a port for connecting an externallyconnected device 930 such as an optical audio terminal. The externallyconnected device 930 is, for example, a printer, a mobile music player,a digital camera, a digital video camera, or an IC recorder. Moreover,the USB is an abbreviation for Universal Serial Bus. Also, the SCSI isan abbreviation for Small Computer System Interface.

The communication unit 926 is a communication device to be connected toa network 932, and is, for example, a communication card for a wired orwireless LAN, Bluetooth (registered trademark), or WUSB, an opticalcommunication router, an ADSL router, or a device for contact ornon-contact communication. The network 932 connected to thecommunication unit 926 is configured from a wire-connected or wirelesslyconnected network, and is the Internet, a home-use LAN, infraredcommunication, visible light communication, broadcasting, or satellitecommunication, for example. Moreover, the LAN is an abbreviation forLocal Area Network. Also, the WUSB is an abbreviation for Wireless USB.Furthermore, the ADSL is an abbreviation for Asymmetric DigitalSubscriber Line.

3. Summary

As described above, according to one embodiment of the presentdisclosure, the master authentication device 100 generatesauthentication secret keys which are to be sent to authenticationdevices 200 or lists for transmitting authentication secret keys betweenauthentication devices 200, based on information about authenticationsecret keys used by authentication devices 200, or information aboutconnection between authentication devices 200. Authentication devices200 send authentication secret keys to other authentication devices 200by referring to a list received from the master authentication device100, and edit the list and send the edited list.

The master authentication device 100 and the authentication devices 200according to one embodiment of the present disclosure, when anauthentication secret key which is to be used in an authenticationprocess has been updated or added, can efficiently transmit the updatedor added authentication secret key from the master authentication device100 to an authentication device 200, or between authentication devices200.

For example, it may not be necessary to chronologically executerespective steps in the processing, which is executed by each apparatusof this specification, in the order described in the sequence diagramsor the flow charts. For example, the respective steps in the processingwhich is executed by each apparatus may be processed in the orderdifferent from the order described in the flow charts, and may also beprocessed in parallel.

Furthermore, it becomes possible to generate a computer program whichmakes a hardware device, such as a CPU, a ROM, and a RAM incorporated ineach apparatus demonstrate the functions equivalent to theconfigurations of the above described apparatuses. It becomes alsopossible to provide a storage medium which stores the computer program.In addition, respective functional blocks shown in the functional blockdiagrams may be constituted from hardware devices, so that a series ofprocessings may be implemented by the hardware devices.

While the preferred embodiments of the present disclosure have beendescribed so far with reference to the accompanying drawings, thepresent disclosure is not limited to these examples. It should beunderstood by those skilled in the art that various modifications,combinations, sub-combinations and alterations may occur depending ondesign requirements and other factors insofar as they are within thescope of the appended claims or the equivalents thereof

Further, the effect described in the present disclosure is not limitedto only that described or illustrated. That is, the technology accordingto the present disclosure accomplishes other effects which are clear toa person skilled in the art from the description of the presentdisclosure, along with the above described effect or instead of theabove described effect.

Additionally, the present technology may also be configured as below:

(1) An information processing device including:

an information storage unit configured to store information about astate in which a first secret key used during authentication is held indevices, and information about connection between the devices; and

a communication unit configured to send the first secret key so that thefirst secret key is delivered to the devices based on the informationstored in the information storage unit.

(2) The information processing device according to (1), wherein

the communication unit transmits the first secret key to the devicesbased on the information stored in the information storage unit when thefirst secret key has been updated.

(3) The information processing device according to (2), wherein

the communication unit transmits the first secret key encrypted using asecond secret key held in a device which uses the first secret key tothe device.

(4) The information processing device according to any one of (1) to(3), wherein

the communication unit transmits the first secret key after updateencrypted using a second secret key held in common to all the devicesstored in the information storage unit and the first secret key beforeupdate, to the devices.

(5) The information processing device according to any one of (1) to(4), wherein

the communication unit transmits the first secret key to a device whichnewly uses the first secret key based on the information stored in theinformation storage unit.

(6) The information processing device according to any one of (1) to(5), wherein

the communication unit transmits the first secret key to a device whichuses a new version of the first secret key based on the informationstored in the information storage unit.

(7) The information processing device according to any one of (1) to(6), wherein

the communication unit transmits the first secret key to a device whichreplaces the first secret key with another version of the first secretkey and uses the another version of the first secret key, based on theinformation stored in the information storage unit.

(8) The information processing device according to any one of (1) to(7), further including:

an information updating unit configured to update information about theheld state stored in the information storage unit when the communicationunit has transmitted the first secret key to the devices.

(9) The information processing device according to any one of (1) to(8), wherein

the communication unit transmits the information about the held state ofthe first secret key in response to occurrence of a predeterminedtrigger.

(10) The information processing device according to any one of (1) to(9), wherein

the information storage unit further stores information about a devicewhich holds the first secret key, and

the communication unit selects and transmits the first secret key to besent, based on information about the device which holds the first secretkey, the information being stored in the information storage unit.

(11) The information processing device according to any one of (1) to(10), further including:

an information output unit configured to output information about adevice which does not hold a latest version of the first secret keybased on information about a state in which the first secret key isheld.

(12) The information processing device according to any one of (1) to(11), further including:

a key holding unit configured to hold the first secret key.

(13) The information processing device according to any one of (1) to(12), wherein

the communication unit selects and sends the first secret key which isto be used in a device which is reached through a destination device,based on information about connection between the devices stored in theinformation storage unit.

(14) The information processing device according to (13), wherein

the communication unit selects and sends the first secret key other thanthe first secret key used in a device which is not reached if thedestination device is not present, based on the information aboutconnection between the devices stored in the information storage unit.

(15) An information processing method including:

storing information about a state in which a first secret key usedduring authentication is held in devices, and information aboutconnection between the devices; and

sending the first secret key so that the first secret key is deliveredto the devices based on the stored information.

(16) A program for causing a computer to execute:

storing information about a state in which a first secret key usedduring authentication is held in devices, and information aboutconnection between the devices; and

sending the first secret key so that the first secret key is deliveredto the devices based on the stored information.

What is claimed is:
 1. An information processing device comprising: aninformation storage unit configured to store information about a statein which a first secret key used during authentication is held indevices, and information about connection between the devices; and acommunication unit configured to send the first secret key so that thefirst secret key is delivered to the devices based on the informationstored in the information storage unit.
 2. The information processingdevice according to claim 1, wherein the communication unit transmitsthe first secret key to the devices based on the information stored inthe information storage unit when the first secret key has been updated.3. The information processing device according to claim 2, wherein thecommunication unit transmits the first secret key encrypted using asecond secret key held in a device which uses the first secret key tothe device.
 4. The information processing device according to claim 1,wherein the communication unit transmits the first secret key afterupdate encrypted using a second secret key held in common to all thedevices stored in the information storage unit and the first secret keybefore update, to the devices.
 5. The information processing deviceaccording to claim 1, wherein the communication unit transmits the firstsecret key to a device which newly uses the first secret key based onthe information stored in the information storage unit.
 6. Theinformation processing device according to claim 1, wherein thecommunication unit transmits the first secret key to a device which usesa new version of the first secret key based on the information stored inthe information storage unit.
 7. The information processing deviceaccording to claim 1, wherein the communication unit transmits the firstsecret key to a device which replaces the first secret key with anotherversion of the first secret key and uses the another version of thefirst secret key, based on the information stored in the informationstorage unit.
 8. The information processing device according to claim 1,further comprising: an information updating unit configured to updateinformation about the held state stored in the information storage unitwhen the communication unit has transmitted the first secret key to thedevices.
 9. The information processing device according to claim 1,wherein the communication unit transmits the information about the heldstate of the first secret key in response to occurrence of apredetermined trigger.
 10. The information processing device accordingto claim 1, wherein the information storage unit further storesinformation about a device which holds the first secret key, and thecommunication unit selects and transmits the first secret key to besent, based on information about the device which holds the first secretkey, the information being stored in the information storage unit. 11.The information processing device according to claim 1, furthercomprising: an information output unit configured to output informationabout a device which does not hold a latest version of the first secretkey based on information about a state in which the first secret key isheld.
 12. The information processing device according to claim 1,further comprising: a key holding unit configured to hold the firstsecret key.
 13. The information processing device according to claim 1,wherein the communication unit selects and sends the first secret keywhich is to be used in a device which is reached through a destinationdevice, based on information about connection between the devices storedin the information storage unit.
 14. The information processing deviceaccording to claim 13, wherein the communication unit selects and sendsthe first secret key other than the first secret key used in a devicewhich is not reached if the destination device is not present, based onthe information about connection between the devices stored in theinformation storage unit.
 15. An information processing methodcomprising: storing information about a state in which a first secretkey used during authentication is held in devices, and information aboutconnection between the devices; and sending the first secret key so thatthe first secret key is delivered to the devices based on the storedinformation.
 16. A program for causing a computer to execute: storinginformation about a state in which a first secret key used duringauthentication is held in devices, and information about connectionbetween the devices; and sending the first secret key so that the firstsecret key is delivered to the devices based on the stored information.