Communication system and method in public key infrastructure

ABSTRACT

In a communication system wherein a device and a client communicate data with each other through a network, the device holds a root certificate including a public key in a pair of the public key and a private key and signed with the public key. When data is sent, a certificate creator creates a second certificate including the root certificate designated as a certificate authority at a higher level and signed with the root certificate, and the second certificate is sent to the client. In the client, the root certificate has been stored beforehand, and a verifier verifies the signature of the second certificate with the root certificate.

This application is a divisional of application Ser. No. 10/671,548,filed on Sep. 29, 2003, which is based on and claims priority under 35U.S.C. §119 with respect to Japanese Application No. 2003-167691 filedon Jun. 12, 2003. The entire content of the prior applications isincorporated herein by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to data communication using a public keyin a network environment.

2. Description of Prior Art

In public key encryption for data communication in a network, when asending end transmits data to a receiving end, a pair of a public keyand a private key (secret key) is created, and data to be transmitted isencrypted with the private key. Then the encrypted data is transmitted.At the receiving end, the data is decrypted with the public key. Publickey infrastructure (PKI) uses the public key encryption and organizescertificate authorities as third parties to issue an electroniccertificate (hereinafter referred to as certificate) for verifying theidentity of the sending end. A public key to be used for decrypting thecertificate is sent through a certificate authority. When the sendingend transmits data, it calculates a hash value on the data, and encryptsthe data and the hash value with the private key for an electronicsignature. Then, the sending end requests the certificate authority toissue a certificate, and the certificate authority creates a pair of apublic key and a private key and issues an electronic certificate. Inthe electronic certificate, information including the public key of thesending end is encrypted with the private key of the certificateauthority. The sending end performs an electronic signature to the databy using a hash value, adds the signature to the certificate issued bythe certificate authority and sends them as well as the data to areceiving end. The receiving end gets the public key for the certificatefrom the certificate authority, decrypts the certificate with the publickey to get the public key of the sending end. Thus, the identity of thesending end of the electronic signature can be confirmed, and thesecurity is enhanced. Then, the data and the hash value are decryptedwith the public key of the sending end. By decrypting the hash value,the forgery of the data can be checked. Further, by decrypting the data,it is verified that the data is sent by the sending end. A user requestsa certificate authority to issue a certificate for each created publickey. A data communication system which simplifies the issuance of acertificate is described in, for example, Japanese Patent laid openPublication 2001-320356.

In the public key infrastructure (PKI), certificate authorities areorganized in a hierarchical structure. Certificate authorities at thehighest level is called root certificate authorities. A series ofcertificates are signed by a series of certificate authorities up to theroot certificate authority in a hierarchical order. A certificate of acertificate authority is used for verification of the public key of asubordinate certificate authority in the hierarchical order. Thus, forthe verification of a certificate, a chain of certificates or an entirelist up to the root certificate authority has to be acquired.

Recently, secure encrypted communication such as Secure Sockets Layer(SSL) communication is needed in a network environment. SSL is acommunication protocol for transmitting encrypted data between a webserver and a web browser, wherein public key encryption and electroniccertificates are used to send data securely. For secure datacommunication with use of SSL protocol or the like, a server apparatuswhich sends data needs a certificate. A certificate can be purchasedfrom an external certificate authority which gives a service to issue acertificate. However, in a network such as an intranet, a user would notwant to buy an expensive certificate from an authority outside thenetwork only for SSL communication. On the other hand, a certificate maybe created by a server apparatus. However, when a certificate created bythe server apparatus is used, because the certificate is not issued by acertificate authority, a warning is given in a warning dialog in thescreen of the server apparatus to inform the user of that thecertificate is not trusted. This is because a list of certificates up tothe root certificate authority is not available.

SUMMARY OF THE INVENTION

An object of the invention is to provide a network system wherein aserver and a client communicate encrypted data between them through anetwork without purchasing an electronic certificate from an authorityoutside the network.

In one aspect of the invention of a communication system wherein adevice and a client communicate with each other through a network, thedevice comprises a first storage device which stores a root certificateincluding a public key in a pair of the public key and a private key andsigned with the public key, a certificate creator which creates a secondcertificate including the root certificate designated as a certificateauthority at high level and signed with the private key, and acommunication device which transmits the second certificate created bysaid certificate creator. The client comprises a second storage devicewhich stores the root certificate stored in said first storage device,and a verifier which verifies the signature of the second certificatereceived from said device with the public key.

In another aspect of the invention of a device to be used in acommunication system between the device and a client through a networkwherein the device sends information to a client and the client uses theinformation to communicate with the device, the device comprises a firststorage device which stores a pair of a public key and a private key, asecond storage device which stores a root certificate signed with thepublic key, and an interface which sends the information as well as thepublic key to the client through the network. The root certificate issent through said interface to the client for verification of theinformation by the client.

An advantage of the invention is that because a root certificate of theserver has been installed in the client, a warning is not given whensecure encrypted communication from the server to the client is started.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other objects and features of the present invention willbecome clear from the following description taken in conjunction withthe preferred embodiments thereof with reference to the accompanyingdrawings, and in which:

FIG. 1 is a block diagram of a data communication system;

FIG. 2 is a block diagram of a multi-functional peripheral;

FIG. 3 is a block diagram of a personal computer;

FIG. 4 is a diagram of a communication sequence in SSL between a serverand a client;

FIG. 5 is a diagram for explaining a root certificate and a self-madecertificate;

FIG. 6 is a diagram for explaining verification by using a rootcertificate and a self-made certificate;

FIG. 7 is a flowchart of creating a root certificate;

FIG. 8 is a flowchart of creating self-made certificate;

FIG. 9 is a flowchart of verifying the certificate;

FIG. 10 is a flowchart of a program for installing a root certificate;

FIG. 11 is a flowchart of another program for installing a certificate;and

FIG. 12 is a diagram for explaining verification at a plurality ofstages.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Referring now to the drawings, wherein like reference charactersdesignate like or corresponding parts throughout the several views, FIG.1 shows a data communication system for communicating data through anetwork. A device 100 such as a printer or a multifunctional peripheral(MFP) and a client 200 such as a personal computer are connected to anetwork 300 such as an intranet or a local area network. In the network300, Secure Sockets Layer (SSL) is used as a communication protocol. Thedevice is operated as a server for the client 200, and it has a webserver 120 which supports SSL. The client 200 is for example a personalcomputer (PC) and has a web browser (referred also to a browser) 216which supports SSL. The web server 120 of the device 100 and the browser216 of the client 200 can transmit data each other by using SSL. Thoughonly one device 100 and only one client 200 are shown in FIG. 1, aplurality of devices 100 and a plurality of clients 200 can be connectedto the network 300 generally.

FIG. 2 shows an internal structure of a multifunctional peripheral as anexample of the device 100. The multifunctional peripheral has a scanner102 for reading a document image, a print engine 104 for printing animage, a communication device 106 for communication through the network300, and an operation panel 108 for user's instruction of an operationand for display. Further, a central processing unit (CPU) 110 isconnected through an internal bus 112 to a random access memory (RAM)114, a read-only memory (ROM) 116, a storage device 118 such as a harddisk drive, a scanner controller 132 and a print controller 134 as wellas the above-mentioned components 102-108. The scanner controller 132controls the scanner 102, and the print controller 134 controls theprint engine 104. The multifunctional peripheral serves as a printer, acopying machine, a scanner and the like. The storage device 118 storesprograms such as the web server 120 supporting SSL, a program 122 forcreating a root certificate, and a program 124 for creating a self-madecertificate, and data such as a root certificate 126, a self-madecertificate 128 and files 130.

FIG. 3 shows an internal structure of a personal computer as an exampleof the client 200. The personal computer has a central processing unit(CPU) 202 which controls the entire system, and a random access memory(RAM) 114 and a read-only memory (ROM) 116 both connected to the CPU202. The CPU 202 is further connected to a display device 208, inputdevices 210 such as a keyboard and a mouse, and a communication device212 for communication through the network 300. The CPU 202 is alsoconnected to a hard disk drive (HDD) 214 for storing programs and data,and a CD drive 226 for access with a compact disk (CD) 226 a. A storagedevice such as the hard disk or the compact disc stores programs such asan operating system (not shown), the web browser 216 supporting SSL, aprinter driver 218, and a program 220 for installing a root certificateto the client 200, and data such as a root certificate 222, and files224 to be transmitted. The printer driver 218 generates print data to besent to a printer or multifunctional peripheral as one of the devices100.

In the device 100 and the client 200, programs and data can be stored instorage devices such as the hard disk in the storage device 118 and thehard disk drive 214, but they can also be stored in a flexible disk orvarious optical disks such as a compact disk 226 a. The storage devicesuch as a flexible disk or an optical disk can be accessed by a drivetherefor.

When the web server 120 in the device 100 and the web browser 216 in theclient 200 transmit data between them in SSL protocol, the device (orserver) is verified, the client is verified, and the contents ofcommunication is encrypted. The device 100 holds the root certificate122. The root certificate 122 may be created by the device 100 itself orissued by a certificate authority (CA). In this embodiment it is createdby the device 100, as will be explained later. When the root certificateis created by the device 100, it is an advantage that the attributes ofthe root certificate can be changed freely by the device. The rootcertificate 122 includes a public key created when the root certificateis created. On the other hand, the root certificate 122 has also beeninstalled in the client 200 beforehand. This is the above-mentioned rootcertificate 220 stored in the client 200. The installation of a rootcertificate is preferably performed automatically. For example, it isinstalled when the printer driver 218 for the device 100 is installed inthe client 200. Preferably, before the root certificate is installed, itis requested for a user to approve the installation. Because the client200 holds the root certificate 220, a certificate issued by acertificate authority outside the network 300 is not needed to verifythe certificate received from the device 100, as will be explainedlater. If a storage device such as ROM 206 storing the root certificate220 is supplied to the client 200, forgery of the root certificate isprevented.

A certificate is created in X.509 format by the programs 122, 124 in thedevice 100. A certificate in X.509 format contains information includingthe version thereof, a serial number thereof, a signature value, analgorithm and parameters used for the signature, name, address and thelike of the issuer of the certificate, the expiry date, name, addressand the like of an owner, and information on the public key to beverified. When a user inputs necessary information in response to aninput request in the screen, a certificate is created based on theinformation. A certificate in X.509 format is stored in ASN.1 formatinside, but it is stored in a format such as PKCS#12 or PKCS#7 outside.When a self-made certificate is created by the program 124, the rootcertificate is written in the certificate as the name of the issuer ofthe root certificate.

SSL communication is explained here. A public key and a private key areprovided beforehand in the web server 102 in the device 100. As shown inFIG. 4, when the client 200 requests SSL connection to the device 100,the device 100 determines an algorithm for encryption and compression tobe used, notifies them to the client 200, creates a certificate(self-made certificate) in X.509 format including the public key of thedevice, and sends the certificate as well as a list of certificates upto the root certificate authority (a certificate chain). The client 200decrypts the certificate with the public key of the certificates alreadyinstalled in the client 200 and performs verification up to the rootcertificate to decide that the identity of the certificate is trusted.If necessary, communication for the client verification is performed.

In the encrypted communication following the verification, a session key(common key) is used for encryption in data communication. Then, theclient 200 encrypts the information for creating the session key withthe public key included in the certificate of the device and sends theencrypted information to the device 100. The device 100 decrypts theinformation with the private key of the certificate to get the sessionkey. Thereafter, communication of data generated in an applicationprogram and encrypted becomes possible.

With reference to FIG. 5, it is explained further how to deal withcertificates. The device 100 holds a root certificate. In SSLcommunication, a pair of a public key and a private key is created, anda self-made certificate including the public key is created. Acertificate chain consists of two hierarchical layers of a rootcertificate and a self-made certificate. As shown in FIG. 6, theself-made certificate designates the root certificate as the certificateauthority at a high level. For electronic signature, the device 100obtains a hash value on the self-made certificate including the rootcertificate as a certificate authority at the high level by using apredetermined hash function, performs the signature and adds it to theself-made certificate. Then, the data and the self-made certificate aretransmitted in SSL protocol to the client 200.

For the verification of the public key of a certificate authority, acertificate of another certificate authority at a high level is used.Therefore, a certificate chain, that is, the whole list up to the rootcertificate authority has to be acquired for the verification of thecertificate. Because the root certificate is designated as thecertificate of a certificate authority at the higher level, when theclient 200 verifies the self-made certificate received from the device100, it performs verification by using the root certificate alreadyinstalled therein and decides that the certificate is verified. Thus,the certificate can be verified without using a certificate issued by acertificate authority outside the network 300.

The verification of a certificate is performed as follows.

A) A certificate which signs to the self-made certificate (the rootcertificate in this example) is found. Because the root certificateexists inside the client 200, the existence of the root certificate isguaranteed. Therefore, a warning is not displayed in the screen at thestart of SSL communication.

B) A hash value is decrypted with the public key of the rootcertificate.

C) Another hash value of the self-made certificate is obtained.

D) Next, the two hash values obtained above are compared each other toconfirm that they are the same. If the two values are the same, it isverified that the self-made certificate is not tampered.

FIG. 7 shows a flowchart of the program 122 of creating a rootcertificate executed by the CPU 110 in the device 100. First,information necessary for creating the certificate is inputted by a user(S10). The information includes, for example, a name of theorganization, a name of a section therein, a name of address, a name ofcountry, the expiry date, encryption method, and the like. Next, arandom number is created, and a pair of a public key and a private keyis created based on the random number (S12). For example,Rivest-Shamir-Adleman scheme is used to create the key. Next, a hashvalue of the certificate is obtained for example by using an algorithmsuch as MD5 (S14). Next, the hash value is encrypted with the privatekey (S16). This is added to the certificate encrypted with the privatekey, and the certificate incorporating the signature is provided as aroot certificate (S18).

FIG. 8 shows a flowchart of the program 124 of creating a self-madecertificate executed by the CPU 110 in the device 100. First,information necessary for creating a certificate is inputted by a user(S20). The information includes, for example, a name of theorganization, a name of a section therein, a name of address, a name ofcountry, the expiry date, encryption method, and the like. The rootcertificate as the information of the issuer as well as the pathinformation at high levels of the certificate are included. Next, arandom number is created, and a pair of a public key and a private keyis created based on the random number (S22). For example,Rivest-Shamir-Adleman scheme is used for creating the key. Next, a hashvalue of the certificate is obtained for example by using an algorithmsuch as MD5 (S24). Next, the hash value is encrypted with the privatekey of the root certificate (S26). This is added to the certificateencrypted with the private key, and the certificate incorporating thesignature is provided as a self-made certificate (S28).

FIG. 9 shows a flowchart of the verification of a certificate sent fromthe device (server) 100 executed by the CPU 202 of the client 200. Thisis a part only on a root certificate for the verification with SSLprotocol in the browser 216. The verification is started when acertificate is received from the device (server) 100. First, acertificate at the high level (the root certificate in this example) isacquired based on the information in the certificate (S40), and it isdecided whether or not the certificate authority (CA) at the higherlevel can be trusted (S42). If the certificate authority is registeredas a trusted root certificate in the client 200, or if it is asked tothe root certificate through the Internet to find that it is registeredas a trusted root certificate, the certificate authority is decided tobe trusted. In this example, because the root certificate has beeninstalled beforehand and is registered as a trusted certificateauthority, it is decided that the certificate authority at the higherlevel is trusted. Because the certificate authority at the higher levelis trusted, the signature is decrypted with the public key of the rootcertificate (S44). If the decryption is completed (YES at S46), it isdecided that the certificate is verified by the certificate authority atthe higher level.

Next, a hash value (Hash2) of the certificate is calculated (S48), andthe hash value, Hash2, is compared with the hash value, Hash1, obtainedat step S44 (S50). If they agree with each other, it is decided that thereceived certificate is not tampered, or it is trusted. Then the SSLcommunication is continued (S52).

On the other hand, if the certificate authority at the higher level isnot trusted, or if the signature cannot be decrypted, or if the two hashvalues, Hash1 and Hash2, are not the same, the certificate is decidednot to be trusted. Then, a warning is displayed in the screen of thedisplay device to inform the user of that the certificate is not trusted(S54).

Next, installation of the root certificate 220 by the device 100 to theclient 200 is explained. In an example of the installation, the device100 is a multifunctional peripheral or a printer, and when the printerdriver 218 is installed, the certificate is sent from the device 100 tothe client 200 for installation. FIG. 10 is a flowchart of theinstallation program 220 executed by the CPU 202 for installing the rootcertificate simultaneously with the printer driver. First, the printerdriver 218 is installed (S100). Next, confirmation on the installationof the root certificate into the client 200 is asked to the user in thescreen of the display device (S102). When user's confirmation on theinstallation is received (YES at S104), the root certificate 126 isrequested to the device 100 (S106). When the root certificate 126 isreceived from the device 100 (S108), it is converted to a rootcertificate 222 of a predetermined format (S110). The conversion makesit possible to install the root certificate. Then, the converted rootcertificate 222 is installed to the client 200 (S110).

Preferably, in order to install a root certificate, when the printerdriver 218 is installed from the device 100, the client 200 requests theroot certificate 126 to the device 100. When it receives the rootcertificate 126, it converts the received root certificate to apredetermined format and stores the converted root certificate 222.

In another installation method, the certificate received from the device100 is once stored in the hard disk drive 214 in the client 200 as afile. Then, the certificate is imported in a certificate dialog formanaging certificates. In an example, the root certificate received fromthe device 100 is once stored as a file, and the user installs the rootcertificate file by using the certificate dialog. After importing theroot certificate, the web browser 216 can use the root certificate forthe verification.

FIG. 11 shows a flowchart of another installation program of a rootcertificate executed by the CPU 202 of the client 200. First, a rootcertificate 126 is received from the device 100 (S200). Then, the formatof the root certificate is converted to a predetermined format (S202),and the root certificate file is stored in the hard disk drive 214(S204). Next, the stored root certificate file is installed (S206). Forexample, in the case of the browser (Internet Explorer) of the Windows(trademark), a list of installed certificates is displayed in acertificate dialog box. When the certificate is installed, “Import”button in the certificate dialog is clicked to import the certificate tothe “trusted root certificate authorities”.

The program for installing a root certificate is generated, for example,as an open application program interface (API) of the Windows(trademark) so as to include the above-mentioned function. It may bemade open.

In the above-mentioned embodiment, the verification is performed at onestep. In a general case, a plurality of certificates at the high levelsin the hierarchical order are installed in the client 200. Thus, theclient 200 can perform verification by using a certificate chain up tothe root certificate authority.

In an example shown in FIG. 12, a certificate chain has threehierarchical levels of a root certificate, an intermediate certificateand a self-made certificate. The device 100 such as a printer or amultifunctional peripheral holds the root certificate and theintermediate certificate and has installed them beforehand to the client200. In SSL transmission, the device 100 creates a pair of a public keyand a private key and creates a self-made certificate including thepublic key. The intermediate certificate designates the root certificateas a certificate authority at a higher level and adds the sign to thecertificate, and the self-made certificate designates the intermediatecertificate as a certificate authority at a higher level andincorporates the sign to the certificate. The device 100 obtains a hashvalue by using a predetermined hash function on the self-madecertificate including the intermediate certificate as a certificateauthority at a higher level, performs signature and adds it to theself-made certificate. Then the data and the self-made certificate aretransmitted to the client 200. When the client 200 verifies thetransmitted self-made certificate, it uses a chain of certificates whichhave been installed. Because the self-made certificate designates theintermediate certificate as the certificate of a certificate authorityat higher level, the verification is performed by using the installedintermediate certificate. Further, the intermediate certificate isverified by using the root certificate already installed. Thus, theself-made certificate is decided a trusted certificate.

In the above-mentioned embodiment on the communication of encrypteddata, communication with SSL protocol is explained. However, theinvention can generally be applied to a system which uses a public keyencryption scheme and performs verification by using a chain ofcertificates to the root certificate authority. In such a system, aserver apparatus such as the device holds a root certificate, and theroot certificate is installed beforehand in a client connected through anetwork. When the client receives data in a public key encryptionscheme, it uses the installed root certificate for verifying thecertificate received from the server apparatus. After the verification,communication of encrypted data is started. In the above-mentionedembodiment, a session key is used, but the communication is not limitedto a method using the session key.

Although the present invention has been fully described in connectionwith the preferred embodiments thereof with reference to theaccompanying drawings, it is to be noted that various changes andmodifications are apparent to those skilled in the art. Such changes andmodifications are to be understood as included within the scope of thepresent invention as defined by the appended claims unless they departtherefrom.

What is claimed is:
 1. An image forming apparatus which communicateswith a client through a network, the image forming apparatus comprising:a storage device which stores a first certificate created in the imageforming apparatus, the first certificate created in the image formingapparatus including a public key paired with a private key, the imageforming apparatus comprising a certificate creator configured to createthe first certificate by signing the first certificate with the privatekey; and a communication device which transmits the first certificatestored by the storage device to the client for installation; wherein thecommunication device is configured to transmit a second certificate,which includes path information to the first certificate stored in theimage forming apparatus, to the client when a connection for encryptedcommunication is requested by the client after the first certificatestored in the image forming apparatus is installed in the client,wherein the second certificate transmitted by the communication deviceto the client when the request for encrypted communication is requestedby the client designates the first certificate as a certificateauthority at a higher level and is signed with the private key used tosign the first certificate, and wherein the client is configured to,upon receiving the second certificate after requesting the connectionfor encrypted communication, verify the signature of the secondcertificate received from the image forming apparatus with the firstcertificate installed in the client.
 2. The image forming apparatusaccording to claim 1, wherein the image forming apparatus includes ascanner and a printer.
 3. The image forming apparatus according to claim1, wherein the image forming apparatus is a multi-functional peripheral.4. The image forming apparatus according to claim 1, wherein the storagedevice is a hard disk drive.
 5. The image forming apparatus according toclaim 1, wherein the second certificate transmitted to the client afterthe first certificate stored in the image forming apparatus is installedin the client, is in the same format as the first certificate stored inthe image forming apparatus.
 6. The image forming apparatus according toclaim 1, wherein the second certificate includes an identification of anissuer of the first certificate stored in the image forming apparatus.7. The image forming apparatus according to claim claim 1, wherein: theclient is configured to store the public key of the installed firstcertificate, prior to the client requesting the connection for encryptedcommunication to the image forming apparatus; and the client isconfigured to verify the signature of the second certificate receivedfrom the communication device of the image forming apparatus bydecrypting the second certificate with the public key of the firstcertificate installed in the client.
 8. An image forming apparatus whichcommunicates with a client through a network, the image formingapparatus comprising: a storage device which stores a first certificatecreated in the image forming apparatus, the first certificate created inthe image forming apparatus includes a public key paired with a privatekey, the image forming apparatus comprising a certificate creatorconfigured to create the first certificate by signing the firstcertificate with the private key; and a communication device whichtransmits the first certificate stored by the storage device to theclient based on a designation by the client; wherein the communicationdevice is configured to transmit a second certificate, which includespath information to the first certificate stored in the image formingapparatus, to the client when a connection for encrypted communicationis requested by the client in which the first certificate stored in theimage forming apparatus is installed, wherein the second certificatetransmitted by the communication device to the client when the requestfor encrypted communication is requested by the client designates thefirst certificate as a certificate authority at a higher level and issigned with the private key used to sign the first certificate, andwherein the client is configured to, upon receiving the secondcertificate after requesting the connection for encrypted communication,verify the signature of the second certificate received from the imageforming apparatus with the first certificate installed in the client. 9.The image forming apparatus according to claim 8, wherein the imageforming apparatus includes a scanner and a printer.
 10. The imageforming apparatus according to claim 8, wherein the image formingapparatus is a multi-functional peripheral.
 11. The image formingapparatus according to claim 8, wherein the storage device is a harddisk drive.
 12. The image forming apparatus according to claim 8,wherein the second certificate transmitted to the client after the firstcertificate stored in the image forming apparatus is installed in theclient, is in the same format as the certificate stored in the imageforming apparatus.
 13. The image forming apparatus according to claim 8,wherein the second certificate includes an identification of an issuerof the first certificate stored in the image forming apparatus.
 14. Theimage forming apparatus according to claim 8, wherein: the client isconfigured to store the public key of the installed first certificate,prior to the client requesting the connection for encryptedcommunication to the image forming apparatus; and the client isconfigured to verify the signature of the second certificate receivedfrom the communication device of the image forming apparatus bydecrypting the second certificate with the public key of the firstcertificate installed in the client.
 15. An image forming apparatuswhich communicates with a client through a network, the image formingapparatus comprising: a storage device which stores a first certificatecreated in the image forming apparatus, the first certificate created inthe image forming apparatus including a public key paired with a privatekey, the image forming apparatus comprising a certificate creatorconfigured to create the first certificate by signing the firstcertificate with the private key; and a communication device whichtransmits the first certificate stored by the storage device to theclient for installation; wherein the communication device is configuredto transmit a second certificate, which includes path information to thefirst certificate stored in the image forming apparatus, to the clientwhen a connection for encrypted communication is requested by the clientafter the first certificate stored in the image forming apparatus isinstalled in the client, wherein the second certificate transmitted bythe communication device to the client when the request for encryptedcommunication is requested by the client is signed with the private keyused to sign the first certificate, and wherein the client is configuredto, upon receiving the second certificate after requesting theconnection for encrypted communication, verify the signature of thesecond certificate received from the image forming apparatus with thefirst certificate installed in the client.
 16. The image formingapparatus according to claim 15, wherein the second certificatetransmitted to the client after the first certificate stored in theimage forming apparatus is installed in the client, is in the sameformat as the first certificate stored in the image forming apparatus.17. The image forming apparatus according to claim 15, wherein thesecond certificate includes an identification of an issuer of the firstcertificate stored in the image forming apparatus.
 18. The image formingapparatus according to claim 15, wherein: the client is configured tostore the public key of the installed first certificate, prior to theclient requesting the connection for encrypted communication to theimage forming apparatus; and the client is configured to verify thesignature of the second certificate received from the communicationdevice of the image forming apparatus by decrypting the secondcertificate with the public key of the first certificate installed inthe client.
 19. An image forming apparatus which communicates with aclient through a network, the image forming apparatus comprising: astorage device which stores a first certificate created in the imageforming apparatus, the first certificate created in the image formingapparatus includes a public key paired with a private key, the imageforming apparatus comprising a certificate creator configured to createthe first certificate by signing the first certificate with the privatekey; and a communication device which transmits the first certificatestored by the storage device to the client based on a designation by theclient; wherein the communication device is configured to transmit asecond certificate, which includes path information to the firstcertificate stored in the image forming apparatus, to the client when aconnection for encrypted communication is requested by the client inwhich the first certificate stored in the image forming apparatus isinstalled, wherein the second certificate transmitted by thecommunication device to the client when the request for encryptedcommunication is requested by the client is signed with the private keyused to sign the first certificate, and wherein the client is configuredto, upon receiving the second certificate after requesting theconnection for encrypted communication, verify the signature of thesecond certificate received from the image forming apparatus with thefirst certificate installed in the client.
 20. The image formingapparatus according to claim 19, wherein the second certificatetransmitted to the client after the first certificate stored in theimage forming apparatus is installed in the client, is in the sameformat as the certificate stored in the image forming apparatus.
 21. Theimage forming apparatus according to claim 19, wherein the secondcertificate includes an identification of an issuer of the firstcertificate stored in the image forming apparatus.
 22. The image formingapparatus according to claim 19, wherein: the client is configured tostore the public key of the installed first certificate, prior to theclient requesting the connection for encrypted communication to theimage forming apparatus; and the client is configured to verify thesignature of the second certificate received from the communicationdevice of the image forming apparatus by decrypting the secondcertificate with the public key of the first certificate installed inthe client.