Terminal Device, Access Point, Communication Device, And Computer Programs Therefor

ABSTRACT

A terminal device (e.g., a smartphone) may use a private key to generate a first configuration object used for establishing a first wireless connection between the terminal device and an access point. The terminal device may also use the private key to generate a second configuration object used for establishing a second wireless connection between a communication device (e.g., a printer) and the access point. The terminal device may then transmit specific data (e.g., print data) to the communication device via the access point.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of prior U.S. application Ser. No.16/798,663, filed Feb. 24, 2020, which is a continuation of prior U.S.application Ser. No. 16/371,496, filed Apr. 1, 2019, issued Apr. 7, 2020as U.S. Pat. No. 10,613,805 B2, which claims priority from JapanesePatent Application No. 2018-068822 filed on Mar. 30, 2018, the contentof which is incorporated herein by reference in its entirety.

FIELD OF DISCLOSURE

Aspects described herein relate to a technique for a terminal device anda communication device that are capable of establishing a wirelessconnection with an external device.

BACKGROUND

A device provisioning protocol (“DPP”) is described in, for example,non-patent literature, “DRAFT Device Provisioning Protocol TechnicalSpecification Version 0.2.11” provided by Wi-Fi Alliance. The DPPfacilitates establishment of a Wi-Fi connection. The DPP non-patentliterature describes using a terminal device to establish a Wi-Ficonnection between a client device and an access point and formation ofan infrastructure network.

SUMMARY

The DPP non-patent literature does not describe a specific method forusing the terminal device to establish a Wi-Fi connection between theterminal device and the client device via the access point. For example,the DPP non-patent literature does not describe a method for using aterminal device (e.g., phone) to connect the terminal device to a clientdevice (e.g., a printer) via an access point, so that the terminaldevice may transmit user data (e.g., print data) to the client device.

One or more aspects of the disclosure provide a technique ofappropriately establishing a wireless connection between a terminaldevice and an external device and between a communication device and theexternal device.

One of the aspects of this disclosure includes a terminal device (e.g.,smartphone, tablet, etc.) that may comprise a memory configured to storea private key used to encrypt information obtained using at least apiece of first connection information that is stored in an externaldevice (e.g., an access point) to establish a first wireless connectionbetween the terminal device and the external device via a wirelessinterface of the terminal device. One of the aspects of this disclosurealso includes one or more non-transitory computer-readable media storinginstructions that, when executed by one or more processors, cause aterminal device to perform various processes. For example, theinstructions may cause the terminal device to obtain a first public keyof a communication device (e.g., a printer) and to send, to thecommunication device via the wireless interface, a first authenticationrequest generated using the first public key. The instructions may alsocause the terminal device to receive, from the communication device viathe wireless interface, a first authentication response responsive tothe first authentication request. After the first authenticationresponse is received from the communication device, the instructions maycause the terminal device to generate, using the private key, secondconnection information for establishing a second wireless connectionbetween the communication device and the external device. The privatekey may also be used to encrypt information obtained using at least apiece of the second connection information. Further, the instructionsmay cause the terminal device to send the second connection informationto the communication device via the wireless interface.

According to one or more aspects of the disclosure, the private key usedfor encrypting the information obtained using at least a piece ofinformation included in first connection information for the externaldevice may be the same as the private key used for encrypting theinformation obtained using at least a piece of information included insecond connection information for the communication device. The externaldevice may use the first connection information, in order to establishthe first wireless connection between the terminal device and theexternal device. The communication device may use the second connectioninformation, in order to establish the second wireless connectionbetween the communication device and the external device. The wirelessconnections may be established appropriately between the terminal deviceand the external device and between the communication device and theexternal device.

One of the aspects of this disclosure includes a communication device(e.g., printer, multi-function peripheral (MFP), etc.) that may comprisea wireless interface (e.g., WiFi interface), one or more processors, anda memory. The memory may store instructions that, when executed by theone or more processors, cause the communication device to: receive, froma terminal device via the wireless interface, an authentication requestgenerated using a first public key of the communication device; send, tothe terminal device via the wireless interface, an authenticationresponse responsive to the authentication request; and after sending theauthentication response to the terminal device, receive, from theterminal device via the wireless interface, connection information andspecific information. The connection information may compriseinformation for establishing a second wireless connection between thecommunication device and an external device via the wireless interface.The specific information may comprise at least one of: channelinformation indicating a communication channel used in a first wirelessconnection between the terminal device and the external device, ordevice identification information identifying the external device. Theinstructions may also cause the communication device to establish, usingthe connection information and the specific information, the secondwireless connection between the communication device and the externaldevice.

According to one or more aspects of the disclosure, in a case where thecommunication device may receive the authentication request from theterminal device, the communication device may send the authenticationresponse to the terminal device and receive the connection informationand the specific information from the terminal device. The specificinformation may include at least one of channel information indicatingthe communication channel used in the first wireless connectionestablished between the terminal device and the external device and thedevice identification information identifying the external device. Thecommunication device may establish appropriately the second wirelessconnection between the communication device and the external device byusing the connection information and the specific information. Thewireless connections may be established appropriately between theterminal device and the external device and between the communicationdevice and the external device.

The terminal device itself and computer-readable storage media storingcomputer programs for the terminal device have novelty and utility. Thecommunication device itself and computer-readable storage media storingcomputer programs for the communication device have novelty and utility.Methods to be executed by the terminal device and the communicationdevice have novelty and utility. A communication system including theterminal device and the communication device also have novelty andutility.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a configuration of a communication system including aterminal, a printer and an access point (AP), in an illustrativeembodiment according to one or more aspects of the disclosure.

FIG. 2 is a diagram illustrating an outline of an illustrativeembodiment according to one or more aspects of the disclosure.

FIG. 3 is a sequence diagram illustrating Bootstrapping with the AP inan illustrative embodiment according to one or more aspects of thedisclosure.

FIG. 4 is a sequence diagram illustrating Authentication with the AP inan illustrative embodiment according to one or more aspects of thedisclosure.

FIG. 5 is a sequence diagram illustrating Configuration with the AP inan illustrative embodiment according to one or more aspects of thedisclosure.

FIG. 6 is a sequence diagram illustrating Network Access with the AP inan illustrative embodiment according to one or more aspects of thedisclosure.

FIG. 7 is a sequence diagram illustrating Bootstrapping with the printerin an illustrative embodiment according to one or more aspects of thedisclosure.

FIG. 8 is a sequence diagram illustrating Authentication with theprinter in an illustrative embodiment according to one or more aspectsof the disclosure.

FIG. 9 is a sequence diagram illustrating Configuration with the printerin an illustrative embodiment according to one or more aspects of thedisclosure.

FIG. 10 is a sequence diagram illustrating Network Access between theprinter and the AP in an illustrative embodiment according to one ormore aspects of the disclosure.

FIG. 11 is a sequence diagram illustrating processes performed betweenthe terminal, the printer, and the AP, in an illustrative embodimentaccording to one or more aspects of the disclosure.

DETAILED DESCRIPTION Configuration of Communication System 2; FIG. 1

As depicted in FIG. 1, a communication system 2 includes an access point(“AP”) 6, a terminal 10, and a printer 100. In an illustrativeembodiment, a user uses the terminal 10 to establish a wirelessconnection based on Wi-Fi technology (hereinafter referred to as a“Wi-Fi connection”) between the terminal 10 and the AP 6, and thenbetween the printer 100 and the AP 6.

Configuration of Terminal 10

The terminal 10 may be a portable terminal device, such as a mobilephone (e.g., a smart phone), a PDA, and a tablet PC. In anotherembodiment, the terminal 10 may be a desktop computer or a laptopcomputer.

The terminal 10 includes an operation unit 12, a display 14, a camera15, and a Wi-Fi interface (“I/F”) 16, and a controller 30 that areinterconnected via bus lines (no reference number designated).

The operation unit 12 includes a plurality of keys. A user can input avariety of instructions to the terminal 10 by operating the operationunit 12. The display 14 is configured to display a variety ofinformation. The display 14 may include a touch screen display thatfunctions as an operation unit and receives user's instructions. Thecamera 15 is configured to take photographs of objects. In anillustrative embodiment, the camera 15 may be used to scan a QR code(registered trademark) provided for each of the AP 6 and the printer100.

The Wi-Fi I/F 16 has a MAC address (e.g., “macte”) assigned thereto. TheWi-Fi I/F 16 is a wireless communication interface that allows forwireless communication in accordance with a Wi-Fi technology as providedin, for example, IEEE (The Institute of Electrical and ElectronicsEngineers, Inc.) 802.11 standards and other standards (e.g., 802.11a,11b, 11g, 11n, and 11ac). The Wi-Fi I/F 16 supports a deviceprovisioning protocol (“DPP”) whose draft specification will befinalized by Wi-Fi Alliance. The draft specification, “DRAFT DeviceProvisioning Protocol Technical Specification Version 0.2.11” providedby Wi-Fi Alliance, describes DPP that provides a method for readilyestablishing a Wi-Fi connection, using the terminal 10, between a pairof devices (e.g., between the terminal 10 and the AP 6 or between theprinter 100 and the AP 6).

The controller 30 includes a CPU 32 and memory 34. The CPU 32 isconfigured to execute various processing based on programs 36 and 38stored in the memory 34. The memory 34 may be volatile or nonvolatilememory. The memory 34 stores therein an OS program 36, and a connectionapplication 38 (hereinafter simply referred to as the “app 38”).

The OS program 36 is a program for controlling principle operations ofthe terminal 10. The app 38 is a program for establishing a Wi-Ficonnection between a pair of devices in accordance with the DPP. The app38 may be installed in the terminal 10 from a server on the Internet.The server may be provided by, for example, a vendor of the printer 100.

Configuration of Printer 100

The printer 100 is a peripheral device of, for example, the terminaldevice 10. The printer 100 is configured to execute printing. Theprinter 100 includes an operation unit 112, a display 114, a Wi-Fi I/F116, a print execution unit 118, and a controller 130 that areinterconnected via bus lines (no reference number designated).

The operation unit 112 includes a plurality of keys. A user can input avariety of instructions to the printer 100 by operating the operationunit 112. The display 114 is configured to display a variety ofinformation. The display 114 may include a touch screen display thatfunctions as an operation unit and receives user's instructions. TheWi-Fi I/F 116 has similar configuration to the Wi-Fi I/F 16 of theterminal 10, and supports the DPP. The Wi-Fi I/F 116 has a MAC address(e.g., “macpr”) assigned thereto. The print execution unit 118 includes,for example, an inkjet or laser printing mechanism.

The controller 130 includes a CPU 132 and memory 134. The CPU 132 isconfigured to execute various processing based on the programs 136stored in the memory 134. The memory 134 may be volatile or nonvolatilememory.

Outline of Illustrative Embodiment; FIG. 2

Referring to FIG. 2, an outline of the illustrative embodiment will nowbe described. The AP 6 also supports the DPP as the terminal 10 and theprinter 100 do. The AP 6 has a MAC address (e.g., “macap”) assignedthereto. In the illustrative embodiment, the devices 6, 10, and 100perform communication therebetween based on the DPP, therebyestablishing a Wi-Fi connection between the terminal 10 and the AP 6 andbetween the printer 100 and the AP 6. For ease of understanding, thefollowing disclosure describes the processes/steps as being performed bythe devices (e.g., the terminal 10 and the printer 100); however, itshould be understood that the CPUs 32 and 132 may execute theprocesses/steps.

At T5, the terminal 10 executes DPP Bootstrapping with the AP 6. TheBootstrapping at T5 is a process for providing information, which isused for a subsequent DPP Authentication at T10, from the AP 6 to theterminal 10. The Bootstrapping may include scanning of a code (e.g.,Quick Response (QR) code) by the terminal 10. The QR code may beattached to the AP 6.

At T10, the terminal 10 executes the DPP Authentication with the AP 6using the information obtained at T5. The Authentication at T10 is aprocess for authenticating the terminal 10 and the AP 6 to each other.

At T15, the terminal 10 executes DPP Configuration with the AP 6. TheConfiguration at T15 is a process for sending, from the terminal 10 tothe AP 6, information for allowing the AP 6 to establish a Wi-Ficonnection with the terminal 10. In one example, the terminal 10generates a configuration object (“CO”) for the AP 6. The configurationobject for the AP 6 may be herein referred to as an “AP configurationobject”. The terminal 10 sends the AP configuration object to the AP 6.The AP 6 receives and stores the AP configuration object therein.

At T20, the terminal 10 executes DPP Network Access with the AP 6. Inthe Network Access at T20, the terminal 10 generates a CO for theterminal 10 and stores the CO in the memory 34. The CO for the terminal10 may be herein referred to as a “terminal configuration object”. Usingthe terminal configuration object and the AP configuration object, theterminal 10 and the AP 6 share a connector key for establishing a Wi-Ficonnection therebetween.

At T25, the terminal 10 and the AP 6 execute a four-way handshake.During the four-way handshake, each of the terminal 10 and the AP 6sends information encrypted using the connector key shared in theNetwork Access at T20. If decryption of the encrypted information issuccessful, a Wi-Fi connection is established between the terminal 10and the AP 6. The terminal 10 joins a wireless network formed by the AP6 as a child station. In other words, the terminal 10 and the AP 6 areon the same network in which the terminal 10 is a child station and theAP 6 is a parent station. In another embodiment, simultaneousauthentication of equals (“SAE” or what is called “Dragonfly”) may beused for the four-way handshake.

Subsequently, at T55, the terminal 10 executes DPP Bootstrapping withthe printer 100. The Bootstrapping at T55 is a process for providinginformation, which is used for a subsequent DPP Authentication at T60,from the printer 100 to the terminal 10. The Bootstrapping may includescanning of a Quick Response (QR) code by the terminal 10. The QR codemay be displayed on the printer 100.

At T60, the terminal 10 executes the DPP Authentication with the printer100 using the information obtained at T55. The Authentication at T60 isa process for authenticating the terminal 10 and the printer 100 to eachother.

At T65, the terminal 10 executes DPP Configuration with the printer 100.The Configuration at T65 is a process for sending, from the terminal 10to the printer 100, information for allowing the printer 100 toestablish a Wi-Fi connection with the AP 6. In one example, the terminal10 generates a CO for the printer 100 and sends the CO to the printer100. The CO for the printer 100 may be herein referred to as a “printerconfiguration object”. The printer 100 receives and stores the printerconfiguration object therein.

At T70, the printer 100 and the AP 6 execute DPP Network Access usingthe printer configuration object and the AP configuration object. TheNetwork Access at T70 is a process for sharing, between the printer 100and the AP 6, a connector key for establishing a Wi-Fi connectiontherebetween.

At T75, the printer 100 and the AP 6 execute a handshake (e.g., afour-way handshake). During the four-way handshake, each of the printer100 and the AP 6 sends information encrypted using the connector keyshared in the Network Access at T70. If decryption of the encryptedinformation is successful, a Wi-Fi connection is established between theprinter 100 and the AP 6. The printer 100 joins, as a child station, thewireless network formed by the AP 6. In other words, the printer 100 andthe AP 6 are on the same network in which the printer 100 is a childstation and the AP 6 is a parent station.

After successful completion of T5 through T75, the terminal 10 and theprinter 100 are on the wireless network, which is formed by the AP 6, aschild stations. This may allow the terminal 10 and the printer 100 tocommunicate with each other, via the AP 6, using the wireless network.For example, the terminal 10 and the printer 100 may perform thefollowing communications. At T80, the terminal 10 sends print data thatrepresents an image to be printed, to the AP 6. At T85, the AP 6 sendsthe print data to the printer 100. At T90, the printer 100 executesprinting based on the print data.

With the DPP, a user can readily establish a Wi-Fi connection betweenthe terminal 10 and the AP 6 and between the printer 100 and the AP 6,e.g., readily add a new device (e.g., the printer 100 and the terminal10) to a wireless network in which the AP 6 acts as a parent station,without entering, into the terminal 10 and the printer 100, informationof the wireless network (e.g., a service set identifier (“SSID”) and apassword).

Bootstrapping With AP 6; FIG. 3

Referring to FIGS. 3 through 10, steps T5-T20 and T55-T70 in FIG. 2 willbe described in detail below. The Bootstrapping, at T5 in FIG. 2,between the terminal 10 and the AP 6 will now be described referring toFIG. 3. In a state in FIG. 3 prior to an execution of T100, the AP 6 hasstored a public key APK1 and a private key ask1 thereof (see right-handside of FIG. 3). The AP 6 has a QR code attached to a casing thereof.The QR code is obtained by encoding the public key APK1 of the AP 6, achannel list L1 of the AP 6, and the MAC address (e.g., “macap”) of theAP 6. The channel list L1 lists a plurality of communication channels tobe used for the Authentication (refer to T10 in FIG. 2). In other words,the channel list L1 lists communication channels usable by the AP 6.

Based on receiving a user's operation for starting up the app 38, theterminal 10 causes the app 38 to start up at T100. The followingprocessing to be performed by the terminal 10 may be implemented by theapp 38. Subsequently, at T102, the terminal 10 causes the display 14 todisplay a selection screen. The selection screen may include a “New”button that represents an option for establishing a new Wi-Fi connectionby the terminal 10 (e.g., creation of a wireless network by the terminal10).

Based on a user's selection of the “New” button in the selection screenat T104, the terminal 10 causes the display 14 to display, at T106, aninput screen for inputting a group ID. The group ID is information foridentifying the wireless network to be formed as the terminal 10establishes the new Wi-Fi connection.

Based on a user's input of the group ID, e.g., “home” in the selectionscreen at T108, the terminal 10 may cause the display 14 to display, atT110, a confirmation screen for encouraging the user to confirm whetherto allow the terminal 10 to establish a Wi-Fi connection with the AP 6.The confirmation screen includes a “YES” button for allowing theterminal 10 to establish a Wi-Fi connection with the AP 6 and a “NO”button for not allowing the terminal 10 to establish a Wi-Fi connectionwith the AP 6.

Based on a user's selection of the “YES” button in the confirmationscreen at T112, the terminal 10 causes the camera 15 to activate. AtT120, the terminal 10 causes the camera 15 to scan the QR code, whichmay be attached to the casing of the AP 6. At T122, the terminal 10decodes the scanned QR code and obtains the public key APK1, the channellist L1, and the MAC address (e.g., “macap”). Upon completion of T122,the Bootstrapping with the AP 6 in FIG. 3 ends.

Authentication With AP 6; FIG. 4

Referring to FIG. 4, the Authentication, at T10 in FIG. 2, between theterminal 10 and the AP 6 will now be described.

At 200, the terminal 10 generates a public key TPK1 and a private/secretkey tsk1 thereof. Subsequently, at T201, the terminal 10 generates ashared key SK1 using the generated private key tsk1 of the terminal 10,and the public key APK1 of the AP 6 that is obtained at T122 in FIG. 3.The shared key SK1 may be generated based on Elliptic CurveDiffie-Hellman key exchange (“ECDH”). At T202, the terminal 10 encryptsa random value RV1 using the shared key SK1 and generates encrypted dataEDE

At T210, the terminal 10 sends, via the Wi-Fi I/F 16, a DPPAuthentication Request (hereinafter referred to as an “AReq”) to the AP6, e.g., to the MAC address “macap”, obtained at T122 in FIG. 3, as arecipient. The AReq is a signal for requesting the AP 6 to executeauthentication. The AReq includes the public key TPK1 of the terminal10, which is generated at T200, and the encrypted data ED1, which isgenerated at T202, and capability information (described below) of theterminal 10. The terminal 10 may send the AReq to the AP one or moretimes using (e.g., sequentially) one or more communication channelslisted or represented in the channel list L1, which is obtained at T122in FIG. 3.

The capability information is information that is pre-designated for aDPP-supporting device. The capability information may include one ofthree values: a value representing that the device operates as a DPPConfigurator; a value representing that the device operates as a DPPEnrollee; and a value representing that the device operates as both theConfigurator and the Enrollee. The Configurator refers to a device thatsends, in the Configuration process (e.g., T15 in FIG. 2), a CO for usein the Network Access process (e.g., T20 in FIG. 2), to an Enrollee. TheEnrollee refers to a device that receives, in the Configuration, a COfor use in the Network Access, from the Configurator. In an illustrativeembodiment, the terminal 10 generates the AP configuration object andsends the configuration object to the AP 6, and also generates theprinter configuration object, and sends the configuration object to theprinter 100, as described above. The capability information of theterminal 10 includes a value representing that the terminal 10 operatesas a Configurator.

At T210, the AP 6 receives the AReq from the terminal 10. As describedabove, the AReq is sent to the MAC address “macap” of the AP 6 as arecipient. The AP 6 may thus receive the AReq from the terminal 10appropriately. The AP 6 monitors reception of the AReq that is sentusing one of the communication channels (which are usable by the AP 6)in the channel list L1. As described above, the AReq at T210 may be sentone or more times using (e.g., sequentially) one or more communicationchannels listed or represented in the channel list L1, and the AP 6 mayreceive the AReq from the terminal 10 appropriately.

Subsequently, the AP 6 executes the following steps for authenticatingthe sender (e.g., the terminal 10) of the AReq. In one example, at T212,the AP 6 generates a shared key SK1, based on the ECDH, using the publickey TPK1 of the terminal 10 in the AReq and the private key ask1 of theAP 6. The shared key SK1 generated by the AP 6 at T212 is the same asthe shared key SK1 generated by the terminal 10 at T201. At T214, the AP6 may successfully decrypt the encrypted data ED1 in the AReq using theshared key SK1, and may obtain the random value RV1. If the decryptionof the encrypted data ED1 is successful, the AP 6 determines that thesender of the AReq is a device that scans the QR code of the AP 6, e.g.,determines that the authentication is successful. The AP 6 executes T216and its subsequent steps. If the decryption of the encrypted data ED1 isnot successful, the AP 6 determines that the sender of the AReq is not adevice that scans the QR code of the AP 6, e.g., determines that theauthentication is not successful, and does not execute T216 or itssubsequent steps.

At T216, the AP 6 generates a public key APK2 and a private key ask2thereof. In another embodiment, the AP 6 may pre-store the public keyAPK2 and the private key ask2. Subsequently, at T217, the AP 6 generatesa shared key SK2, based on the ECDH, using the public key TPK1 of theterminal 10 in the AReq at T210 and the generated private key ask2 ofthe AP 6. At T218, the AP 6 encrypts the random value RV1 and a randomvalue RV2 using the shared key SK2 and generates encrypted data ED2.

At T220, the AP 6 sends a DPP Authentication Response (hereinafterreferred to as an “ARes”) to the terminal 10. The ARes includes thepublic key APK2 of the AP 6 generated at T216, the encrypted data ED2generated at T218, and capability information of the AP6. Thiscapability information includes a value representing that the AP 6operates as an Enrollee.

Based on receiving the ARes from the AP 6 via the Wi-Fi I/F 16, theterminal 10 executes the following steps for authenticating the sender(e.g., the AP 6) of the ARes. In one example, at T222, the terminal 10generates a shared key SK2, based on the ECDH, using the private keytsk1 of the terminal 10 generated at T200, and the public key APK2 ofthe AP 6 in the ARes. The shared key SK2 generated by the terminal 10 atT222 is the same as the shared key SK2 generated by the AP 6 at T217. AtT224, the terminal 10 successfully decrypts the encrypted data ED2 inthe ARes using the shared key SK2, and obtains the random values RV1 andRV2. If the decryption of the encrypted data ED2 is successful, theterminal 10 determines that the sender of the ARes is a device havingthe QR code that the terminal 10 has scanned, e.g., determines that theauthentication is successful. The terminal 10 executes T230 and itssubsequent steps. If the decryption of the encrypted data ED2 is notsuccessful, the terminal 10 determines that the sender of the ARes isnot a device having the QR code that the terminal 10 has scanned, e.g.,determines that the authentication is not successful, and does notexecute T230 or its subsequent steps.

At T230, the terminal 10 sends a Confirm message to the AP 6 via theWi-Fi I/F 16. The Confirm message includes information representing thatthe terminal 10 operates as a Configurator and the AP 6 operates as anEnrollee, so that the terminal 10 determines, at T232, that the terminal10 operates as a Configurator and the AP 6 determines, at T234, that theAP 6 operates as an Enrollee. Upon completion of T234, theAuthentication with the AP 6 in FIG. 4 ends. After ending the processesin FIG. 4, the terminal 10 discards the public key TPK1 and the privatekey tsk1 (e.g., deletes the keys from the memory 34).

Configuration With AP 6; FIG. 5

Referring to FIG. 5, the Configuration process, at T15 in FIG. 2,between the terminal 10 and the AP 6 will now be described.

At T300, the AP 6 sends a DPP Configuration Request (hereinafterreferred to as a “CReq”) to the terminal 10. The CReq is a signal forrequesting the terminal 10 to send the AP configuration object.

At T300, the terminal 10 receives the CReq from the AP 6 via the Wi-FiI/F 16. Based on receiving the CReq from the AP 6, the terminal 10generates, at T302, a public key TPK2 and a private key tsk2 thereof,and stores the keys in the memory 34. At T304, the terminal 10 generatesan AP configuration object using the generated private key tsk2. In oneexample, the terminal 10 executes the following steps to generate the APconfiguration object.

The terminal 10 performs a hash function of the public key TPK2 of theterminal 10 and generates a hash value HV. The terminal 10 also performsa hash function of a combination of the hash value HV, the group ID(e.g., “home”) input at T108 in FIG. 3, and the public key APK2 of theAP 6 in the ARes at T220 in FIG. 4, and generates a first value. Theterminal 10 encrypts the first value using the private key tsk2 of theterminal 10 based on an Elliptic Curve Digital Signature Algorithm(“ECDSA”), and generates a digital signature DSap. The terminal 10generates a signed-connector (“SC”) for the AP 6. The SC for the AP 6may be herein referred to as an “AP signed-connector”. The APsigned-connector includes a hash value HV, the group ID (e.g., “home”),the public key APK2 of the AP 6, and the digital signature DSap.Subsequently, the terminal 10 generates an AP configuration objectincluding the AP signed-connector, and the public key TPK2 of theterminal 10.

At T310, the terminal 10 sends, via the Wi-Fi I/F 16, a DPPConfiguration Response (hereinafter referred to as a “CRes”) to the AP6. The CRes includes the AP configuration object.

At T310, the AP 6 receives the CRes from the terminal 10. Based onreceiving the CRes from the terminal 10, the AP 6 stores, in its memory,the AP configuration object of the CRes at T312. Upon completion ofT312, the Configuration with the AP 6 in FIG. 5 ends.

Network Access With AP 6; FIG. 6

Referring to FIG. 6, the Network Access process, at T20 in FIG. 2,between the terminal 10 and the AP 6 will now be described.

At T400, the terminal 10 generates a public key TPK3 and a private keytsk3 thereof. Subsequently, at T402, the terminal 10 generates aterminal configuration object, using the private key tsk2 of theterminal 10 that is generated at T302 in FIG. 5 and stored in the memory34. In one example, the terminal 10 executes the following steps togenerate a terminal configuration object.

The terminal 10 performs a hash function of the public key TPK2 of theterminal 10 and generates a hash value HV. The terminal 10 also performsa hash function of a combination of the hash value HV, the group ID(e.g., “home”) input at T108 in FIG. 3, and the public key TPK3 of theterminal 10 generated at T400, and generates a second value. Theterminal 10 encrypts the second value using the private key tsk2 of theterminal 10 based on the ECDSA, and generates a digital signature DSte.The terminal 10 generates a SC for the terminal 10. The SC for theterminal 10 may be herein referred to as a “terminal signed-connector”.The terminal signed-connector includes the hash value HV, the group ID(e.g., “home”), the public key TPK3 of the terminal 10, and the digitalsignature DSte. The hash value HV and the group ID (e.g., “home”) in theterminal signed-connector are the same as the hash value HV and thegroup ID (e.g., “home”) in the AP signed-connector, respectively. Thepublic key TPK3 and the digital signature DSte that are included in theterminal signed-connector, may be different from the public key APK2 andthe digital signature DSap that are included in the AP signed-connector,respectively. The terminal 10 generates a terminal configuration objectand stores the configuration object in the memory 34. The terminalconfiguration object includes the terminal signed-connector, and thepublic key TPK2 of the terminal 10 that is generated at T302 in FIG. 5and stored in the memory 34.

At T410, the terminal 10 sends, via the Wi-Fi I/F 16, a DPP PeerDiscovery Request (hereinafter referred to as a “DReq”) that includesthe terminal signed-connector, to the AP 6. The DReq is a signal forrequesting the AP 6 to execute an authentication process and to send theAP signed-connector to the terminal 10.

Based on receiving the DReq from the terminal 10 at T410, the AP 6executes the authentication process for authenticating the sender (e.g.,the terminal 10) of the DReq, and information in the DReq (e.g., thehash value HV, the group ID (e.g., “home”), and the public key TPK3).The authentication process may include a first AP determination processand a second AP determination process, which are described below. In oneexample, the AP 6 executes, at T412, the first AP determination process.In this process, the AP 6 determines whether the hash value HV and thegroup ID (e.g., “home”) in the terminal signed-connector match the hashvalue HV and the group ID (e.g., “home”) in the AP signed-connector,respectively. In the example case shown in FIG. 6, the AP 6 determines“yes” in the first AP determination process (e.g., determines that thehash value HV and the group ID (e.g., “home”) in the terminalsigned-connector respectively match the hash value HV and the group ID(e.g., “home”) in the AP signed-connector). In other words, the AP 6determines that authentication of the sender (e.g., the terminal 10) ofDReq is successful. Determining “yes” in the first AP determinationprocess means that the terminal signed-connector and the APsigned-connector are both generated by the same device (e.g., theterminal 10). Accordingly, the AP 6 also determines that authenticationof the generator (e.g., the terminal 10) of the terminalsigned-connector is successful. The AP 6 decrypts the distal signatureDSte in the terminal signed-connector, using the public key TPK2, of theterminal 10, included in the AP configuration object. In the examplecase shown in FIG. 6, the digital signature DSte is successfullydecrypted. Subsequently, the AP 6 executes the second AP determinationprocess. In this process, the AP 6 determines whether the second valueobtained by decrypting the digital signature DSte matches the valueobtained by performing a hash function of information in the terminalsigned-connector (e.g., the hash value HV, the group ID “home”, and thepublic key TPK3). In the example case shown in FIG. 6, the AP 6determines “yes” in the second AP determination process (e.g.,determines that the second value obtained by decrypting the digitalsignature DSte matches the value obtained by performing a hash functionof information in the terminal signed-connector). In other words, the AP6 determines that authentication of the information in the DReq issuccessful, and executes T414 and its subsequent steps. Determining“yes” in the second AP determination process means that information inthe terminal signed-connector has not been altered or modified bysomeone since the terminal configuration object was stored in theterminal 10. As will be described below in conjunction with T422, T812and T822, authentication of a DReq and a DRes using a digital signatureis executed to verify whether information in the DReq and the DRes hasbeen altered or modified by someone. The AP 6 determines thatauthentication of the DReq is unsuccessful and does not execute T414 orsubsequent steps, in a case where (i) the AP 6 determines “no” in thefirst AP determination process; (ii) the decryption of the digitalsignature DSte is unsuccessful; or (iii) the AP 6 determines “no” in thesecond AP determination process.

Subsequently, at T414, the AP 6 generates a connector key (e.g., sharedkey) CK1, based on the ECDH, using the public key TPK2 of the terminal10 in the AP configuration object and the private key ask2 of the AP 6.

At T420, the AP 6 sends, to the terminal 10, a DPP Peer DiscoveryResponse (“DRes”) including the AP signed-connector.

Based on receiving the DRes from the AP 6 via Wi-Fi I/F 16 at T420, theterminal 10 executes an authentication process for authenticating thesender (e.g., the AP 6) of the DRes, and information in the DRes (e.g.,the hash value HV, the group ID (e.g., “home”), and the public keyAPK2). The authentication process may include a first terminaldetermination process and a second terminal determination process, whichare described below. In one example, the terminal 10 executes, at T422,the first terminal determination process. In this process, the terminal10 determines whether the hash value HV and the group ID (e.g., “home”)in the AP signed-connector respectively match the hash value HV and thegroup ID (e.g., “home”) in the terminal signed-connector. In the examplecase of FIG. 6, the terminal 10 determines “yes” in the first terminaldetermination process (e.g., determines that the hash value HV and thegroup ID (e.g., “home”) in the AP signed-connector respectively matchthe hash value HV and the group ID (e.g., “home”) in the terminalsigned-connector). In other words, the terminal 10 determines thatauthentication of the sender (e.g., the AP 6) of DRes is successful.Determining “yes” in the first terminal determination process means thatthe terminal signed-connector and the AP signed-connector are bothgenerated by the same device (e.g., the terminal 10). Accordingly, theterminal 10 also determines that authentication of the generator (e.g.,the terminal 10) of the AP signed-connector is successful. The terminal10 decrypts the distal signature DSap in the AP signed-connector, usingthe public key TPK2, of the terminal 10, included in the terminalconfiguration object. In the example case shown in FIG. 6, the digitalsignature DSap is successfully decrypted. Subsequently, the terminal 10executes the second terminal determination process. In this process, theterminal 10 determines whether the first value obtained by decryptingthe digital signature DSap matches the value obtained by performing ahash function of information in the AP signed-connector (e.g., the hashvalue HV, the group ID (e.g., “home”), and the public key APK2). In theexample case of FIG. 6, the terminal 10 determines “yes” in the secondterminal determination process (e.g., determines that the first valuematches the value obtained by performing a hash function of theinformation in the AP signed-connector). In other words, the terminal 10determines that authentication of the information in the DRes issuccessful, and executes T424 and its subsequent steps. The terminal 10determines that authentication of the DRes is unsuccessful and does notexecute T424 or subsequent steps, in a case where (i) the terminal 10determines “no” in the first terminal determination process; (ii) thedecryption of the digital signature DSap is unsuccessful; or (iii) theterminal 10 determines “no” in the second terminal determinationprocess.

At T424, the terminal 10 generates a connector key CK1 based on theECDH, using the private key tsk2 of the terminal 10, and the public keyAPK2 of the AP 6 in the AP signed-connector. The connector key CK1generated by the terminal 10 at T424 is the same as the connector keyCK1 generated by the AP 6 at T414. The connector key CK1 is thus sharedbetween the terminal 10 and the AP 6 to establish a Wi-Fi connectiontherebetween. Upon completion of T424, the Network Access process withthe AP 6 in FIG. 6 ends.

As described above, the connector key CK1 is shared between the terminal10 and the AP 6. Subsequently, the terminal 10 and the AP 6 execute, atT25 in FIG. 2, a four-way handshake using the connector key CK1, and aWi-Fi connection is established between the terminal 10 and the AP 6.

Bootstrapping With Printer 100; FIG. 7

Referring to FIG. 7, the Bootstrapping, at T55 in FIG. 2, between theterminal 10 and the printer 100 will now be described. In a state inFIG. 7 prior to an execution of T500, the terminal 10 has stored, in thememory 34, the public and private keys TPK2 and tsk2 thereof (refer toT302 in FIG. 5); the public and private keys TPK3 and tsk3 thereof(refer to T400 in FIG. 6); and the terminal configuration object (referto T402). A public key PPK1 and a private key psk1 may be pre-stored(e.g., by a printer manufacturer) in the memory 134 of the printer 100.

Step T500 is similar to T100 in FIG. 3. The terminal 10 obtains thegroup ID (e.g., “home”) included in the terminal signed-connector, whichis in the terminal configuration object stored in the memory 34. AtT502, the terminal 10 causes the display 14 to display a selectionscreen including buttons, e.g., “New” and “home”, which is the samecharacter string as the obtained group ID “home”.

To establish a Wi-Fi connection between the printer 100 and the AP 6,the user may select, at T504, the “home” button in the selection screen.Since the user input the character string “home” (refer to T108 in FIG.3), the user may readily understand that the “home” button should beselected to establish a Wi-Fi connection between the printer 100 and theAP 6. To establish a Wi-Fi connection between the terminal 10 and aparticular AP that is different from the AP 6, the user can select the“New” button in the selection screen. In this case, the terminal 10similarly executes processes, as described above in conjunction withFIGS. 3-6, with the particular AP, to establish a Wi-Fi connectionbetween the terminal 10 and the particular AP. Thus, a Wi-Fi connectionmay be appropriately established between a pair of devices as the userdesires. Based on a user's selection of the “home” button in theselection screen at T504, the terminal 10 causes the camera 15 toactivate, and causes the display 14 to display, at T506, an instructionscreen including a message encouraging the user to scan a QR code of theprinter 100 (e.g., a message instructing a user how to operate theprinter 100 to obtain the printer's QR code).

At T510, a user may perform an operation on the printer 100 (e.g.,selecting a button). In some embodiments, the user operation may causethe display 114 of the printer 100 to display the QR code at T512. TheQR code is a coded image that is obtained by encoding the public keyPPK1 and the channel list L2, which are stored in the memory 134, andthe MAC address (e.g., “macpr”) of the Wi-Fi I/F 116. The channel listL2 lists a plurality of communication channels to be used for theAuthentication process (refer to T60 in FIG. 2). In other words, thechannel list L2 lists communication channels usable by the printer 100.The QR code may be generated by the printer 100 at T512 or may be storedin the memory 134 before the printer 100 is shipped.

At T520, the terminal 10 causes the camera 115 to scan the QR codedisplayed in the printer 100. At T522, the terminal 10 decodes thescanned QR code and obtains the public key PPK1, the channel list L2,and the MAC address “macpr”. Upon completion of T522, the Bootstrappingwith the printer 100 in FIG. 7 ends.

Authentication With Printer 100; FIG. 8

Referring to FIG. 8, the Authentication process, at T60 in FIG. 2,between the terminal 10 and the printer 100 will now be described.

At T600, the terminal 10 generates a public key TPK4 and a private keytsk4 thereof. At T601, the terminal 10 generates a shared key SK3, basedon the ECDH, using the generated private key tsk4, and the public keyPPK1, of the printer 100, obtained at T522 in FIG. 7. At T602, theterminal 10 encrypts a random value RV3 using the shared key SK3 andgenerates encrypted data ED3.

At T610, the terminal 10 sends, via the Wi-Fi I/F 16, an AReq to theprinter 100, e.g., the MAC address “macpr” that is obtained at T522 inFIG. 7, as a recipient. The terminal 10 may send the AReq one or moretimes to the printer 100 using one or more of the communication channelslisted or represented in the channel list L2, which is obtained at T522.The AReq includes the public key TPK4, of the terminal 10, generated atT600, the encrypted data ED3 generated at T602, and capabilityinformation of the terminal 10. The capability information includes avalue representing that the terminal 10 operates as a Configurator.

At T610, the printer 100 receives the AReq from the terminal 10 via theWi-Fi I/F 116. The AReq is sent to the MAC address (e.g., “macpr”) ofthe printer 100 as a recipient, so that the printer 100 may receive theAReq appropriately. The AReq is sent to the printer 100 using (e.g.,sequentially) one or more of the communication channels (which areusable by the printer 100) in the channel list L2, so that the printer100 may receive the AReq appropriately.

Subsequently, the printer 100 executes T612 and T614 for authenticatingthe sender (e.g., the terminal 10) of the AReq. Steps T612 and T614 aresimilar to T212 and T214 in FIG. 4, respectively, except for the data(e.g., keys and encrypted data) to be used. At T612, the printer 100generates a shared key SK3 using the public key TPK4 and the private keypsk1. At T614, the printer 100 decrypts the encrypted data ED3 in theAReq using the shared key SK3. If the decryption of the encrypted dataED3 is successful, the printer 100 determines that the authentication ofthe sender (e.g., the terminal 10) of the AReq is successful, andexecutes T616 and its subsequent steps.

At T616, the printer 100 generates a public key PPK2 and a private keypsk2 thereof. In another embodiment, the public key PPK2 and the privatekey psk2 may be pre-stored in the memory 134. Subsequent steps T617 andT618 are similar to T217 and T218 in FIG. 4, respectively, except forthe data (e.g., keys and encrypted data) to be used. At T617, theprinter 100 generates a shared key SK4 using the public key TPK4 and theprivate key psk2. At T618, the printer 100 encrypts random values RV3and RV4 using the shared key SK4 and generates encrypted data ED4.

At T620, the printer 100 sends an ARes to the terminal 10 via the Wi-FiI/F 116. The ARes includes the public key PPK2, of the printer 100,generated at T616, the encrypted data ED4 generated at T618, andcapability information of the printer 100. The capability informationincludes a value representing that the printer 100 operates as anEnrollee.

Steps T622-T634 are similar to T222-T234 in FIG. 4, except that a deviceto be communicated at T630 is the printer 100, and different keys anddata (e.g., the public key PPK2, the encrypted data ED4, the private keytsk4, the shared key S4 and the random values RV3 and RV4) are used atT622 or T624. The Confirm message at T630 includes informationrepresenting that the terminal 10 operates as a Configurator and theprinter 100 operates as an Enrollee, so that the terminal 10 determines,at T632, that the terminal 10 operates as a Configurator, and theprinter 100 determines, at T634, that the printer 100 operates as anEnrollee. Upon completion of T634, the Authentication with the printer100 in FIG. 8 ends. After ending the processes in FIG. 8, the terminal10 discards the public key TPK4 and the private key tsk4 (e.g., deletesthe keys from the memory 34).

Configuration With Printer 100; FIG. 9

Referring to FIG. 9, the Configuration process, at T65 in FIG. 2,between the terminal 10 and the printer 100 will now be described.

At T700, the printer 100 sends a CReq to the terminal 10 via the Wi-FiI/F 116. The CReq is a signal for requesting the terminal 10 to send aprinter configuration object.

At T700, the terminal 10 receives the CReq from the printer 100, via theWi-Fi IF 16. Based on receiving the CReq from the printer 100, theterminal 10 obtains, at T702, the public key TPK2 and the private keytsk2 thereof from the memory 34. In one example, the terminal 10obtains, from the memory 34, the terminal configuration object thatincludes the group ID (e.g., “home”), which has the same characterstring as selected at T504 in FIG. 7. In the state in FIG. 7 prior tothe execution of T500, the terminal configuration object includes thepublic key TPK2. Accordingly, the terminal 10 can obtain the public keyTPK2 that is included in the terminal configuration object. The terminal10 can obtain, from the memory 34, the private key tsk2 corresponding tothe public key TPK2.

At T704, the terminal 10 generates a printer configuration object. StepT704 is similar to S304 in FIG. 5 except for the data (e.g., keys) to beused. The printer configuration object includes a printersigned-connector and the public key TPK2 obtained at T702. The printersigned-connector includes the hash value HV, the group ID (e.g.,“home”), the public key PPK2 of the printer 100, and a digital signatureDSpr. The digital signature DSpr is information including a third valuethat is encrypted by the private key tsk2 obtained at T702. The thirdvalue is obtained by performing a hash function of a combination of thehash value HV, the group ID (e.g., “home”), and the public key PPK2.

When the terminal 10 establishes a Wi-Fi connection with AP 6 at T25 inFIG. 2, the terminal 10 has stored, in the memory 34, the MAC address(e.g., “macap”) of the AP 6, which is obtained at T122 in FIG. 3, andchannel information (e.g., frequency or channel number) indicating acommunication channel to be used for establishing the Wi-Fi connectionwith AP 6. At T710, the terminal 10 sends to the printer 100, via theWi-Fi I/F 16, a CRes including the printer configuration objectgenerated at T704, as well as the MAC address (e.g., “macap”) of the AP6 and the channel information that have been stored in the memory 34.

At T710, the printer 100 receives the CRes from the terminal 10 via theWi-Fi I/F 116. Based on receiving the CRes from the terminal 10, theprinter 100 stores, at T712, in the memory 134, the printerconfiguration object, the MAC address (e.g., “macap”), and the channelinformation that are included in the CRes. Upon completion of T712, theConfiguration process with the printer 100 in FIG. 9 ends.

Network Access Between Printer 100 and AP 6; FIG. 10

Referring to FIG. 10, the Network Access process, at T70 in FIG. 2,between the printer 100 and the AP 6 will now be described. In a statein FIG. 10 prior to an execution of T810, the printer 100 has stored thepublic keys PPK1 and PPK2, the private keys psk1 and psk2, and theprinter configuration object, and the AP 6 has stored the public keysAPK1 and APK2, the private keys ask1 and ask2, and the AP configurationobject.

At T810, the printer 100 sends, via the Wi-Fi I/F 116, a DReq includingthe printer signed-connector, to the AP 6, e.g., to the MAC address“macap”, which is stored at T712 in FIG. 9, as a recipient. The DReq issent using the communication channel represented in the channelinformation stored at T712.

At T810, the AP 6 receives the DReq from the printer 100. As describedabove, the DReq is sent to the MAC address (e.g., “macap”) of the AP 6as a recipient, so that the AP 6 may receive the DReq from the printer100 appropriately. If a Wi-Fi connection has been established betweenthe terminal 10 and the AP 6 using a particular communication channel,the AP 6 may not be able to communicate with another device using acommunication channel different from the particular communicationchannel In the illustrative embodiment, as described above, the DReq issent from the printer 100 to the AP 6 using the communication channelrepresented in the channel information, so that the AP 6 may receive theDReq from the printer 100 appropriately.

Based on receiving the DReq from the printer 100 at T810, the AP 6executes an authentication process for authenticating the sender (e.g.,the printer 100) of the DReq, and information in the DReq (e.g., thehash value HV, the group ID “home”, and the public key PPK2). Step T812is similar to T412 in FIG. 6 except for the data (e.g., keys) to beused. In other words, the AP 6 determines that the hash value HV and thegroup ID (e.g., “home”) in the printer signed-connector respectivelymatch the hash value HV and the group ID (e.g., “home”) in the APsigned-connector. In short, the AP 6 determines that the authenticationof the sender (e.g., the printer 100) of the DReq is successful. The AP6 decrypts the digital signature DSpr in the printer signed-connector,using the public key TPK2, of the terminal 10, that is included in theAP configuration object, thereby obtaining the third value. The AP 6determines that the third value matches a value obtained by performing ahash function of the information in the printer signed-connector (e.g.,the hash value HV, the group ID “home”, and the public key PPK2). Inother words, the AP 6 determines that the authentication of theinformation in the DReq is successful.

Steps T814 and T820 are similar to T414 and T420 in FIG. 6,respectively, except that a device to be communicated at T820 is theprinter 100 and different keys (e.g., the public key PPK2 of the printer100 and the connector key CK2) are used at T814. Based on receiving theDRes from the AP 6 via Wi-Fi I/F 116 at T820, the printer 100 executes,at T822, an authentication process for authenticating the sender (e.g.,the AP 6) of the DRes and information in the DRes (e.g., the hash valueHV, the group ID “home”, and the public key APK2). Step T822 is similarto T422 in FIG. 6, except that the printer 100 executes T822 anddifferent data (e.g., keys) are used at T822. In other words, theprinter 100 determines that the hash value HV and the group ID “home” inthe AP signed-connector respectively match the hash value HV and thegroup ID “home” in the printer signed-connector. In short, the printer100 determines that the authentication of the sender (e.g., the AP 6) ofDRes is successful. The printer 100 decrypts the digital signature DSapin the AP signed-connector, using the public key TPK2, of the terminal10, included in the printer configuration object, thereby obtaining thefirst value. The printer 100 determines that the first value matches avalue obtained by performing a hash function of the information in theAP signed-connector (e.g., the hash value HV, the group ID “home”, andthe public key APK2). In other words, the printer 100 determines thatthe authentication of the information in the DRes is successful.

At T824, the printer 100 generates a connector key CK2 based on theECDH, using the private key psk2 of the printer 100 and the public keyAPK2 of the AP 6 in the AP signed-connector. The connector key CK2generated by the printer 100 at T824 is the same as the connector keyCK2 generated by the AP 6 at T814. The connector key CK2 is thus sharedbetween the printer 100 and the AP 6 to establish a Wi-Fi connectiontherebetween. Upon completion of T824, the Network Access between theprinter 100 and the AP 6 ends.

As described above, the connector key CK2 is shared between the printer100 and the AP 6. Subsequently, the printer 100 and the AP 6 execute, atT75 in FIG. 2, a four-way handshake using the connector key CK2, and aWi-Fi connection is established between the printer 100 and the AP 6.The printer 100 establishes a Wi-Fi connection with the AP 6 using thecommunication channel represented in the channel information stored atT712 in FIG. 9. If a Wi-Fi connection has been established between theterminal 10 and the AP 6 using a particular communication channel, theprinter 100 also uses the same communication channel as the particularcommunication channel, so that the printer 100 may establish a Wi-Ficonnection appropriately with the AP 6.

As described above, the printer 100 receives, at T610 in FIG. 8, theAReq from the terminal 10, using one of the communication channelsincluded in the channel list L2 of the printer 100. In other words, theprinter 100 receives the AReq from the terminal 10, using thecommunication channel usable by both of the printer 100 and the terminal10. At T75 in FIG. 2, the printer 100 establishes a Wi-Fi connectionwith the AP 6 using a communication channel represented in the channelinformation. In other words, the printer 100 establishes a Wi-Ficonnection with the AP 6 using a communication channel usable by both ofthe printer 100 and the AP 6. A communication channel usable by theterminal 10 may be different from a communication channel usable by theAP 6. In an illustrative embodiment, a communication channel used by theprinter 100 to receive the AReq from the terminal 10 at T610 in FIG. 8is different from a communication channel used by printer 100 toestablish a Wi-Fi connection with the AP 6 at T75 in FIG. 2. In anotherembodiment, the communication channel used by the printer 100 to receivethe AReq from the terminal 10 at T610 may be the same as thecommunication channel used by printer 100 to establish a Wi-Ficonnection with the AP 6 at T75.

Connection Confirming Processes to be Executed by Devices 6, 10, and100; FIG. 11

Referring to FIG. 11, processes to be performed by the respectivedevices 6, 10, and 100 subsequent to the processes in FIG. 10 will nowbe described.

Based on sending the CRes to the printer 100 at T710 in FIG. 9, theterminal 10 starts sending, at T900, via the Wi-Fi I/F 16, a queryrequest repeatedly to the printer 100, e.g., the MAC address “macpr” asa recipient. The MAC address “macpr” is obtained at T522 in FIG. 7. Thequery request is a signal for querying the printer 100 as to whether theprinter 100 has established a Wi-Fi connection with the AP 6. The queryrequest is transmitted at the data link layer of the OSI model.

If the printer 100 receives, via the Wi-Fi I/F 116, the query requestfrom the terminal 10 prior to establishing a Wi-Fi connection with theAP 6, the printer 100 may not send, to the terminal 10, a response tothe query request. The response may be referred to as a “queryresponse”. At T910 (or T75 in FIG. 2), the printer 100 establishes aWi-Fi connection with the AP 6. Subsequently, if the printer 100receives, via the Wi-Fi I/F 116, the query request from the terminal 10,the printer 100 sends, via the Wi-Fi I/F 116, the query response to theterminal 10.

Based on receiving the query response from the printer 100 via the Wi-FiI/F 16 at T912, the terminal 10 executes a confirmation process forconfirming whether the terminal 10 can communicate with the printer 100via the AP 6. The confirmation process will be described below inconjunction with example cases A and B. A confirmation request, whichwill be described below, includes a first request signal and a secondrequest signal. A confirmation response, which will be described below,includes a first response signal and a second response signal.

EXAMPLE CASE A

In the example case A, a Wi-Fi connection is established at T910 betweenthe printer 100 and the AP 6 in a state in which a Wi-Fi connection,which has been established between the terminal 10 and the AP 6 (at T25in FIG. 2), is not disconnected.

At T920, the terminal 10 sends out a first request signal, via the Wi-FiI/F 16, by broadcasting to all possible destinations including the AP 6,so that all of the child stations that have been established a Wi-Ficonnection with the AP 6 may receive the first request signal.Consequently, the printer 100 receives, at T922, the first requestsignal from the AP 6, via the Wi-Fi I/F 116. At 924, the printer 100sends a first response signal to the AP 6, via the Wi-Fi I/F 116. Thefirst response signal includes the MAC address (e.g., “macpr”) and theIP address of the printer 100.

At T924, the AP 6 receives the first response signal from the printer100. The AP 6 also receives first response signals from the childstations other than the printer 100. At T926, the AP 6 sends, to theterminal 10, the first response signals sent from the respective childstations.

At T926, the terminal 10 receives the first response signals from the AP6 via the Wi-Fi I/F 16. The terminal 10 determines whether any one ofthe first response signals includes the MAC address (e.g., “macpr”) ofthe printer 100 that is obtained at T522 in FIG. 7. In the example caseA, one of the first response signals includes the MAC address “macpr”,so that the terminal 10 determines that communication can be performedwith the printer 100, via the AP 6. Subsequently, the terminal 10obtains an IP address of the printer 100 from the first response signal.The first request signal and the first response signal may betransmitted, for example, using an address resolution protocol (“ARP”)at the data link layer of the OSI model.

The terminal 10 sends a second request signal, via the AP 6, to the IPaddress of the printer 100 as a recipient (at T920 and T922). Theterminal 10 receives a second response signal from the printer 100 viathe AP 6 (at T924 and T926). The second request signal and the secondresponse signal may be ping communications that use the Internet ControlMessage Protocol (ICMP) in the network layer of the OSI model. Theterminal 10 confirms that the communication can be performed with theprinter 100 at the network layer of the OSI model.

At T930 (or T80 in FIG. 2), the terminal 10 sends print data whoserecipient is the IP address of the printer 100, to the AP 6, via theWi-Fi I/F 16. At T932 (or T85 in FIG. 2), the AP 6 sends the print datato the printer 100. The print data represents an image to be printed.The print data may be data representing an image to be used for testprinting by the printer 100 or a particular image designated by a user.

At T932, the printer 100 receives, via the Wi-Fi I/F 116, the print datafrom the terminal 10 through the AP 6. At 940, the printer 100 forwardsthe print data to the print execution unit 118 and causes the printexecution unit 118 to execute printing based on the print data (refer toT90 in FIG. 2). Upon completion of T940, the connection confirmingprocesses in the example case A end.

EXAMPLE CASE B

In the example case B, the Wi-Fi connection established (at T25 in FIG.2) between the terminal 10 and the AP 6 has been disconnected, which mayoccur, for example, when the terminal 10 is turned off. After theterminal 10 is turned on again, T55-T70 in FIG. 2 are executed betweenthe terminal 10 and the printer 100 and between the printer 100 and theAP 6. At T910 in FIG. 11, a Wi-Fi connection is established between theprinter 100 and the AP 6. But, in this example case B, the Wi-Ficonnection between the terminal 10 and AP 6 is still disconnected.

In this example case B, based on receiving the query response from theprinter 100 via the Wi-Fi I/F 16 at T912, the terminal 10 broadcasts, atT960, a confirmation request (e.g., a first request signal), to the AP 6via the Wi-Fi I/F 16. Because the Wi-Fi connection is disconnectedbetween the terminal 10 and the AP 6, the terminal 10 fails to send theconfirmation request to the AP 6 and to receive a confirmation response(e.g., a first response signal) from the printer 100. Accordingly,because the terminal 10 does not receive the confirmation response, theterminal 10 can understand that a Wi-Fi connection between the terminal10 and the AP 6 is disconnected.

Once the terminal 10 understands that the Wi-Fi connection with the AP 6is disconnected, the terminal 10 executes a four-way handshake with theAP 6 at T970, using the connector key CK1 (generated at T424 in FIG. 6)in the memory 34, thereby re-establishing a Wi-Fi connection with the AP6. The terminal 10 thus establishes the Wi-Fi connection with the AP 6.The printer 100 has also established the Wi-Fi connection with the AP 6.In short, all of the devices 6, 10, and 100 are on the same network.Subsequent to T970, steps T920-T940 may be executed as performed in theexample case A.

Advantageous Effects of Illustrative Embodiments

In the illustrative embodiments, the private key tsk2 used forgenerating the digital signature DSap (for the AP 6), which is includedin the AP configuration object, may be the same as the private key tsk2used for generating the digital signature DSpr (for the printer 100),which is included in the printer configuration object. The AP 6 uses theAP configuration object, in order to establish a Wi-Fi connectionbetween the terminal 10 and the AP 6 (at T25 in FIG. 2). The printer 100uses the printer configuration object, in order to establish a Wi-Ficonnection between the printer 100 and the AP 6 (at T75 in FIG. 2). TheWi-Fi connection may be established appropriately between the terminal10 and the AP 6 and between the printer 100 and the AP 6.

In the illustrative embodiments, the printer 100 receives, from theterminal 10, the printer configuration object, the channel informationrepresenting a communication channel (e.g., frequency) to be used forestablishing a Wi-Fi connection between the terminal 10 and the AP 6,and the MAC address (e.g., “macap”) of the AP 6 (at T710 in FIG. 9).Using the MAC address (e.g., “macap”) and the communication channelrepresented in the channel information, the printer 100 mayappropriately establish a Wi-Fi connection with the AP 6. The Wi-Ficonnection can thus be established appropriately between the terminal 10and the AP 6 and between the printer 100 and the AP 6.

Correspondence

The terminal 10 is an example of a “terminal device”. The printer 100 isan example of a “communication device”. The AP 6 is an example of an“external device”. The Wi-Fi I/F 16 is an example of a “wirelessinterface” of the “terminal device”. The CPU 32 is an example of a“processor” of the “terminal device”. The app 38 is an example of a“computer program” for the “terminal device”. The private key tsk2 ofthe terminal 10 is an example of a “private key”. The AP configurationobject is an example of “first connection information”. The Wi-Ficonnection at T25 in FIG. 2 is an example of a “first wirelessconnection”. The first value, which is obtained by performing a hashfunction of a combination of the hash value HV, the group ID (e.g.,“home”), and the public key APK2 that are included in the APconfiguration object, is an example of “information obtained using atleast a piece of information included in the first connectioninformation”. The public key PPK1 of the printer 100 is an example of a“first public key”. The AReq at T610 in FIG. 8 is an example of a “firstauthentication request”. The ARes at T620 in FIG. 8 is an example of a“first authentication response”. The printer configuration object is anexample of “second connection information”. The third value, which isobtained by performing a hash function of a combination of the hashvalue HV, the group ID (e.g., “home”), and the public key PPK2 that areincluded in the printer configuration object, is an example of“information obtained using at least a piece of information included inthe second connection information”. The Wi-Fi connection at T75 in FIG.2 (or T910 in FIG. 11) is an example of a “second wireless connection”.

The group ID (e.g., “home”) is an example of “related information”. Thecharacter string “New” in the selection screen at T502 in FIG. 7 is anexample of “particular information”. The MAC address (e.g., “macap”) ofthe AP 6 is an example of “device identification information”. Theterminal configuration object is an example of “third connectioninformation”. The second value, which is obtained by performing a hashfunction of a combination of the hash value HV, the group ID (e.g.,“home”), and the public key TPK3 that are included in the terminalconfiguration object, is an example of “information obtained using atleast a piece of information included in the third connectioninformation”. The public key APK1 of the AP 6 is an example of a “secondpublic key”. The AReq at T210 in FIG. 4 is an example of a “secondauthentication request”. The ARes at T220 in FIG. 4 is an example of a“second authentication response”. The hash value HV included in theprinter configuration object is an example of “authenticationinformation”. The AP signed-connector is an example of “information thatis sent from the external device to the communication device”. The QRcode displayed at T512 in FIG. 7 is an example of a “coded image”.

The Wi-Fi I/F 116 is an example of a “wireless interface” of the“communication device”. The AReq at T610 in FIG. 8 is an example of an“authentication request”. The ARes at T620 in FIG. 8 is an example of an“authentication response”. The printer configuration object is anexample of “connection information”. The channel information and the MACaddress (e.g., “macap”) of the AP 6 are examples of “specificinformation”. The communication channel used at T610 in FIG. 8 is anexample of a “first communication channel”. The communication channelused at T75 in FIG. 2 is an example of a “second communication channel”.

Step T522 in FIG. 7 is an example of a process that is executed by a“first obtaining unit” of the “terminal device”. Step T610 in FIG. 8 isan example of a process that is executed by a “first authenticationrequest sender” of the “terminal device”. Step T620 in FIG. 8 is anexample of a process that is executed by a “first authenticationresponse receiver” of the “terminal device”. Step T704 in FIG. 9 is anexample of a process that is executed by a “first generator” of the“terminal device”. Step T710 in FIG. 9 is an example of a process thatis executed by a “first information sender” of the “terminal device”.Step T610 in FIG. 8 is an example of a process that is executed by an“authentication request receiver” of the “communication device”. StepT620 is an example of a process that is executed by an “authenticationresponse sender” of the “communication device”. Step T710 in FIG. 9 isan example of a process that is executed by an “information receiver” ofthe “communication device”. Steps T810, T822 and T824 in FIG. 10 andstep T75 in FIG. 2 are examples of processes that are executed by an“establishing unit” of the “communication device”

While aspects are described in detail with reference to specificembodiments thereof, those are merely examples, and various changes,arrangements and modifications may be made therein without departingfrom the spirit and scope of the disclosure. Modifications to theillustrative embodiments are given below.

(Modification 1) In the illustrative embodiments, a digital signature(e.g., DSpr) is generated by encrypting a particular value, which isobtained by performing a hash function of a combination of the hashvalue HV, the group ID (e.g., “home”), and a public key (e.g., APK2),using the private key tsk2. In another embodiment, the digital signaturemay be generated by encrypting the combination of the hash value HV, thegroup ID (e.g., “home”), and the public key, using the private key tsk2.In this modification, the combination of the hash value HV, the groupID, and a public key that are included in a signed-connector (e.g., theAP signed-connector) is an example of “at least a piece of informationincluded in the first (or second or third) connection information”, andis an example of “information obtained using at least a piece ofinformation included in the first (or second or third) connectioninformation”.

(Modification 2) The terminal 10 may not necessarily cause the display14 to display the selection screen at T102 in FIG. 3 and T502 in FIG. 7.In this modification, if the app 38 starts up at T100 in FIG. 3 in astate in which the terminal 10 does not store the terminal configurationobject, the terminal 10 may skip T102 and T104 and execute T106. If theapp 38 starts up a t T500 in FIG. 7 in a state in which the terminal 10has stored the terminal configuration object, the terminal 10 may skipT502 and T504 and execute T506. In this modification, the “terminaldevice” may not necessarily include a “display controller”.

(Modification 3) In FIG. 11, T920-T926 and T960 may be omitted. In thismodification, the “terminal device” may not necessarily include a“confirmation request sender” or a “confirmation response receiver”, andthe “communication device” may not necessarily include a “confirmationrequest receiver” or a “confirmation response sender”.

(Modification 4) In FIG. 11, T970 may be omitted. In this modification,the “terminal device” may not necessarily include a “re-establishingunit”.

(Modification 5) In FIG. 11, T930 and T932 may be omitted. In thismodification, the “terminal device” may not necessarily include a “printdata sender”. The “communication device” may not necessarily include a“print execution unit”, a “print data receiver”, or a “printcontroller”.

(Modification 6) At T912 in FIG. 11, the printer 100 may send, to theterminal 10, a query response including the IP address of the printer100. In this modification, at T920 and T922, the terminal 10 may send aconfirmation request (e.g., a unicast confirmation request) includingthe IP address of the printer 100, to the printer 100, via the AP 6. Theconfirmation request may be transmitted at, for example, the data linklayer of the OSI model. Step T920 that is performed in this modificationis an example of a process that is executed by the “confirmation requestsender” of the “terminal device”.

(Modification 7) In FIG. 11, T900 and T912 may be omitted. In thismodification, based on sending the CRes to the printer 100 at T710 inFIG. 9, the terminal 10 may repeatedly send a confirmation request tothe AP 6 at T920. In this modification, the “terminal device” may notnecessarily include a “query request sender” or a “query responsereceiver”, and the “communication device” may not necessarily include a“query request receiver” or a “query response sender”.

(Modification 8) In some embodiments, the OS 36, as opposed to the app38, may execute T122 in FIG. 3 through T424 in FIG. 6 (and T25 in FIG.2). In other words, the “computer program” for the “terminal device” maynot necessarily cause the “computer” to function as a “secondgenerator”, the “establishing unit”, a “second obtaining unit”, a“second authentication request sender”, a “third generator”, or a“second information sender”.

(Modification 9) At T512 in FIG. 7, the printer 100 may print an imageincluding a QR code, on a recording medium (e.g., sheet of paper),instead of displaying a QR code in the printer 100. In thismodification, printing a QR code is an example of “outputting the codedimage”.

(Modification 10) Examples of the “communication device” may includedevices, other than the printer 100, such as a scanner, a multi-functiondevice, a mobile terminal, a PC, and a server. Examples of the “externaldevice” may include devices, other than the AP 6, such as a printer, ascanner, a mobile terminal, a PC, and a server.

(Modification 11) At T710 in FIG. 9, the terminal 10 may send, to theprinter 100, a CRes including the printer configuration object, and thechannel information, but not including the MAC address (e.g., “macap”)of the AP 6. In this modification, the printer 100 may broadcast a DReqat T810 in FIG. 10, using the communication channel represented in thechannel information. Alternatively, at T710, the terminal 10 may send tothe printer 100, a CRes including the printer configuration object andthe MAC address (e.g., “macap”) of the AP 6, but not including thechannel information. In this case, at T810, the printer 100 may send aDReq to the AP 6, e.g., to the MAC address “macap” as a recipient, using(e.g., sequentially) one or more of the communication channels usable bythe printer 100. In other words, the “specific information” may includeat least one of the “channel information” and the “device identificationinformation”.

(Modification 12) The terminal 10 may execute T55 and T60, prior toexecuting T5-T25 in FIG. 2, with the AP 6. In this modification, theterminal 10 may execute, subsequent to T60, steps T5-25 with the AP6,and then T65 with the printer 100.

(Modification 13) The “device identification information” may not belimited to the MAC address (e.g., “macap”) of the AP 6, but may includean IP address or a device name of the AP 6.

(Modification 14) A shared key (e.g., SK1) may be generated (e.g., atT201 in FIG. 4), based on the ECDH, in a manner different from theillustrative embodiments. A shared key may be generated based on amethod, e.g., Diffie-Hellman key exchange (“DH”), other than the ECDH.In the illustrative embodiments, a digital signature (e.g., DSap) isgenerated based on the ECDSA. In another embodiment, a digital signaturemay be generated based on, for example, Digital Signature Algorithm(“DSA”) or Rivest-Shamir-Adleman cryptosystem (“RAS”).

(Modification 15) The QR code displayed in the printer 100 at T512 inFIG. 7 may be a coded image that is not obtained by encoding the channellist L2 and the MAC address “macpr”. In other words, a QR code may be acoded image that is obtained by encoding at least the public key PPK1.In this modification, based on receiving an operation for displaying theQR code at T510, the printer 100 may monitor the reception of the AReqthat is sent using one of the communication channels, which are usableby the printer 100. At T610 in FIG. 8, the terminal 10 may broadcast theAReq, using (e.g., sequentially) all of the communication channels whichare usable by the terminal 10. In short, a coded image may be an imagethat is obtained by encoding at least the “first public key”.

(Modification 16) In FIG. 7, T510 and T512 may be omitted. In thismodification, a QR code that is obtained by encoding the public keyPPK1, the channel list L2, and the MAC address “macpr”, may be attachedto a casing of the printer 100. In this modification, the “communicationdevice” may not necessarily include an “output controller”.

(Modification 17) “DRAFT Device Provisioning Protocol TechnicalSpecification Version 0.2.11” released by Wi-Fi Alliance, states that ashared code, key, phrase, or word is referred to as a “code”.Accordingly, at T512 in FIG. 7, the printer 100 may display, instead ofa QR code, an image including a shared code, key, phrase, or word thatis obtained by encoding the public key PPK1, the channel list L2, andthe MAC address “macpr”, in the display 114.

(Modification 18) In the illustrative embodiments, processes in FIGS.2-11 are performed by the CPU 32 of the terminal 10 that executes theprograms 36 and 38 (e.g., software) and/or the CPU 132 of the printer100 that executes the programs 136 (e.g., software). Alternatively, atleast one of the processes in FIGS. 2-11 may be executed by hardware,e.g., a logical circuit.

The technical elements described in the specification or the drawingsmay exhibit technical usefulness, either alone or in combination, andcombinations are not limited to those described in the claims as filed.The techniques illustrated in the specification or the drawings mayachieve a plurality of objectives at the same time, and achieving onlyone of them has technical usefulness.

What is claimed is:
 1. One or more non-transitory computer-readablemedia storing instructions that, when executed by one or moreprocessors, cause a terminal device to: obtain a first public key of acommunication device; send, to the communication device via a wirelessinterface of the terminal device, a first authentication requestgenerated using the first public key; receive, from the communicationdevice via the wireless interface, a first authentication responseresponsive to the first authentication request; after the firstauthentication response is received from the communication device,generate second connection information for establishing a secondwireless connection between the communication device and an externaldevice different from the communication device; send the secondconnection information to the communication device via the wirelessinterface; after sending the second connection information to thecommunication device, send a query request to the communication devicevia the wireless interface; and after sending the query request to thecommunication device, receive, from the communication device via thewireless interface, a query response responsive to the query request, ina case where the communication device establishes the second wirelessconnection with the external device using the second connectioninformation.
 2. The one or more non-transitory computer-readable mediaas in claim 1, wherein the terminal device comprises a memory and adisplay, wherein the memory is configured to store a private key inassociation with related information relating to first connectioninformation, wherein the private key is used to encrypt informationobtained using at least a piece of the first connection information thatis stored in the external device, wherein the instructions, whenexecuted by the one or more processors, further cause the terminaldevice to: display, on the display, a selection screen comprising therelated information; and after the related information is selected,obtain, from the memory, the private key associated with the relatedinformation, and wherein the second connection information is generatedusing the obtained private key.
 3. The one or more non-transitorycomputer-readable media as in claim 2, wherein the selection screencomprises particular information, wherein the particular information isdifferent from the related information, and wherein the instructions,when executed by the one or more processors, further cause the terminaldevice to, after the particular information is selected, establish afirst wireless connection between the terminal device and the externaldevice.
 4. The one or more non-transitory computer-readable media as inclaim 1, wherein the communication device is a printer configured toexecute a printing function, and wherein the instructions, when executedby the one or more processors, further cause the terminal device to,after sending the second connection information to the communicationdevice, send, to the communication device via the wireless interface andvia the external device, print data representing an image to be printed.5. The one or more non-transitory computer-readable media as in claim 4,wherein after sending the second connection information to thecommunication device and prior to sending the print data, the queryrequest is sent to the communication device via the wireless interfaceand not via the external device, and after sending the query request tothe communication device and establishing the second wireless connectionbetween the communication device and the external device, the queryresponse is received from the communication device via the wirelessinterface and not via the external device.
 6. The one or morenon-transitory computer-readable media as in claim 1, wherein theinstructions, when executed by the one or more processors, further causethe terminal device to send specific information to the communicationdevice via the wireless interface, and wherein the specific informationcomprises at least one of: channel information indicating acommunication channel used for a first wireless connection; or deviceidentification information identifying the external device.
 7. The oneor more non-transitory computer-readable media as in claim 1, whereinthe instructions, when executed by the one or more processors, furthercause the terminal device to: generate, using a private key, thirdconnection information for establishing a first wireless connectionbetween the terminal device and the external device, wherein the privatekey is used to encrypt information obtained using at least a piece ofthe third connection information; and establish, using the thirdconnection information, the first wireless connection between theterminal device and the external device.
 8. The one or morenon-transitory computer-readable media as in claim 1, wherein theinstructions, when executed by the one or more processors, further causethe terminal device to: obtain a second public key of the externaldevice; send, to the external device via the wireless interface, asecond authentication request generated using the second public key;receive, from the external device via the wireless interface, a secondauthentication response responsive to the second authentication request;after the second authentication response is received from the externaldevice, generate first connection information for the external device;send the first connection information to the external device via thewireless interface; and after sending the first connection informationto the external device, establish a first wireless connection betweenthe terminal device and the external device.
 9. The one or morenon-transitory computer-readable media as in claim 1, wherein the secondconnection information is generated by the terminal device operating asa configurator conforming to a Wi-Fi standard, and wherein the secondconnection information is sent to the communication device by theterminal device.
 10. The one or more non-transitory computer-readablemedia as in claim 1, wherein the second wireless connection comprises aWi-Fi connection, and wherein the terminal device sends a configurationobject that is used to configure the Wi-Fi connection and that conformsto a Wi-Fi standard associated with the Wi-Fi connection.
 11. The one ormore non-transitory computer-readable media as in claim 1, wherein thesecond connection information comprises authentication information, andwherein the authentication information is used by the communicationdevice for authenticating information that is sent from the externaldevice to the communication device.
 12. The one or more non-transitorycomputer-readable media as in claim 1, wherein the first public key isobtained by scanning a coded image, and wherein the coded image isoutputted by the communication device, and is generated by encoding thefirst public key.
 13. The one or more non-transitory computer-readablemedia as in claim 1, wherein the external device is an access point. 14.A terminal device comprising: a wireless interface; one or moreprocessors; and a memory configured to store instructions that, whenexecuted by the one or more processors, cause the terminal device to:obtain a first public key of a communication device; send, to thecommunication device via the wireless interface, a first authenticationrequest generated using the first public key; receive, from thecommunication device via the wireless interface, a first authenticationresponse responsive to the first authentication request; after the firstauthentication response is received from the communication device,generate second connection information for establishing a secondwireless connection between the communication device and an externaldevice different from the communication device; send the secondconnection information to the communication device via the wirelessinterface; after sending the second connection information to thecommunication device, send a query request to the communication devicevia the wireless interface; and after sending the query request to thecommunication device, receive, from the communication device via thewireless interface, a query response responsive to the query request, ina case where the communication device establishes the second wirelessconnection with the external device using the second connectioninformation.
 15. A communication device comprising: a wirelessinterface; one or more processors; and a memory storing instructionsthat, when executed by the one or more processors, cause thecommunication device to: receive, from a terminal device via thewireless interface, a first authentication request generated using afirst public key of the communication device; send, to the terminaldevice via the wireless interface, a first authentication responseresponsive to the first authentication request; after sending the firstauthentication response to the terminal device, receive secondconnection information from the terminal device via the wirelessinterface, wherein the second connection information comprisesinformation for establishing a second wireless connection via thewireless interface between the communication device and an externaldevice different from the communication device; establish, using thesecond connection information, the second wireless connection via thewireless interface between the communication device and the externaldevice; after receiving the second connection information from theterminal device, receive a query request from the terminal device viathe wireless interface; and after receiving the query request from theterminal device, send, to the terminal device via the wirelessinterface, a query response responsive to the query request, in a casewhere the communication device establishes the second wirelessconnection with the external device using the second connectioninformation.
 16. The communication device as in claim 15, wherein thecommunication device further comprises a print mechanism, and whereinthe instructions, when executed by one or more processors, further causethe communication device to: after the second wireless connection isestablished between the communication device and the external device,receive, from the terminal device via the wireless interface and via theexternal device, print data representing an image to be printed; and ina case where the print data is received from the terminal device,control the print mechanism to print the image.
 17. The communicationdevice as in claim 16, wherein prior to receiving the print data, thequery request is received from the terminal device via the wirelessinterface and not via the external device, and after receiving the queryrequest from the terminal device and establishing the second wirelessconnection between the communication device and the external device, thequery response is sent to the terminal device via the wireless interfaceand not via the external device.
 18. The communication device as inclaim 15, wherein the first authentication request is received from theterminal device using a first communication channel, wherein theinstructions, when executed by the one or more processors, further causethe communication device to receive channel information from theterminal device via the wireless interface, wherein the channelinformation indicates a second communication channel used in a firstwireless connection, wherein the second wireless connection isestablished between the communication device and the external deviceusing the second communication channel indicated by the channelinformation, and wherein the second communication channel is differentfrom the first communication channel
 19. The communication device as inclaim 15, wherein the second connection information is received from theterminal device by the communication device as an enrollee conforming toa Wi-Fi standard.
 20. The communication device as in claim 15, whereinthe second wireless connection comprises a Wi-Fi connection, and whereinthe instructions, when executed by one or more processors, further causethe communication device to receive a configuration object that is usedto configure the Wi-Fi connection and that conforms to a Wi-Fi standardassociated with the Wi-Fi connection.