Communication system, information processing device, connection device, and connection device designation method for designating connection device for communication device to connect to

ABSTRACT

A communication apparatus is provided that includes: a receiving unit that receives communication parameter for connecting to a first base station via a second base station; a connecting unit that connects to the first base station based on the received communication parameter; and an authentication unit that performs authenticated process with the first base station based on the received communication parameter.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a divisional of application Ser. No. 12/368,899,filed Feb. 10, 2009; which is a divisional of application Ser. No.10/799,011, filed Mar. 12, 2004, now U.S. Pat. No. 7,620,027, the entiredisclosures of which are hereby incorporated by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a communication system, an informationprocessing device, a connection device, and a connection devicedesignation method for designating the connection device forcommunication device to connect to.

2. Related Background Art

Conventionally, a wireless communication system utilizing a wireless LANdefined by IEEE 802.11 is constructed with at least an access point(hereinafter referred to as “AP”) that serves as a wireless basestation, and a plurality of wireless LAN terminals. Wirelesscommunications are conducted in an infrastructure mode. The term“infrastructure mode” refers to a communication method in which the APmediates communications among the wireless LAN terminals, instead ofhaving the wireless LAN terminals conduct direct communications witheach other.

The wireless communication system may include a plurality of APs. Inthis case, in order for a wireless LAN terminal to conductcommunications through a particular AP, the initial settings in thewireless LAN terminal must be set with an Extended Service SetIdentifier (ESSID) or another ID number that has been set in theparticular AP to distinguish it.

For example, the identical ESSID may be used to form a single, closednetwork connecting an AP arranged in a specific area where meetings areheld (e.g., a meeting room) and various wireless LAN terminals thatmeeting attendees respectively bring to the meeting. Exchanges of datanecessary for conducting the meeting can be performed via the wirelessLAN. A “closed network” means that the network cannot be accessed fromwireless LAN terminals other than those used by the attendees in themeeting (PAN: Personal Area Network).

However, when using the ESSID to specify the particular AP to build aconferencing system as in the above-mentioned conventional wirelesscommunication system, each attendee must reconfigure the wireless LANterminal that he or she will bring to the meeting with the ESSIDdesignated for the AP to be used at the next meeting. This was anextremely burdensome aspect of constructing the conferencing system.

Furthermore, when using such a conferencing system, there is a casewhere multiple APs are to be used in a single meeting and the wirelessLAN terminals connecting to these APs need to be distributed evenly. Insuch a case, a different ESSID needs to be assigned in advance to eachAP, and the ESSIDs assigned to the APs need to be distributed to thewireless LAN terminals of the meeting attendees evenly so as to preventcommunications traffic from getting concentrated at a particular AP.Conventionally, it has not been possible to perform even distribution ofthe ESSIDs in an automated fashion.

Moreover, in a case where a connection was incorrectly made to an AP ina neighboring meeting room, for example, the user would have to changethe access point and try to connect to a different network. Each timethis action is taken, the user must change the SSID set in his or herterminal, or must pre-set the terminal with as many SSIDs as there arenetworks, which is burdensome.

SUMMARY OF THE INVENTION

An object of the present invention is to solve the above-mentionedproblems.

Another object of the present invention is to enable easy connection toan intended connection device, even when a plurality of connectiondevices exist.

Yet another object of the present invention is to enable a communicationdevice to connect to a desired connection device even after firstconnecting to a connection device other than the desired one.

Further other objects of the present invention will become clear in thefollowing specification and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram showing a configuration of Embodiment 1 of anetwork system (conferencing system) in accordance with the presentinvention;

FIG. 2 is a sequence diagram showing communication processing to reservea meeting room and register a meeting attendee, which takes placebetween a terminal of a meeting organizer and a server having anauthentication function and a database function;

FIG. 3 is a diagram showing an example of a meeting room reservationscreen sent at step S207 in FIG. 2 and displayed on a display device ofa terminal;

FIG. 4 is a diagram showing an example of the meeting room reservationscreen with a date of usage inserted into a date field at step S208 inFIG. 2;

FIG. 5 is a diagram showing an example of a reservation status screensent from the server to a terminal at step S209 in FIG. 2;

FIG. 6 is a diagram showing the reservation status screen filled in witha meeting room name, a time to start the meeting, a time to end it, anda meeting name which the user wishes to reserve;

FIG. 7 is a diagram showing an example of a screen displayed on thedisplay device of the terminal according to a response with a meetingroom reservation request sent from the server to the terminal at stepS211 in FIG. 2;

FIG. 8 is diagram showing an example of user database information sentfrom the server to the terminal at step S212 in FIG. 2;

FIG. 9 is a diagram showing an example of user database information inwhich users who will be allowed to attend the meeting are selected incheck boxes;

FIG. 10 is a diagram showing database information set with a meetingtime frame, a meeting room name, a meeting name, an encipher key, and achannel;

FIG. 11 is a diagram showing an example of AP information per meetingroom registered in the server as a database;

FIG. 12 is a communications sequence diagram showing processing forsending a notification regarding meeting room reservation information,which is conducted between the server and the AP arranged in thereserved meeting room after the meeting organizer has made the meetingreservation with the server;

FIG. 13 is a sequence diagram showing connection processing which isconducted between a wireless LAN terminal in the network system(conferencing system) shown in FIG. 1, an AP 1 arranged in a meetingroom 1, an AP 2 arranged in a meeting room 2, and a server connected toa backbone LAN;

FIG. 14 is a flowchart showing a processing sequence for connecting tothe AP, which is performed by the wireless LAN terminal;

FIG. 15 is a flowchart showing another processing sequence forconnecting to the AP, which is performed by the wireless LAN terminal;

FIG. 16 is a flowchart showing yet another processing sequence forconnecting to the AP, which is performed by the wireless LAN terminal;

FIG. 17 is a block diagram showing a configuration of the access point(AP) in accordance with Embodiment 2;

FIG. 18 shows an example of personal information of the meetingorganizer, which is stored in a nonvolatile memory in a PC card insertedinto a PC card connector shown in FIG. 17;

FIG. 19 is a sequence diagram of communications processing by which theAP receives from the server an encipher key, a channel, and othermeeting information to be used with the AP configured as in FIG. 17;

FIG. 20 is a diagram showing an example of the reservation status screenfilled in with 2002/4/19 as the reservation time, meeting room A with 2APs as the desired meeting room, 9 am as the meeting start time, 12 noonas the meeting end time, and “regular meeting” as the meeting name;

FIG. 21 is a diagram showing an example of a screen of a response with ameeting room reservation request, which the server returns to themeeting organizer's terminal after receiving the reservation statusscreen data shown in FIG. 20;

FIG. 22 is a diagram showing an example of database information ofEmbodiment 3, which corresponds to the database information ofEmbodiment 1 that was shown in FIG. 10;

FIG. 23 is a block diagram showing a configuration of a conferencingsystem in accordance with Embodiment 3;

FIG. 24 is a flowchart showing a sequence of authentication andprocessing to send meeting information, which are executed by the serverin accordance with Embodiment 3;

FIG. 25 is another flowchart showing a sequence of authentication andprocessing to send meeting information, which are executed by the serverin accordance with Embodiment 3;

FIG. 26 is a block diagram showing an overall structure of a networksystem in accordance with Embodiment 4 of the present invention;

FIG. 27 is a block diagram showing an internal structure of the accesspoints shown in FIG. 26;

FIG. 28 is an outline diagram showing an example of registrationinformation 2800 that is registered into an EEPROM 2706 in the accesspoint shown in FIG. 27;

FIG. 29 is an explanatory diagram for explaining a procedure forconnecting to the access point in the network system in FIG. 26;

FIG. 30 is another explanatory diagram for explaining a procedure forconnecting to the access point in the network system in FIG. 26; and

FIG. 31 is a flowchart showing processing for inquiring about useridentification information at step S3001 in FIG. 30.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Below, explanation is given regarding embodiments of the presentinvention, with reference to the drawings.

Embodiment 1

FIG. 1 is a block diagram showing a configuration of Embodiment 1 of anetwork system (conferencing system) in accordance with the presentinvention. It is assumed here that this network system is being appliedin a meeting room.

In the diagram, reference numerals 1 and 2 each indicate an access point(hereinafter referred to as “AP”) for a wireless LAN to access to.Reference numeral 3 indicates a wireless LAN terminal for performingwireless communications with the APs 1 and 2. Reference numeral 4indicates a server having an authentication function and a databasefunction. Reference numeral 5 indicates a backbone LAN for connectingthe APs 1 and 2 with the server 4. In this diagram, the APs 1 and 2 areeach installed in adjacent but different meeting rooms, and they arealways connected to the backbone LAN 5.

In the conferencing system in accordance with this embodiment, attendeesof a meeting each bring a wireless LAN terminal, and form a PAN(Personal Area Network) with the AP that is installed in the meetingroom for usage with wireless LANs. Accordingly, data exchanges necessaryfor conducting the meeting can be performed via the wireless LAN. Inorder to perform the wireless LAN communications that are used in thisconferencing system, it is assumed that a wireless LAN connection methoddefined by IEEE 802.11b is being used.

To connect to the wireless LAN, there is a connection method called anad hoc mode, in which the wireless LAN terminals directly communicatewith each other, and an infrastructure mode, in which the AP mediatescommunications among the wireless LAN terminals. In this embodiment, theinfrastructure mode is used because a conferencing system has beenconstructed by means of a communication method that utilizes the AP.

When using the infrastructure mode, a number of items must be set in theinitial settings of both the AP and the wireless LAN terminal. In theAP, it is necessary to set: a frequency band to be used for the wirelesscommunications; an ID number, called an SSID (Service Set Identifier) orESSID (Extended Service Set Identifier), for grouping together thewireless LAN terminals connected to the AP; and a enciphering key calleda WEP (Wired Equivalent Privacy). Note that when using the wireless LAN,selection of the channel also allows selection of the frequency bandused for that channel. The number of channels can be from 1 channel to14 channels, and the number of usable channels (frequency bands) variesby country and region.

Like the AP itself, the wireless LAN terminals that are connected to theAP must also be set with the SSID or the ESSID ID number, and the WEPenciphering key.

In order to connect the AP and the wireless LAN terminal to each other,the SSID or ESSID identification number must be set to the same value inboth the AP and in the wireless LAN terminal. However, it is alsopossible to leave the ID numbers in both of them blank (i.e., unset).Furthermore, if there is no need to guarantee security between the APand the wireless LAN terminal, or if security is configured at a higherlevel, the WEP enciphering key may also be left blank (unset) in boththe AP and the wireless LAN terminal. However, if the SSID (ESSID) isnot set in the wireless LAN terminal, then when that wireless LANterminal makes access for the first time to an AP that is not set withthe SSID (ESSID), or when it makes access for the first time to an APwhich is configured to accept a wireless LAN terminal that is not setwith the SSID (ESSID), the wireless LAN terminal will establish theconnection with the AP it accessed for the first time. Therefore, whenconnecting to a particular AP, the ID number and the enciphering keysmust not be left blank (unset), and the same ID number and encipheringkey must be set to the same value in both the AP and the wireless LANterminal.

In this embodiment, it is possible to connect to the desired AP evenwithout setting the SSID (ESSID) and WEP in the wireless LAN terminal.On the wireless LAN terminal side, the items for setting the SSID(ESSID) and WEP are left blank (unset). On the AP side as well, theitems for setting SSID (ESSID) and WEP are left blank so that thewireless LAN terminal without the SSID (ESSID) and WEP settings canconnect to the AP.

FIG. 2 is a sequence diagram showing communication processing to reservea meeting room and register a meeting attendee, which takes placebetween a terminal of a meeting organizer and a server that has anauthentication function and a database function (this server correspondsto the server 4 in FIG. 1). The above-mentioned terminal used by themeeting organizer corresponds to either the wireless LAN terminal 3shown in FIG. 1, or a PC (Personal Computer) which is not shown in thediagram but is connected by a wire cable (or wirelessly) via thebackbone LAN 5 to the server 4, or the like. Note that in the discussionhere the number of meeting rooms and the number of APs do not correspondto FIG. 1.

FIGS. 3 to 7 show various reservation screens used when the meetingorganizer reserves the meeting room by communicating with the serverfrom the wireless LAN terminal, the PC, or the like. These reservationscreens are displayed on a display device of the wireless LAN terminal,the PC, etc.

FIGS. 8 to 10 show various registration screens used when the meetingorganizer registers the meeting attendees for the meeting bycommunicating with the server 4 from the wireless LAN terminal 3, the PCor the like. These registration screens are displayed on a displaydevice of the wireless LAN terminal 3, the PC, etc. Note that also inthe discussion here the number of meeting rooms and the number of APs donot correspond to FIG. 1.

Below, an explanation is given regarding the communications processingfocusing on the sequence shown in FIG. 2, with reference to FIG. 3 toFIG. 10 as necessary.

At step S201 in FIG. 2, the terminal designates the server's IP addressand sends a connection request to the server. At step S202, in responsewith the connection request sent at step S201, the server sends aconnection response accepting the request back to the terminal that sentthe connection request.

The meeting organizer uses an input device to input, into his or her ownterminal, his or her account name (ID) and password, which areregistered in advance in a database inside the server. This database isdescribed below, with reference to FIG. 8.

At step S203, the terminal sends the inputted account name and passwordto the server. At step S204, the server determines whether or not theaccount name and password of the owner of the terminal from which theaccount name and password were sent match those registered in thedatabase inside the server. If they do match, then a response grantingconnection permission is returned to the terminal. Accordingly, asession (communication means) is established between the terminal andthe server.

At step S205, the terminal sends the server a request for a meeting roomreservation. At step S206, the server notifies the terminal that itreceived the reservation request at step S205. At step S207, the serversends data for a meeting room reservation screen to the terminal.

FIG. 3 shows an example of a meeting room reservation screen sent atstep S207 and displayed on the display screen of the terminal. Themeeting room display screen shown in FIG. 3 is made of items for aplanned date of usage, the name of the meeting room to be reserved, thetime frame of the reservation, and a meeting name.

At step S208, from his or her own terminal's input device the meetingorganizer inputs the planned date of usage into the date field in themeeting room reservation screen, and then the terminal sends thatinformation to the server. FIG. 4 is a diagram showing an example of themeeting room reservation screen with the usage date inputted to the datefield at step S208.

At step S209, the server sends the terminal a reservation status screenindicating the reservation status of the meeting room on the daycorresponding to the planned date of usage that was sent from theterminal at step S208.

FIG. 5 is a diagram showing an example of a reservation status screensent from the server to the terminal at step S209. In this reservationstatus screen, the rectangular graphs for each meeting room indicatetime frames during which reservations are already scheduled.

At step S210, from his or her terminal's input device, the meetingorganizer inputs a name of a meeting room, a meeting start time, ameeting end time, and a meeting name which he or she wants to reserve,into the appropriate fields in the reservation status screen. Thisinputted information is sent from the terminal to the server. FIG. 6 isa diagram showing an example of a reservation status screen filled inwith the meeting room name, the meeting start time, the meeting endtime, and the meeting name which the meeting organizer wishes toreserve.

At step S211, the server compares information of the desired meetingroom name, meeting start time, meeting end time, and meeting nameagainst meeting room reservation status information in the databaseinside the server, to confirm whether that meeting room is available forthe date and time frame that were inputted. Then, if it is available, aresponse with the meeting room reservation request is sent to theterminal.

FIG. 7 is a diagram showing an example of a screen displayed on thedisplay device of the terminal according to the response with themeeting room reservation request sent from the server to the terminal atstep S211. In FIG. 7, the rectangular graph is plotted in the desiredtime frame for the meeting room desired by the meeting organizer. Thisindicates that the given meeting room is reserved during the given timeframe.

At step S212, the server sends the user database information to theterminal.

FIG. 8 is diagram showing the user database information sent from theserver to the terminal at step S212.

Information pertaining to every user who can use the meeting rooms isregistered in the database of the server. From among these users, themeeting organizer designates a desired group (section). Thus, thedatabase information pertaining to each user in the designated group(section) is extracted and sent, as the above-mentioned user databaseinformation, from the server to the terminal.

As shown in FIG. 8, the user information includes the name of the user'sorganization, a user name, and each user's account name and passwordwhich are used for performing authentication with the server. The timeframe field associated with each user indicates each user's schedule touse each of the meeting rooms. The time frame field of each user alsoindicates the wireless LAN channel to be used in the meeting and theencipher key (which is used to encrypt data). Here, each user's passwordand encipher key is represented in the diagram by the same symbol, butin actuality they would be different symbols for each user. On the otherhand, in this embodiment, the encipher key used by each attendee in thesame meeting is the same.

The meeting organizer at the terminal who receives the above-mentioneduser database information from the server selects the user(s) who he orshe wants to have present at the meeting. More specifically, the meetingorganizer selects the users who are desired to be the meeting attendeesthe meeting by placing a check in the check box at the far left side ofthe screen shown in FIG. 8 using his or her terminal's input device. Atstep S213, selection information indicating the users thus selected whoare desired to be the meeting attendees is sent from the terminal to theserver. FIG. 9 is a diagram showing an example of the user databaseinformation for the users who are desired to be the meeting attendeeswho were selected through the check boxes.

At step S214, based on the meeting attendance user information(exemplified in FIG. 9) sent from the terminal at step S213, and theresponse with the meeting room reservation request (exemplified in FIG.7) sent from the server to the terminal at step S211, the server setsthe time frame to hold the meeting, a meeting room name, a meeting name,and the encipher key and channel to use with the wireless LAN into thedatabase information of the users who will attend the meeting. Asdescribed below with reference to FIG. 11, the wireless LAN channels tobe used at meetings are determined per meeting room (location) so as notto interfere with frequencies (channels) used by other APs in thevicinity. These channels are determined automatically at the time whenthe meeting rooms are selected. Furthermore, the encipher key to be usedwith the wireless LAN is adjusted by the server so as not to overlapwith the encipher keys used in other meetings taking place during thesame time frame. The database information that has been set as describedhere is then sent from the server to the terminal, as a response withthe meeting attendance.

FIG. 10 is a diagram showing an example of the database information,which has been set as described above with the meeting time frame, themeeting room name, the meeting name, the encipher key, and the channel.

In the database information shown in FIG. 10, for each user whose checkbox is checked, there is set the time frame flag, the meeting room name,the meeting name, the channel, and the encipher key that will be usedfor the new meeting which has just been added.

Note that, in this embodiment, when the terminal that the meetingattendee (user) brings is a wireless LAN terminal, the same value isused as the encipher key for all the meeting attendees. However, theencipher key may also be different for each user.

Further, the information which the terminal received from the server atstep S212 (exemplified in FIG. 8) lists users who are desired to be themeeting attendees, but there are instances where one of these user'sschedule is already filled with another meeting during the time framewhen the meeting is going to be held. In such a case, this user can bedouble-booked for two meetings. The meeting attendee will decide whichof the double-booked meetings to attend. This is explained belowreferencing FIG. 14 to FIG. 16.

At step S215, the meeting organizer has completed the setting of themeeting and sends a disconnection (logoff) request from the terminal tothe server. The server receives this, and at step S216 the serverresponds with the disconnection. Accordingly, the session between theterminal and the server is ended, and the communications sequence shownin FIG. 2 ends.

FIG. 11 is a diagram showing an example of AP information per meetingroom, which is registered in the server as a database.

AP information is registered for each meeting room as a database in theserver. The AP information includes an AP name, the IP address assignedto the AP, the wireless LAN channel to be used in the meeting room, andthe maximum number of APs that can be used in the meeting room.

In the example shown in FIG. 11, a maximum of 2 APs can be placed ineach of the 3 meeting rooms A, B, and C. The AP name, IP address, andchannel for each AP are also assigned.

FIG. 12 is a communications sequence diagram showing processing forsending a notification of the meeting room reservation information. Thiscommunications sequence is conducted after the meeting organizer hasmade the meeting reservation with the server, and is conducted betweenthe server and the AP arranged in the reserved meeting room.

Here, explanations will be given regarding an example in which thereservation information about reserving the meeting room 1 from 9 amuntil 12 noon (see FIG. 7) is sent from the server to the access pointAP 1 installed in the meeting room 1. This communications sequence isstarted immediately after a main power source for the AP 1 is turned on.

All the APs are equipped with a nonvolatile memory, and the server's IPaddress is pre-stored in this nonvolatile memory. At step S1201, the AP1 reads the server's IP address stored in the nonvolatile memory, anddesignates this IP address to connect to the server. The AP 1 sends aReady signal to notify the server that it's own power source has beenturned on and the AP 1 is operational. After the server receives theReady signal from the AP 1, at step S1202 the server sends the AP 1 anAck (Acknowledge) signal, which is a response signal, to inform the AP 1that the server has received the Ready signal.

At step S1203, the server then extracts the meeting name and channelscheduled to be used for the IP address of the AP 1 that sent the Readysignal, from the AP information such as that shown in FIG. 11. Further,the server also references the database information such as that shownin FIG. 10 and extracts the encipher key corresponding to the meetingname that was already extracted. The server then sends the extractedchannel and encipher key to the AP 1.

Note that, the information sent from the server to the AP 1 at stepS1203 are not the ones for all the meetings scheduled to be held in themeeting room 1 where the AP 1 is installed. Rather, they are thechannels and encipher keys for meetings that are scheduled to be heldduring or after the time when the Ready signal is received from the AP1. For example, whether the server received the Ready signal on2002/4/19 at 8:50 am, or received on the same day at 9:10 am, the serverwould still send to the AP 1 the channels and encipher keys for themeeting from 9 am to 12 noon, the channel and key used for the meetingfrom 12 noon until 2 pm, and the channel and key for the meeting from 2pm until 5 pm (see FIG. 7).

At step S1204, if the information sent from the server at step S1203 isreceived correctly, then the AP 1 sends the Ack signal to the server.

FIG. 13 is a sequence diagram showing connection processing which isconducted by the wireless LAN terminal in the network system(conferencing system) shown in FIG. 1, the AP 1 installed in a meetingroom 1, the AP 2 installed in a meeting room 2, and the server 4 whichis connected to the backbone LAN 5. Here, it is assumed that meetingroom 1 and meeting room 2 are adjacent to each other, and the radiowaves from the AP 2 installed in the meeting room 2 can be received inthe meeting room 1.

This processing is started when the meeting organizer turns on thewireless LAN terminal 3 that he or she has brought and loads theconferencing application software, which is stored in the wireless LANterminal 3. In order to enable the wireless LAN terminal 3 to receivethe radio waves sent by the AP 1 and the AP 2, the user typicallyselects and tunes into the 14 channels used by the wireless LAN one at atime searching for the channel where the radio waves can be received.

Assuming the radio waves emitted by, for example, the AP 2 were receivedon a certain channel, the wireless LAN terminal 3 then detects that theradio waves are from the AP 2 based on information contained in thereceived radio waves, and then sends a temporary connection request tothe AP 2 at step S1301. At step S1302, the AP 2 responds to thetemporary connection request from the wireless LAN terminal 3 with atemporary connection, whereby a temporary session is established betweenthe wireless LAN terminal 3 and the AP 2. Note that, the SSID is not setin either the wireless LAN terminal 3 or in the AP 2. Therefore, thetemporary connection request includes an SSID for performingauthentication, but there is no step in which this SSID isauthenticated.

At step S1303, the wireless LAN terminal 3 sends an authenticationrequest to the AP 2 in order to be authenticated by the server. At stepS1304, the AP 2 responds to the wireless LAN terminal 3 withauthentication indicating that it received the authentication requestfrom the wireless LAN terminal 3.

At the wireless LAN terminal 3 that received the authentication responsefrom the AP 2, the meeting organizer using that terminal inputs theaccount name serving as his or her own ID and the password via the inputdevice of the wireless LAN terminal 3. At step S1305, the wireless LANterminal 3 sends this inputted account name and password to the AP 2. Atstep S1306, the AP 2 sends to the server 4 the account name (ID) andpassword of the wireless LAN terminal 3 which were received from thewireless LAN terminal 3.

After the server 4 receives this transmission, the server 4 referencesthe data base (exemplified in FIG. 10) which is in the server 4 andsearches for a meeting reservation which corresponds to the account name(ID) and password that were received. If such a meeting reservationexists, then the server 4 extracts the encipher key and wireless LANchannel to be used at that meeting (i.e., the AP information). Accordingto the network system (conferencing system) example shown in FIG. 1, theserver 4 would extract the encipher key and channel 1 (channel used bythe AP 1) used for the meeting in the meeting room 1.

At step S1307, the server 4 sends the extracted encipher key andwireless LAN channel to the AP 2. At step S1308, the AP 2 sends theencipher key and wireless LAN channel that were sent from the server 4to the wireless LAN terminal 3.

At step S1309, the wireless LAN terminal 3 sends the temporaryconnection request for the channel received from the AP 2 (i.e., thechannel that is used by the AP 1) to the AP 1. At step S1310, the AP 1responds with a temporary connection in response with the temporaryconnection request from the wireless LAN terminal 3. Accordingly, atemporary session is established between the wireless LAN terminal 3 andthe AP 1.

At step S1311, the wireless LAN terminal 3 sends a regular connectionrequest to the AP 1. At step S1312, having received the regularconnection request, the AP 1 responds with a regular connection thewireless LAN terminal 3.

At step S1313, the AP 1 sends a predetermined plain text document to thewireless LAN terminal 3. The wireless LAN terminal 3 receives thepredetermined document and uses the encipher key received from the AP 2at step S1308 to convert the document into code, and at step S1314 sendsthe enciphered text to the AP 1.

Having received the enciphered text, the AP 1 uses the encipher keyreceived from the server 4 in the communications sequence (S1203) shownin FIG. 12 to return the enciphered text to plain text. Then the AP 1compares the plain text with the predetermined document sent to thewireless LAN terminal 3 at step S1313. If they are the same, then atstep S1315 the AP 1 sends a regular connection permission signal to thewireless LAN terminal 3, and thus a regular session is established.

Note that, the above-mentioned temporary session means thatcommunications have only been established between the wireless LANterminal and the AP. Thus, in the temporary session the data sent fromthe wireless LAN terminal cannot be sent past the AP to the backbone LANside. Also, for the backbone LAN side, during the temporary session theLAN cannot know whether or not the wireless LAN terminal is present.Therefore, the backbone LAN cannot send data to the wireless LANterminal. The above-mentioned regular session refers to a state wheresending and receiving can be performed between the wireless LAN terminaland the backbone LAN which is on the other side of the AP, which couldnot be done in the temporary session.

In the communications sequence shown in FIG. 13, the wireless LANterminal 3 first made a connection with the AP 2. However, even if thefirst connection is made to the AP 1 or to another AP, the operationsthat were performed by the AP 2 as explained above are performed by theother AP that is chosen instead of the AP 2, and the processing in thecommunications sequence remains the same. In other words, in the examplementioned above, the wireless LAN terminal 3 first receives theinformation for connecting to the AP 1 from the server 4 via the AP 2.However, instead of receiving the information from the server byconnecting first to the AP 2, there are instances where the wireless LANterminal 3 receives the information for connecting to the AP 1 from theserver 4 via the AP 1 from the beginning. In this case, the temporaryconnection and the regular connection are made only with the AP 1.

The communications case shown in FIG. 13 are described with a focus onthe operations of the wireless LAN terminal 3, without showing thecommunications sequence that takes place inside the server 4, which isthe processing from where the server 4 receives the user's account nameand password from the wireless LAN terminal 3 up to where the server 4returns the encipher key and the channel. However, this processing isperformed in processing which is discussed below with reference to FIGS.24 and 25. Therefore, explanations are omitted here.

FIGS. 14 to 16 are flowcharts showing processing sequences to connect tothe AP performed by the wireless LAN terminal. This connectionprocessing is started immediately after the meeting attendee turns ONthe power source to his or her wireless LAN terminal and loads theconferencing application.

First, in the initial settings of the conferencing application, onecounter is set for the RAM in the wireless LAN terminal, and its countervalue is set to 14.

At step S1401, the wireless LAN terminal selects a channel correspondingto the counter value of the above-mentioned counter, from among thefrequency channels used by the wireless ranging from channel 1 tochannel 14. The wireless LAN terminal then tries to receive the radiowaves in the frequency band of that channel and searches for radio wavesfrom the AP. At step S1402, it is determined whether or not the radiowaves from the AP in that frequency band are found. If they are found,then the procedure advances to step S1403, if not, then step S1422. Atstep S1422, the counter value in the counter decrements by 1, then atstep S1423 it is determined whether or not the counter value after thereduction is now 0. If it is 0, then the procedure advances to stepS1424. On the other hand, if it is not 0, then the procedure returns tostep S1401, and the next channel is selected as determined by thecounter value that was selected at step S1422. At step S1424, since theradio waves from the AP could not be received at any of the frequencychannels from channel 1 to channel 14, the wireless LAN terminalperforms a display on the screen of wireless LAN's display device,saying, “Wireless LAN access point not found. Cannot connect toconferencing access point. Possibly out of range to receive radio wavesfrom access point.” The wireless LAN terminal then ends this connectionprocessing.

At step S1402, if it is determined that the radio waves from the AP arefound, then the procedure advances to step S1403 and a temporaryconnection request is sent to the AP outputting the radio waves (this isAP 2 in the example shown in FIG. 13, and the following explanations aregiven regarding AP 2). At step S1404, it is determined whether or notthe temporary connection request was received. If it was received, thenthe procedure advances to step S1405. If not, then step S1422.

At step S1405, the wireless LAN terminal sends an authentication requestto the AP 2 in order to receive authentication from the server. At stepS1406, the procedure waits until a response comes from the AP 2indicating that the authentication request was received. When theresponse comes, the procedure advances to step S1407.

At step S1407, the wireless LAN terminal sends the account name (ID) andpassword inputted by the user of the wireless LAN terminal to the AP 2.At step S1408, it is determined whether or not the account name andpassword sent to the AP 2 were authenticated in the sever. If theaccount name and password are the same as those registered in the serverand they are authenticated, then the procedure advances to step S1409.On the other hand, if not authenticated, then the procedure returns tostep S1407, and after the user of the wireless LAN terminal re-entersthe account name and password, the wireless LAN terminal sends them tothe AP 2.

At step S1409, it is determined whether meeting reservation informationfor a meeting being held at the time when the wireless LAN terminalaccessed the server or a meeting to be held after that time has beenregistered in the server. If such information is registered, then theprocedure advances to step S1410. If not, then step S1425. At stepS1425, since there is not scheduled meeting for the user of the wirelessLAN terminal to attend, a display is displayed on the display screen ofthe wireless LAN terminal, saying, “No meetings registered.”, and thisconnection processing ends.

At step S1410, the wireless LAN terminal receives the meetingreservation information (encipher key, channel to be used, etc.) for themeeting(s) which the wireless LAN terminal user should attend, asregistered in the server. At step S1411, based on the received meetingreservation information, it is determined whether or not multiplemeetings are scheduled at the time closest to the time when the wirelessLAN terminal accessed the server. If there are overlapping meetings,then the procedure advances to step S1426. If not, then step S1412.

At step S1426, the overlapping sets of meeting information are displayedon the screen of the display device of the wireless LAN terminal, andthe user of the wireless LAN terminal must choose which meeting toattend. At step S1427, the processing waits for a meeting to beselected. When selected, the procedure advances to step S1412.

At step S1412, based on the channel that is included in the receivedmeeting information, the wireless LAN terminal sets the frequencychannel to be used with the wireless LAN at the given meeting.

At step S1413, the wireless LAN terminal tries to receive the radiowaves in the frequency band of the frequency channel that was set atstep S1412, and searches for the radio waves from the AP. At step S1414,based on the results of the search, it is determined whether or not theradio waves from the AP have been found. If they have been found, thenthe procedure advances to step S1415. If not, then step S1428. At stepS1428, a display is performed on the screen of the display device of thewireless LAN terminal saying, for example, “Cannot find access point forthe meeting. Access point may not be operating properly, or terminal maynot be within area to receive radio waves from access point. Yourmeeting to attend is Regular Meeting, taking place on 2002/4/19 from 9am until 12 noon, in Meeting Room 1. Please reconfirm location.” Then,the current connection processing ends.

At step S1414, in the case where it is determined that the radio wavesfrom the AP have been found, the procedure advances to step S1415, andthe temporary connection request is sent to the AP that outputted theradio waves. (This is the AP 1 in the examples shown in FIG. 13, and thefollowing explanations are given regarding AP 1.) At step S1416, it isdetermined whether or not the temporary connection request was accepted.If it was accepted, then the procedure advances to step S1417. If not,then step S1428. Note that, the AP 1 may be found but the temporaryconnection request may not be accepted. This could occur because the AP1 is busy with access from another terminal and could not respond thuscausing the wireless LAN terminal to time out, or because the AP 1 doesnot have a function to respond to the temporary connection request thuscausing the wireless LAN terminal to time out.

At step S1417, the wireless LAN terminal sends the regular connectionrequest to the AP 1. At step S1418, the processing waits for the AP 1 toaccept the regular connection request, and then the processing advancesto step S1419.

At step S1419, the wireless LAN terminal receives the plain text whichis the predetermined text sent from the AP 1. At step S1420, thewireless LAN terminal uses the encipher key, which was included in themeeting reservation information received from the server, to encode theplain text that was received, and then sends the enciphered text to theAP 1. The AP 1 then uses the same encipher key to return the encipheredtext to plain text, and compares this against the plain text which theAP 1 previously sent to the wireless LAN terminal. At step S1421, basedon the results of the comparison, it is determined whether or not bothof the plain texts are the same. If they were both the same, then theregular session is established between the wireless LAN terminal and theAP 1, and the regular connection processing ends. However, if theresults of the comparison indicate that they are not the same, then theprocessing returns to step S1420 and the enciphered text is sent onceagain. The plain texts may be different from each other because ofdamage caused to the transmitted data or other problems unpredictablycausing the data to change, or due to other reasons.

As described above, in accordance with Embodiment 1, the meetingattendee simply enters the room and inputs the account ID (which is hisor her own ID) and password into the wireless LAN terminal which he orshe brought. There is no need to set the channel that will be used orthe encipher key into the wireless LAN terminal. The channel andencipher key are then sent from the AP 1 installed in the meeting room1, and wireless communications can be established between the wirelessLAN terminal and the AP 1.

Embodiment 2

Next, explanation is given regarding Embodiment 2.

In Embodiment 1, the AP was provided (fixed) in the meeting room.Therefore, as understood from the AP information in FIG. 11, the meetingroom name and the IP address assigned to the AP correspond one-to-one.As such, the server can specify the meeting room where the given AP isinstalled based on the IP address of the AP that accessed the server.Therefore, at step S1203 in the notification processing for notifyingthe meeting room reservation information, the server can extract themeeting room name and channel corresponding to the IP address of the AP1 that sent the Ready signal, from the AP information exemplified inFIG. 11, and can send this to the AP 1.

However, another instance is conceivable in which the APs are notinstalled into each meeting room, and the meeting organizer brings theAP into the meeting room each time the AP will be used in the meeting.In this case, the AP and the meeting room do not correspond one-to-one.Even if the server examines the IP address of the AP that accessed theserver, the server cannot judge which meeting information to send tothat AP. Embodiment 2 is arranged to resolve this type of problem.

FIG. 17 is a block diagram showing a configuration of the access point(AP) in accordance with Embodiment 2.

In FIG. 17, reference numeral 1501 refers to an antenna unit of thewireless LAN. Reference numeral 1502 refers to an RF (Radio Frequency)unit connected to the antenna unit 1501 for sending and receiving theradio waves. Reference numeral 1503 refers to a codec unit formodulating the radio waves received and demodulating radio waves to besent. Reference numeral 1504 refers to a BB (Base Band) unit for formingsignals to be sent and received. Reference numeral 1505 refers to a MAC(Medium Access Controller) unit for use with the wireless LAN. Referencenumeral 1506 refers to an internal bus. Reference numeral 1507 refers toa CPU (Central Processing Unit) for controlling the AP in accordancewith a control program. Reference numeral 1508 refers to a ROM (ReadOnly Memory) storing the control program. Reference numeral 1509 refersto a RAM (Random Access Memory) for use as a work area for the CPU 1507and for storing the meeting information received from the server, andthe like. Reference numeral 1510 refers to a MAC unit for Ethernet(trademark). Reference numeral 1511 refers to a PHY (Physical)controller portion for use with the Ethernet. Reference numeral 1512refers to an Ethernet interface connector. Reference numeral 1513 refersto a PC card control unit. Reference numeral 1514 refers to a PC cardconnector.

FIG. 18 is a diagram showing an example of personal information of themeeting organizer stored in a nonvolatile memory in a PC card insertedinto the PC card connector 1514 shown in FIG. 17.

As shown in the diagram, the organization name, user name, account name,and password of the meeting organizer are recorded in the nonvolatilememory.

FIG. 19 is a sequence diagram of communications processing by which theAP receives, from the server, the encipher key, the wireless channel andother meeting information to be used with the AP which is configured asshown in FIG. 17.

As in Embodiment 1, where the AP is installed in the meeting room asshown in FIG. 12, when a portable AP is used in a specific meeting room,the communications processing of FIG. 19 is used to send the encipherkey and wireless channel and other meeting information to be used withthat AP from the sever to the AP.

Here, it is assumed that the AP 1 constructed as shown in FIG. 17 istaken into the meeting room 1 and used for a meeting to be held in themeeting room 1. A PC card storing the information about the meetingorganizer is inserted into the PC card connector 1511 of the AP 1. Awire cable is connected from the backbone LAN to the Ethernet interfaceconnector 1512, and the power source to the AP 1 is turned on. Thisstarts the communications processing shown in FIG. 19.

At step S1701, the AP 1 designates the server's IP address and sends theReady signal to notify the server that the power source for the AP 1 hasbeen turned on and the AP 1 can be operated. At step S1702, the serversends to the AP 1 the Ack signal, which is the response signalindicating that the server has received the Ready signal.

At step S1703, the AP 1 reads the meeting organizer information(exemplified in FIG. 18) stored in the PC card inserted into the PC cardconnector 1514, and sends this information to the server.

At step S1704, having received the information about the meetingorganizer, the server compares the account name and password of themeeting organizer against the same database information as in Embodiment1 (exemplified in FIG. 10). Then, from among all the meeting informationset for the user with that account name and password, the server sendsto the AP 1 the meeting information (i.e., the channel to be used withthe AP, the encipher key to be used for that meeting, etc.) for themeeting that will be held the soonest. Note, if a meeting is being heldduring the time when the comparison is made, then the meetinginformation for that meeting is sent.

At step S1705, if the AP 1 has correctly received the meetinginformation from the server, then the AP 1 sends the Ack signal to theserver. The AP 1 sets the wireless channel to the channel contained inthe meeting information received.

As described above, in the case where the AP is carried into the meetingroom, the server can determine the channel to be used with the AP andthe encipher key to be used for that meeting, based on the informationabout the meeting organizer in the PC card, and the same databaseinformation as the database information that is used in Embodiment 1,which is exemplified in FIG. 10. Therefore, even in the case where themeeting organizer carries the AP into the meeting room to use it, theserver can send to the AP the meeting information for that meeting.

Except for the operations of the communications sequence shown in FIG.19, the operations of the conferencing system in Embodiment 2 are thesame as those in Embodiment 1 using the AP that is installed in themeeting room. Explanations of those similar operations are omitted here.

Embodiment 3

Next, explanation is given regarding Embodiment 3.

In some instances, only 1 AP is present in the meeting room. In such acase, according to Embodiment 1, as exemplified in FIG. 10, the serverassigned the wireless channel and the encipher key to be used in ameeting held in that meeting room into the database of each meetingattendee. However, there are also instances where multiple APs areinstalled in a single room, as is true for meeting rooms A, B, and Cshown in FIG. 11. In such a case, the server cannot simply assign thewireless channel and encipher key.

In Embodiment 3, the wireless LAN terminals of the meeting attendees areassigned automatically and evenly to the multiple APs installed in thesame meeting room. That is, the wireless channels and encipher keys aredetermined such that the meeting organizer comes to the meeting room,and immediately after the wireless LAN terminal's conferencingapplication is booted, the number of wireless LAN terminals that will beconnected to each of the multiple APs becomes even.

The meeting organizer then sends to the server the data for thereservation status screen as exemplified in FIG. 20. In FIG. 20, thereservation date is 2002/4/19, the desired meeting room is a meetingroom A where 2 APs are arranged, the meeting start time is 9 am, themeeting end time is 12 noon, and the meeting name is Regular Meeting.

FIG. 21 is a diagram showing an example of a screen of a meeting roomreservation request response, which is sent back to the terminal of themeeting organizer from the server that received the reservation statusscreen data as exemplified in FIG. 20.

In FIG. 21, the rectangular graphs are charted into the time frame from9 am to 12 noon for the meeting room A, thus indicating the reservation.

FIG. 22 is a diagram showing an example of database information ofEmbodiment 3, which corresponds to the database information ofEmbodiment 1 exemplified in FIG. 10.

In FIG. 22, a reservation is made for a Regular Meeting in the meetingroom A during a time frame from 9 am to 12 noon. However, the encipherkey and the wireless channel to be used for the meeting are yetundecided, and those fields are left blank.

FIG. 23 is a block diagram showing a configuration of a conferencingsystem in accordance with Embodiment 3.

In FIG. 23, reference numerals 2101, 2102, 2103, and 2104 indicatewireless LAN access points AP (10) through AP (13). AP (10) 2101 and AP(11) 2102 are arranged in the meeting room A, and AP (12) 2103 and AP(13) 2104 are arranged in a meeting room B. The meeting room A andmeeting room B are neighboring each other. It is assumed here that theradio waves emitted from AP (12) 2103 and AP (13) 2104 can be receivedin the meeting room A.

Reference numeral 2105 refers to a wireless LAN terminal capable ofperforming wireless communications with the AP (10) 2101 through AP (13)2104. Reference numeral 2106 indicates a server having theauthentication function and the database function. Reference numeral2107 refers to the backbone LAN connecting the AP (10) 2101 through AP(13) 2104 with the server 2106.

The following explanations are given based on an example in which themeeting attendees enter the meeting room A with their wireless LANterminals 2105 at the time when the meeting is going to start. Thewireless LAN terminal then connects with the AP (12) 2103 first, andthen after the authentication is performed with the server 2106 connectswith the AP (10) 2101. The connection processing sequence of Embodiment1 shown in FIG. 13 is also used in the following explanations.

In FIG. 13, the processing from step S1301 to step S1305 is entirely thesame as that in Embodiment 1, except in that the AP 2 is changed to AP(12) 2103.

After that, at step S1306, the AP (12) 2103 sends the user account nameand the password of the wireless LAN terminal 2105 to the server 2106.At this time there are two APs in the meeting room A. Therefore, theserver 2106 must connect the authenticated wireless terminal 2105 to oneof the APs. FIG. 24 and FIG. 25 are used to explain the operations ofthe server 2106 at this time.

FIG. 24 and FIG. 25 are flowcharts showing a sequence of authenticationand processing to send the meeting information, which are executed bythe server 2106, in accordance with Embodiment 3.

At step S2201, the server 2106 performs a search to determine whether ornot the account name (ID) and the password of the wireless LAN terminal2105 which the server 2106 received are registered in databaseinformation of Embodiment 3, which is identical to the databaseinformation of Embodiment 1 exemplified in FIG. 8. Then, at step S2202,depending on the results of the search, the procedure either advances tostep S2203 if the registration is found, or to step S2210 if theregistration is not found. At step S2210, the server 2106 sends amessage via the AP (12) 2103 to the wireless LAN terminal 2105 saying,“Either not registered in database or input is incorrect”, and then thecurrent processing ends.

At step S2203, the server 2106 confirms whether or not the meetingsettings for the user of the wireless LAN terminal 2105 have been madein the database information of Embodiment 3, which is identical to thedatabase information of Embodiment 1 exemplified in FIG. 10. Ifconfirmed to be so, then the processing advances to step S2204. If not,advances to step S2211. At step S2211, the server 2106 sends a messagevia the AP (12) 2103 to the wireless LAN terminal 2105 saying, “Nomeeting registered”, and then the current processing ends. At stepS2204, the server 2106 determines whether or not multiple meetings arebooked at the same meeting start time for the user of the wireless LANterminal 2105 in the above-mentioned database information of Embodiment3. If confirmed to be so, then the processing advances to step S2212. Ifnot, advances to step S2205.

At step S2212, the server 2106 sends the wireless LAN terminal 2105 themeeting names, the meeting room names, the start times, the end times,and the like for all the meetings starting at the same time which areregistered in the above-mentioned database information of Embodiment 3.At step S2213, the processing then waits for the user of the wirelessLAN terminal 2105 that received this information to select 1 meetingwhich he or she will attend. Then the processing advances to step S2205.

At step S2205, the server 2106 references the AP information ofEmbodiment 3, which is identical to the AP information of Embodiment 1exemplified in FIG. 11, and confirms whether or not two or more APs areinstalled in the meeting room where the meeting will be held. Ifconfirmed to be so, the procedure advances to step S2206. If not,advances to step S2215.

If the AP is carried into the meeting room to be used there, asexplained in Embodiment 2, then the AP sends the information about themeeting organizer to the server at the time when the AP is booted up bythe meeting organizer. In Embodiment 3, the server then creates adatabase inside itself at that time and determines which APs are placedin which meeting room (this is the same as the AP information ofEmbodiment 1 exemplified in FIG. 11), and then determines how many APsare in which room.

At step S2215, the server 2106 sends the meeting information (thechannel, encipher key, etc. to be used at the meeting) via the AP (12)2103 to the wireless LAN terminal 2105, and then the current processingends.

As shown in FIG. 22, in a case where the meeting will be held in ameeting room arranged with 2 or more APs, the channel and the encipherkey to be used which must be set into the wireless LAN terminals of themeeting attendees cannot be set at the point in time when the meetingreservation is made. In Embodiment 3, one register with the AP name iscreated inside the server 2106. Nothing is written in this register whennone of the meeting attendees' wireless LAN terminals have yet accessedthe server 2106.

At step S2206, the server 2106 confirms whether any content has beenwritten into the above-mentioned register. At step S2207, depending onthe results confirmed in the previous step, if settings (writtencontent) of any sort exists in the register then the processing advancesto step S2216. If not, advances to step S2208. Here, nothing is set(written) in the register in a case where the server 2106 is accessedfor the first time by the users attending the meeting held in themeeting room A and the processing is carried out. Therefore, theprocedure advances to step S2208. However, if another wireless LANterminal has accessed the server 2106 before the wireless LAN terminal2105 currently accessing the server 2106, then the procedure advances tostep S2216.

At step S2208, the name of the AP assigned with the smallest number ofall the APs placed in the meeting room is written into the register. Inthis embodiment, the AP 10 and the AP 11 are placed in the meeting roomA, so the AP 10 is set into the register.

At step S2216, the AP name that has not been written into the registeris written into the register, and then the procedure advances to stepS2209. In this embodiment, the 2 APs (AP 10 and AP 11) are placed in themeeting room A. Therefore, for example, if the AP 10 has been written inthe register, this is rewritten to the AP 11. If 3 or more APs areplaced in the meeting room, starting with the AP with the smallestnumber, for example, the AP names are written into the register and thenwhen the greatest number is reached, the AP name with the smallestnumber is written into the register once again.

At step S2209, the AP name that is set in the register is read out, andthe AP information of Embodiment 3, which is the same as the APinformation of Embodiment 1 exemplified in FIG. 11 is referenced, andthe wireless LAN channel corresponding to the AP name that was read outis then read out. Further, the encipher key that was sent to the AP inthe step in Embodiment 3 which is the same as step S1203 in Embodiment 1shown in FIG. 12 is then sent to the wireless LAN terminal 2105 togetherwith the wireless LAN channel that was just read out.

As described above, in Embodiment 3 the server changes the AP name inthe register each time the wireless LAN terminal accesses the server.The channel corresponding to the AP name in the register is thennotified to the wireless LAN terminal. Therefore, the wireless LANterminal that has accessed the server is connected to different APs, oneafter the other, in the order of access to the server. As a result, thewireless LAN terminals get evenly distributed across the APs.

In the above-mentioned embodiments, the explanations were givenregarding a conferencing system for connecting specific wireless LANterminals to specific APs. However, the present invention is notrestricted to such a configuration, and may also be applied in anotherPAN where the wireless LAN is used. In such a case, there do not have tobe divisions between rooms such as in meeting rooms. The system may be awireless LAN system in an open space such as an airport, a hotel lobby,or the like. Furthermore, in such case, each group (section) does nothave to have a meeting organizer as in the conferencing system. Instead,the settings may be performed by a administrator or other managermanaging the entire system.

According to the detailed descriptions given above, when connecting thewireless LAN terminal to the specific wireless communication accesspoint, the wireless channel, the encipher key, and the other connectioninformation which are necessary to make the connection are not setmanually into the wireless LAN terminals. Rather, the above-mentionedconnection information which is on the server that has connected to thewireless communication access point is automatically received, wherebythe wireless communications is established between the wireless LANterminal and the specific wireless communication access point.

Furthermore, since the multiple wireless communication terminals can beconnected evenly across multiple wireless communication access pointsplaced in the same location, the wireless LAN terminals are not assignedconcentratedly on a specific wireless communication access point, and itthus becomes possible to avoid communications traffic concentrating on aspecific wireless communication access point.

Embodiment 4

Below, detailed explanation is given regarding Embodiment 4 of thepresent invention, with reference made to the diagrams.

FIG. 26 is a block diagram showing an overall structure of a networksystem in accordance with this embodiment.

In the network system of this embodiment shown in FIG. 26, a wired LAN(Local Area Network) and a wireless LAN are connected to each other viaan information device which is the access point. A plurality of wirelesscommunication terminals 2601 (STA1), 2602 (STA2), and 2603 (STA3) whichconstitute the wireless LAN are connected to the wired LAN 2607. Thereare also provided wireless communication terminals 2601-2603, along witha plurality of access points 2604 (AP1), 2605 (AP2), and 2606 (AP3)which are capable of performing wireless communications, and anauthentication server 2608 connected to the wired LAN 2607.

The wireless communication terminals 2601-2603 are each constituted by aportable personal computer or PDA (Personal Data Assistant) havingwireless communication functions, and these wireless communicationterminals 2601-2603 connect to one of the access points 2604-2606 toperform wireless communications. The wireless communications performedbetween the wireless communication terminals 2601-2603 are all performedvia one of any of the access points 2604-2606. In FIG. 26, the wirelesscommunication terminal 2601 is connected to the access point 2604. Thewireless communication terminals 2602 and 2603 are shown both beingconnected to the access point 2605.

When each user using the wireless communication terminals 2601-2603accesses the wired LAN 2607 via the access points 2604-2606, theauthentication server 2608 performs authentication to confirm whether ornot to permit the user's access. In this embodiment, the authenticationserver 2608 may operate as a RADIUS server, for example, which performsthe authentication based on RADIUS (Remote Authentication Dial In UserService) protocol.

In the network system of this embodiment, on the wired LAN 2607, theremay also be multiple devices in addition to the authentication server2608 (e.g., personal computers, printers and other peripheral devices,copying machines, etc.). Furthermore, the wireless communicationterminals 2601-2603 and the access points 2604-2606 are not limited tothe number shown in the diagrams. Many may be arranged in the system.

FIG. 27 is a block diagram showing an internal structure of the accesspoints shown in FIG. 26.

In FIG. 27, similarly to the other access points 2605 and 2606, theaccess point 2604 is constructed with a control unit 2701, a ROM 2702, aRAM 2703, a wireless communication circuit unit 2704, a wiredcommunication circuit unit 2705, an EEPROM 2706, a system bus 2707, anda power unit 2708. Other than the EEPROM 2706, each of the units areconnected to each other by means of the system bus 2707.

The EEPROM 2706 is connected directly to the control unit 2701 via theserial interface 2709. The power unit 2708 provides electrical powernecessary for operations to each of the above-mentioned units.

The control unit 2701 is a portion for performing overall control of theaccess point 2604 and is constituted of a microprocessor and itsperipheral circuitry, etc. The control unit 2701 operates by means of anoperation control program stored in the ROM 2702, and processes frames(signals) which are sent and received among the wireless communicationterminals 2601-2603 and devices which are not shown in the diagram butare present on the wired LAN 2607, distributing the frames so as to makesure they arrive at their proper destinations. Furthermore, the controlunit 2701 executes processing such as access control for each of theunits shown in FIG. 27, and also performs various control processingsnecessary to realize the present invention.

The ROM 2702 is a nonvolatile memory storing an operation controlprogram executed by the control unit 2701. The operation control programstored here is outputted onto the system bus 2707 in response tocommands from the control unit 2701.

The RAM 2703 functions as a work memory when the control unit 2701executes the operation control program, and also functions as a buffermemory for temporarily storing various data sent and received among thewireless LAN terminals 2601-2603 or the devices on the wired LAN 2607.

The wireless communication circuit unit 2704 is constituted of afrequency circuit, an encoder/decoder circuit, an antenna, and the like,and performs transmission and reception of frames among the wireless LANterminals 2601-2603. The wireless communication method according to thisembodiment may be one that is defined by IEEE 802.11, for example. Theaccess points 2604-2606 and the wireless communication terminals2601-2603 are each assigned unique identification numbers, and theseidentification numbers are used to designate transmission/receptiondestinations for the frames.

The wired communication circuit unit 2705 is constituted of atransmission/reception circuit, an encoder/decoder circuit, and thelike, and performs transmission and reception of frames among thedevices existing on the wired LAN. The wired communication method usedin this embodiment may be one that is defined by IEEE 802.3 (so-called“Ethernet (trademark)”), for example.

The EEPROM 2706 is a nonvolatile memory in which data can be rewrittenelectronically, for storing information about the various settings fordetermining the operations of the access point 2604, and informationabout the terminal properties which are notified from each of thewireless communication terminals 2601-2603, and the identificationnumbers for identifying partner devices in communications, and the like.The control unit 2701 can read and write the above-mentioned informationabout the various settings and the information about the properties ofthe terminals and the like through a serial interface 2709.

Furthermore, the EEPROM 2706 can also be used as a memory to store useridentification information for identifying the users of the wirelesscommunication terminals 2601-2603 in response with the variousconnection requests (access requests) sent from the wirelesscommunication terms 2601-2603, and for storing other informationpertinent to the access points (e.g., access point names set by theusers for each of the access points, and IP addresses, MAC addresses,wireless channels, etc. assigned to the access points.) The useridentification information may be the user's email address or name solong as it is possible to specify the user. Or, if a user account hasbeen set up to manage each user's network access rights, then the useridentification information may be that user account.

Further, the user identification information can be written and deletedby a user with proper administrative authority making access from anexternal instrument to the access point either via the wired LAN 2607 orvia the multiple wireless LAN terminals that constitute the wirelessLAN, or by using input means (not shown in the diagram) provided to theaccess point itself (e.g., a switch, a touch panel, etc.) to write orerase it in the EEPROM 2706 via the control unit 2701.

Next, turning to FIG. 28 and FIG. 29, explanation is given regardingprocessing for designating the access point 2604 as the connectiondestination for the wireless communication terminal 2601, in a casewhere the user of the wireless communication terminal 2601, for example,tries to connect to a specific access point in order to attend ameeting, in the network conferencing system using the network system inFIG. 26.

First, before the meeting is started the meeting organizerpre-registers, in the access point 2604 which will be used in themeeting, the information for identifying the user of the wirelesscommunication terminal 2601 (the meeting attendee) and the otherinformation about the meeting. The information for identifying the userand the like is either registered directly by using an operating section(not shown in the diagram) which is provided to the access point 2604,or by registering it through the wireless communication terminals2601-2603 or through the authentication server 2608 or the like. Theregistered information is written into the EEPROM 2706 which is in theaccess point 2604. FIG. 28 shows one example of registered information2800 which is registered in the EEPROM 2706 in the access point 2604.

As shown in FIG. 28, the registered information 2800 includesinformation about the meeting such as the access point name, thewireless channel, the day when the meeting will be held, the meetingstart time and end time, the account information (account name) of eachattendee in order to distinguish among the meeting attendees, etc.

The access point 2604 determines whether or not the user of the wirelesscommunication terminal 2601 that requested the connection ispre-registered as a meeting attendee in the registration information2800. By including the day when the meeting will be held and the starttime, end time, and the like in the registration information 2800, thetime frame during which the wireless communication terminal 2601 and thelike are connected to the access point 2604 can be restricted just tothe time frame when the meeting is held.

FIG. 29 is an explanatory diagram for explaining a procedure forconnecting to the access point in the network system in FIG. 26. FIG. 29shows a sequence performed when the wireless communication terminal 2601(STA 1) of the user trying to participate in the network conferencingsystem tries to connect to the access point 2604 (AP1) to participate inthe meeting.

In this embodiment, it is assumed that AP 1 is the access point for themeeting which the STA 1 user should connect to. The connection requestfrom the STA 1 is sent to the AP 1 and the data link is established, andafter the authentication is performed to gain network access, datatransmission/reception is started between the STA 1 and otherinformation devices via the access point. FIG. 29 assumes a case wherethe access point first discovered by the STA 1 was the access pointwhich the STA 1 should connect to.

Generally, in a case where multiple access points are present in thevicinity of a wireless communication terminal, the access point whichshould be connected to is not necessary found at first. FIG. 30 is usedfor detailed description of processing sequences in a case where theaccess point which should be connected to cannot be found.

First, a trigger for performing the connection request causes the STA 1to select one access point from among the access points present in thevicinity, and the connection request is then made to the selected accesspoint (step S2901). Here, the STA 1 is configured so to scan the rangeof frequencies usable by the wireless LAN and select the first accesspoint it finds and then send the connection request to this accesspoint. Note that the above-mentioned “trigger for performing theconnection request” may be the user turning on the power source to theSTA 1, or may be the generation of a connection request to the networkwhich occurs upon execution of application software in the STA 1, orother such event.

Next, in response with the connection request from the STA 1, the AP 1permits the connection request and establishes the data link (stepS2902). Typically, wireless communication formats that are defined byIEEE 802.11 are configured so as to reject connection requests fromwireless communication terminals that are not pre-set with the SSID andthe WEP key. Therefore, for example, by setting the SSID to “ANY”, or bynot setting the WEP key, connection requests from all wireless LANterminals will be permitted and the data link will be established.Nevertheless, the system is constructed such that at this stage, allaccess by the STA 1 to the wired LAN 2607 and all communications withthe other wireless communication terminals (e.g., STA 2, STA 3, etc.)via the AP 1 are completely cut off.

In wireless communication formats that is defined by IEEE 802.11,wireless frames (wireless signals) are not encoded if the WEP key is notset. Therefore, after the data link between the access point and thewireless communication terminal has been established, a predeterminedencoding format is preferably used to encode the data sent and receivedbetween that access point and the wireless communication terminals.

Next, the AP 1 sends to the STA 1 a transmission request for requestingtransmission of the user identification information (user information)for determining whether or not the AP 1 is the access point which theSTA 1 should connect to (step S2903). Here, the user account of the STA1 user is used as the user identification information.

When the STA 1 receives the user identification information transmissionrequest from the AP 1, a message is displayed for example on the displayscreen of the STA 1 saying, “Please input account name”, thus urginginput of the user identification information (which is the “useraccount” in the present example) (step S2904). Here, when the userinputs the user account as the user identification information, theinputted user account is sent out to the AP 1 (step S2905).

When the AP 1 receives the user account from the STA 1 as the useridentification information, it is then determined whether or not anaccount that matches the received user account is present in the list ofmeeting attendees (the registration information 2800) that waspre-registered by the meeting organizer or the like in the EEPROM 2706.Here, if an account matching the user account received from the STA 1 ispresent in the registered information 2800, then the AP 1 is the accesspoint which the STA 1 user should connect to. Therefore, a messageindicating that the user identification information has been confirmedis sent to the STA 1 (step S2907).

Next, when the STA 1 receives the message from the AP 1 indicating thatthe user identification information was confirmed, the STA 1 thendetermines the AP 1 as the access point final connection point (stepS2908), and then sends out to the AP 1 an authentication request messagefor access to the network, which is the wired LAN 2607 (step S2909). TheAP 1 forwards the authentication request message received from the STA 1to the authentication server 2608 (step S2910).

When the authentication request message is received from the AP 1, theauthentication server 2608 sends an authentication response message tothe AP 1 to request authentication information (step S2911).

When the authentication response message is received from theauthentication server 2608, the AP 1 sends to the STA 1 a messagerequesting input of the authentication information (step S2912).

When the STA 1 receives the message requesting input of theauthentication information from the AP 1, a message is displayed forexample, on the display screen of the STA 1 saying, “Please inputpassword”, or the like, thus urging the user to input the informationnecessary to receive the authentication. Here, when the authenticationinformation (password information) is inputted by the user (step S2913),the inputted authentication information is hashed using a unidirectionalhashing function, or is enciphered using a specific enciphering formatwhich is defined in advance between the wireless communication terminaland the access point (this is separate from the format using the WEPkey), and then is sent to the AP 1 (step S2914).

When the authentication information is received from the STA 1, the AP 1forwards that authentication information to the authentication server2608 (step S2915). The pre-defined, specific encoding format may be usedto encode these communications between the AP 1 and the authenticationserver 2608 as well.

When the authentication information for the user of the STA 1 isreceived from the AP, the authentication server 2608 determines whetheror not the STA 1 user should be authenticated, based on the receivedauthentication information (step S2916). Here, if the STA 1 user isauthenticated, then a message is sent to the AP 1 indicating that theauthentication succeeded (step S2917). Note, if the authentication didnot succeed, a message indicating that the authentication did notsucceed may be sent via the AP 1 to the STA 1 to urge the user to inputthe authentication information once again.

When the authentication success message for the STA 1 user is receivedfrom the authentication server 2608, the AP 1 forwards theauthentication success message to the STA 1 (step S2918), and also givespermission for the STA 1 to communicate with the devices on the wiredLAN 2067 or the wireless communication terminals (nodes) other than theSTA 1 connected to the AP 1 and thus releases the block oncommunications (step S2919). Subsequently, the STA 1 begins datacommunications with the other devices on the wired LAN 2607 through theAP 1 (step S2920). Accordingly, even in a case where one wishes to use aspecific access point during the meeting to manage the wirelesscommunication terminals' access to the network, it is not necessary toregister information for distinguishing the access points in advance onthe wireless communication terminal side. This improves the convenienceto the user of the wireless communication terminal.

Referring to FIG. 29, explanations were given regarding the sequence upto the point where the wireless communication terminal STA 1 of the usertrying to participate in the network conferencing meeting makes theconnection request to the conferencing access point AP 1, and the datacommunications are started. However, in general, multiple access pointswill be discovered if multiple access points are present within therange where the wireless communication terminal can perform wirelesscommunications, or in the case where the wireless communication terminalsearches for the access point to try to make access.

Referring to FIG. 30, explanation will now be given regarding a sequencein which the wireless communication terminal STA 1 performs theconnection request to the access point AP 1 in which information foridentifying the STA 1 at first is not registered, and the connectiondestination is ultimately switched to a desired access point APn atwhich the STA 1 user is registered as a meeting attendee.

FIG. 30 is an explanatory diagram for explaining a procedure forconnecting to the access point in the network system in FIG. 26. In FIG.30, the same processing as that in FIG. 29 is denoted by the same stepnumber.

In FIG. 30, the STA 1 scans the range of frequencies usable by thewireless LAN, and then selects the first access point firstly discoveredand executes the connection request to this access point (step S2901).Here, it is assumed that the AP 1 is the access point which the STA 1first performs the connection request to.

In response with the connection request from the STA 1, the AP 1temporarily approves the connection request and establishes the datalink (step S2902). However, at this state, all access by the STA 1 tothe wired LAN 2607, and all communications with the other wirelesscommunication terminals via the AP 1 are completely cut off. Then, theAP 1 sends to the STA 1 the request for transmission of the useridentification information that is used to determine whether or not theAP 1 is the access point which the STA 1 should connect to (step S2903).

When the transmission request for the user identification information isreceived from the AP 1, a message is displayed for example on thedisplay screen of the STA 1 saying, “Please input account name”, thusurging the input of the user identification information (which is the“account name” in this example). Here, when the user inputs the useraccount as the user identification information (step S2904), theinputted user account is sent out to the AP 1 (step S2905).

When the AP 1 receives the user account from the STA 1 as the useridentification information, it is then determined whether or not anaccount matching the received user account is present in the list ofmeeting attendees (the registration information 2800) that waspre-registered by the meeting organizer or the like in the EEPROM 2706.Here, if an account matching the user account received from the STA 1 isnot present in the registered information 2800, the AP 1 then inquireswhether or not network access is permitted for the received user accountto other access points (e.g., AP 2, etc.) which are pre-registered inthe EEPROM 2706. In other words, via the wired LAN 2607, the AP 1inquires whether or not the user account is registered (step S3001).(This is referred to as the user identification information inquiryprocess.) More detailed explanation is given below regarding the useridentification information inquiry process at step S3001.

At step S3001, after the AP 1 inquires whether or not the useridentification information (e.g., user account) is registered for theSTA 1 to other access points, if a message of confirmation permittingnetwork access is sent back from the access point, a message (i.e., aninquiry result notification) indicating the access point which the STA 1should connect to (this is the access point where the confirmationmessage was sent back) is then sent to the STA 1 (step S3002).

When the message indicating the access point to connect to is receivedfrom the AP 1, the STA 1 disconnects the data link with the AP 1 (stepS3003) and makes the connection request to the indicated access point(step S2901), and performs the processing at and following step S2902 inFIG. 29.

On the other hand, if no access point is discovered for which networkaccess can be approved, then a message (inquiry result) indicating thatno access point was discovered for which network access can be approvedis sent and notified to the STA 1 (step S3002), and then the data linkis disconnected (step S3003). Here, the designation of the access pointis performed using the following information: the “access point name”registered by the user for the access point, which is written in themessage sent back from the above-mentioned access point for whichnetwork access is approved, and the “wireless channel” which that accesspoint uses.

FIG. 31 is a flowchart showing processing for inquiring about useridentification information at step S3001 in FIG. 30.

In FIG. 31, lists of identification information (e.g., the IP addressesset for access points, etc.) for several access point which arephysically close when the initial settings are performed when the accesspoint is set up, are written into predetermined areas secured which areset aside by the user in the EEPROM 2706 in each of the access points2604-2606 present on the wired LAN 2607 (here, these access points arethe AP 1, the AP 2, . . . , the APn). This list of access pointidentification information is used to designate other access points inthe processing at step S3001 in FIG. 30 when the access point sends themessage to the other access points to inquire about the useridentification information.

The list of access point identification information is updated asfollows. Namely, when the user identification information inquirymessage is received from the other access point, the access point ofthis embodiment registers into the list the identification informationof the other access point that sent the inquiry message. Then, if theaccess point identification information of the other access point ispresent in the list, the access point identification information thatwas just received is written over the older information, thus updatingthe content of the registration. For example, if the AP 1 sends aninquiry message to the AP 2 and the AP 3, the content registered in theaccess point identification information in the AP 2 and the AP 3 isupdated, and then the new AP 3 is rewritten on the lists of the AP 2 andthe AP 3.

If there are no free spaces in the memory area in the EEPROM 2706 thatis set aside for registering the access point identificationinformation, then the updating of the content registered in the list isperformed by rewriting the oldest access point identificationinformation in the list with the new registration information.

At first, at step S3101, the access point (the AP 1 in FIG. 30) did nothave the user identification information received from the wirelesscommunication terminal (the STA 1 in FIG. 30) registered in its EEPROM2706. Therefore, the access point (e.g., AP 1) then selects the otheraccess point (e.g., the AP 2 or the AP 3, etc.) from its own list ofaccess point identification information as the message transmissiondestination to send the inquiry about whether or not the useridentification information is registered. Then the procedure advances tostep S3102.

At step S3102, the access point AP 1 sends, to the other proximal accesspoint selected at step S3101, the message asking about whether it hasregistered the user identification information that has been received.Then the procedure advances to step S3103.

At step S3103, the AP 1 confirms whether or not there is a response fromthe other access point to which the message was sent at step S3102.Here, if there is no response message from the other access point duringa predetermined amount of time from when the message was sent out atstep S3102, it is judged that the user identification information is notregistered at the other access point (NO at step S3103), and then theprocedure advances to step S3105. On the other hand, if there is aresponse message within the predetermined amount of time from the otheraccess point where the user identification information is registered(YES at step S3103), then the procedure advances to step S3104.

At step S3104, the AP 1 sends, to the STA 1 performing the networkconnection request, a connecting AP and notice message which containsthe “access point name” and the “wireless channel” of the access pointwhich the STA 1 should connect to, and then the current processing ends.

At step S3105, the message for performing the inquiry is sent inmulticast without limiting the other access points which the useridentification information will be sent to. At step S3106, confirmationis made as to whether or not there is a response from the other accesspoints to which the multicast inquiry about the presence/absence of theuser identification information was sent at step S3105. Here, if thereis no response message from any of the access points within apredetermined amount of time from when the message was sent out at stepS3106 (NO at step S3106), then a message is sent to the STA 1 indicatingthat no connectable access point was found (step S3107), and then thisprocessing ends. On the other hand if a response from another accesspoint where the STA 1 user identification information was registered isconfirmed (YES at step S3106), then the procedure advances to stepS3104, where the above-mentioned connecting AP and notice message issent to the STA 1, and then the current processing ends.

In the embodiment described above, explanations were given regarding thenetwork system in which the access points 2604-2606 and theauthentication server 2608 were present on the wired LAN 2607. However,it is also possible to use a construction in which one of the accesspoints has the functions of the authentication server 2608 built in.

Further, in the above-mentioned embodiment, nothing is particularlymentioned about determining access rights to other devices after accessto at least one of the wireless communication terminals 2601-2603 hasbeen approved. However, it is also possible to use a construction suchthat by setting an access level for each of the users of the wirelesscommunication terminals 2601-2603, access to each network resource isdetermined individually for each user.

Furthermore, in the above-mentioned embodiment, when each access pointupdates the registered content in the list where the access pointidentification information is registered, if there are no free spaces inthe memory areas then the oldest registered information is rewrittenwith the new registration information. However, it is also possible touse a construction in which for each access point registered in the listthe number of inquiries during a predetermined duration of time in thepast is saved and the registration information of the access point withthe least number of inquiries is rewritten with the new registrationinformation.

According to this embodiment, in the network system which is made up ofthe multiple access points connected to the wired LAN and the multiplewireless communication terminals capable of wireless communications tothe access point, the user identification information for identifyingthe user of the wireless communication terminal 2601 that requests theconnection to the access point is registered in advance, and then inresponse with the connection request from the wireless communicationterminal where the user identification information is registered,permission is given for communications via the access point with theother wireless communication terminal or the device(s) connected to theLAN. On the other hand, in response with the connection request from thewireless communication terminal where the user identificationinformation is not registered, the inquiry is made to the other accesspoints to inquire whether or not they have registered the useridentification information of the wireless communication terminalperforming the present connection request, and the access point toconnect to is designated for the wireless communication terminal basedon the results of the inquiry. Therefore, in conferences and the likewhere the network is utilized, when the wireless communication terminalis required to connect to a specific access point and must change thedestination point that it will connect to, the wireless communicationterminal can connect to the desired access point without makingmodifications in advance to the settings of the access point that isdesignated on the wireless communication terminal side as thedestination to connect to. Thus, the burden to the user of the wirelesscommunication terminal can be alleviated.

Further, even in an environment where multiple access points are presenton the network, the inquiry regarding the user identificationinformation can only be made to the pre-registered (proximally placed)access points, and the instances where the inquiry is multicast arelimited so as to suppress increases in traffic on the network and enableefficient discovery of the appropriate access point to connect to.

Note that, the present invention is not restricted to the specificembodiments described above, and various modifications can be madewithout departing from the gist of the present invention.

For example, the information which is registered in the EEPROM 2706(e.g., the information about the other access points, the useridentification information, etc.) in the access point 2604 explained inthe above-mentioned embodiment, and the content of the processing shownin FIG. 29-FIG. 31 are merely examples, and various other configurationscan be thought of for the authentication method used by theauthentication server 2608 and the specific format of the frames sentand received on the network of the wired LAN 2607 and the like.

As was explained in detail above, in response with the connectionrequest from the wireless communication terminal where the useridentification information is registered, the access point permits thecommunications with the other wireless communication terminals or thedevice(s) connected to the network, and when the connection is requestedby the wireless communication terminal where the user identificationinformation is not registered, the other access points connected to thenetwork are inquired as to whether or not they have registered the useridentification information of the wireless communication terminal, andthen the access point for the wireless communication terminal isdesignated based on the result of the inquiry. Therefore, when thewireless communication terminal is requested to connect to a specificaccess point and its connection destination is changed, the connectioncan be made to the desired access point without making modifications inadvance on the wireless communication terminal side to the informationabout the access point to connect to. This can alleviate the burden onthe user of the wireless communication terminal.

It goes without saying that the present invention can also be achievedby providing a computer or a CPU with a software program for achievingthe functions of each of the above-mentioned embodiments and having thecomputer or the CPU read out and execute the provided program. In thiscase, the above-mentioned program can be provided directly from astorage medium storing the program, or by downloading it from anothercomputer or database or the like (which is not shown in the diagrams)which is connected to the Internet, or to a commercial network or localarea network or the like.

Furthermore, the program is sufficient if the functions of theabove-mentioned embodiments can be realized on the computer, and theform of the program may be a program executed with object code and aninterpreter, or script data provided to an OS, or the like.

Furthermore, it goes without saying that the object of the presentinvention may also be achieved by providing a computer with a storagemedium storing a software program for realizing the functions of theabove-mentioned embodiments and having the computer or the CPU read outand execute the program stored on the storage medium.

In the above-mentioned embodiments, the program is stored in the ROM2702, but the present invention is not restricted to this configurationand the storage medium providing the program may be, for example, a RAM,an NV-RAM, a hard disk, a flexible disk, an optical disk, a magnetooptical disk (MO), an MO, a CD-ROM, a CD-R, a CD-RW, a DVD-ROM, aDVD-RAM, a DVD-RW, a DVD+RW, magnetic tape, a nonvolatile memory card,other types of ROM and the like capable of recording the above-mentionedprogram.

What is claimed is:
 1. A communication apparatus, comprising: areceiving unit that receives communication parameter for connecting to afirst base station via a second base station; a connecting unit thatconnects to the first base station based on the received communicationparameter; and an authentication unit that performs authenticatedprocess with the first base station based on the received communicationparameter.
 2. The apparatus according to claim 1, wherein thecommunication parameter comprises at least one of encipher key andwireless channel.
 3. The apparatus according to claim 1, wherein theauthentication unit performs authenticated process via a temporarysession connected temporarily to the first base station, wherein theconnecting unit connects temporarily to the first base station forperforming the authenticated process, and connects to the first basestation according to a result of the authenticated process.
 4. Theapparatus according to claim 1, further comprising a sending unit thatsends at least one of a user account and password via the second basestation.
 5. The apparatus according to claim 1, further comprising asending unit that sends at least one of a user account, which input byuser, and password, which input by user, via the second base station. 6.The apparatus according to claim 1, further comprising a display unitthat displays information related to the received communicationparameter.
 7. The apparatus according to claim 1, further comprising aselecting unit that selects information related to the receivedcommunication parameter, in a case where a plurality of sets, whichcomprises the communication parameter, is received by the receivingunit.
 8. The apparatus according to claim 7, wherein the connecting unitconnects to the first base station based on the selected information. 9.The apparatus according to claim 7, further comprising a searching unitthat searches the first base station based on the selected information.10. The apparatus according to claim 1, further comprising a displayunit that displays information indicating that the first base station isnot detected.
 11. A communication method, comprising: receivingcommunication parameter for connecting to a first base station via asecond base station; connecting to the first base station based on thereceived communication parameter; and performing authenticated processwith the first base station based on the received communicationparameter.
 12. The method according to claim 11, wherein thecommunication parameter comprises at least one of encipher key andwireless channel.
 13. The method according to claim 11, wherein theauthenticated process is performed via a temporary session connectedtemporarily to the first base station, wherein the connecting includestemporarily connecting to the first base station for performing theauthenticated process, and connecting to the first base stationaccording to a result of the authenticated process.
 14. The methodaccording to claim 11, further comprising, sending at least one of auser account and password via the second base station.
 15. The methodaccording to claim 11, further comprising, sending at least one of auser account, which input by user, and password, which input by user,via the second base station.
 16. The method according to claim 11,further comprising, displaying information related to the receivedcommunication parameter.
 17. The method according to claim 11, furthercomprising, selecting information related to the received communicationparameter, in a case where a plurality of sets, which comprises thecommunication parameter, is received in the receiving.
 18. The methodaccording to claim 17, wherein the connecting includes connecting to thefirst base station based on the selected information.
 19. The methodaccording to claim 17, further comprising, searching the first basestation based on the selected information.
 20. The method according toclaim 11, further comprising, displaying information indicating that thefirst base station is not detected.
 21. A non-transitory computerreadable recording medium storing a communication program which causes acomputer to execute a method, the method comprising: receivingcommunication parameter for connecting to a first base station via asecond base station; connecting to the first base station based on thereceived communication parameter; and performing authenticated processwith the first base station based on the received communicationparameter.