Information processing method, information processing device, program, and recording medium

ABSTRACT

An information processing method includes, by an information processing device, acquiring a snapshot of data stored in a main storage device of the information processing device in a state where an external device is not authenticated yet, after the information processing device is powered ON; performing first authentication in which the information processing device authenticates the external device after the snapshot is stored in an auxiliary storage device of the information processing device; and performing second authentication in which the information processing device is started up using the snapshot and authenticates the external device after the information processing device is powered ON again.

INCORPORATION BY REFERENCE

The disclosure of Japanese Patent Application No. 2017-115381 filed onJun. 12, 2017 including the specification, drawings and abstract isincorporated herein by reference in its entirety.

BACKGROUND 1. Technical Field

The present disclosure relates to an information processing method, aninformation processing device, a program, and a recording medium.

2. Description of Related Art

A technology known in the related art enables an image (data) of aregister of a CPU or a memory to be retained as a snapshot in anon-volatile auxiliary storage device after completion of reading and aninitialization process of an operating system (OS) and applicationprograms, and enables start-up using the image at the time of subsequentstart-up. According to the technology in the related art, an amount oftime for the initialization process and the like is not needed, and adevice can be started up at a higher speed. The technology in therelated art is referred to as snapshot start-up and the like (forexample, refer to Japanese Unexamined Patent Application Publication No.2013-004044 (JP 2013-004044 A)).

SUMMARY

It is assumed that one device needs to be authenticated by anotherdevice, and that the one device and the other device are started upagain at the same time.

In such a case, when the one device is started up again using thesnapshot start-up in the related art, and the other device is started upagain as usual by executing the initialization process and the like, theone device is in a state where authentication after the previousstart-up is completed, and the other device is in a state where the onedevice is not authenticated at the current start-up. Thus, a deviceauthentication process may not be normally performed.

The present disclosure provides a technology capable of starting up adevice at a higher speed and authenticating an external device after thestart-up.

A first aspect of the present disclosure relates to an informationprocessing method including, by an information processing device,acquiring a snapshot of data stored in a main storage device of theinformation processing device in a state where an external device is notauthenticated yet, after the information processing device is poweredON; performing first authentication in which the information processingdevice authenticates the external device after the snapshot is stored inan auxiliary storage device of the information processing device; andperforming second authentication in which the information processingdevice is started up using the snapshot and authenticates the externaldevice after the information processing device is powered ON again.

According to the first aspect of the present disclosure, the informationprocessing device is started up using the snapshot in a state where theexternal device is not authenticated yet. Thus, the device can bestarted up at a higher speed, and the external device can beauthenticated after the start-up.

In the information processing method according to the first aspect ofthe present disclosure, in the first authentication, a process ofauthenticating the external device may not be started until completionof the acquiring after the information processing device is powered ON.

According to the first aspect of the present disclosure, the snapshotwhile the external device is not authenticated can be acquired in astate where an initialization process and the like for each programother than a program authenticating the external device are completed toa certain extent.

In the information processing method according to the first aspect ofthe present disclosure, in the acquiring, the snapshot including data ofan inter-device authentication program may be acquired after completionof an initialization process for the inter-device authentication programthat authenticates the external device.

According to the first aspect of the present disclosure, theinter-device authentication program is also set as a target for start-upusing the snapshot. Thus, the process of authenticating the externaldevice can be performed at a higher speed.

The information processing method according to the first aspect of thepresent disclosure may further include performing third authenticationin which data for authenticating the external device is encrypted orcoded using a key that is generated based on data after the externaldevice is authenticated in the first authentication or the secondauthentication.

According to the first aspect of the present disclosure, byreauthenticating the external device at a predetermined timing after theexternal device is authenticated, it is possible to determine that theauthentication of the external device fails when the external device isreplaced with another device after successful authentication. Since thekey that is based on the data after the previous authentication hassucceeded is used, the authentication process can be simplified by, forexample, decreasing the length of the key. Since the authenticationperformed for the first time can succeed at snapshot start-up, theexternal device can be reauthenticated as in the first aspect using thekey that is generated based on the data after the external device hasbeen authenticated previously.

In the information processing method according to the first aspect ofthe present disclosure, in the second authentication, the externaldevice may be authenticated by preferentially reading data needed forauthenticating the external device from data included in the snapshotafter the information processing device is powered ON again. After thesecond authentication, other data included in the snapshot may be read,and a process that uses the other data may be performed.

According to the first aspect of the present disclosure, the externaldevice can be authenticated in parallel with the loading of thesnapshot. Thus, the device can be started up at a higher speed.

The information processing method according to the first aspect of thepresent disclosure may further include deleting the snapshot stored inthe auxiliary storage device when a predetermined program installed onthe information processing device is updated. In the acquiring of thesnapshot, the snapshot of the data stored in the main storage device ofthe information processing device may be acquired when the snapshot isnot stored in the auxiliary storage device after the informationprocessing device is powered ON.

According to the first aspect of the present disclosure, for example,after software is updated, the snapshot to which the update is appliedcan be acquired again.

A second aspect of the present disclosure relates to an informationprocessing device including an acquisition unit configured to acquire asnapshot of data stored in a main storage device of the informationprocessing device in a state where an external device is notauthenticated yet, after the information processing device is poweredON; a first authentication unit configured to authenticate the externaldevice after the snapshot is stored in an auxiliary storage device ofthe information processing device; and a second authentication unitconfigured to authenticate the external device using the snapshot afterthe information processing device is powered ON again.

According to the second aspect of the present disclosure, theinformation processing device is started up using the snapshot in astate where the external device is not authenticated yet. Thus, thedevice can be started up at a higher speed, and the external device canbe authenticated after the start-up.

A third aspect of the present disclosure relates to a program thatcauses an information processing device to execute a process includingacquiring a snapshot of data stored in a main storage device of theinformation processing device in a state where an external device is notauthenticated yet, after the information processing device is poweredON; performing first authentication in which the external device isauthenticated after the snapshot is stored in an auxiliary storagedevice of the information processing device; and performing secondauthentication in which the external device is authenticated using thesnapshot after the information processing device is powered ON again.

According to the third aspect of the present disclosure, the informationprocessing device is started up using the snapshot in a state where theexternal device is not authenticated yet. Thus, the device can bestarted up at a higher speed, and the external device can beauthenticated after the start-up.

A fourth aspect of the present disclosure relates to a computer-readablerecording medium on which the program according to the third aspect ofthe present disclosure is recorded.

According to the aspects of the present disclosure, the device can bestarted up at a higher speed, and the external device can beauthenticated after the start-up.

BRIEF DESCRIPTION OF THE DRAWINGS

Features, advantages, and technical and industrial significance ofexemplary embodiments of the disclosure will be described below withreference to the accompanying drawings, in which like numerals denotelike elements, and wherein:

FIG. 1 is a diagram illustrating a configuration example of aninformation processing system according to an embodiment;

FIG. 2 is a diagram illustrating a hardware configuration example of aninformation processing device according to the embodiment;

FIG. 3 is a diagram illustrating one example of a function block diagramof an information processing device according to a first embodiment;

FIG. 4 is a sequence diagram illustrating one example of a process whenan information processing system according to the first embodiment isstarted up for the first time;

FIG. 5 is a sequence diagram illustrating one example of a process whenthe information processing system according to the first embodiment isstarted up for the first time;

FIG. 6 is a sequence diagram illustrating one example of a first-timedevice authentication process of the information processing systemaccording to the embodiment;

FIG. 7 is a sequence diagram illustrating one example of a devicereauthentication process of the information processing system accordingto the embodiment;

FIG. 8 is a sequence diagram illustrating one example of a process whenthe information processing system according to the first embodiment isstarted up again;

FIG. 9 is a sequence diagram illustrating one example of a process whenthe information processing system according to the first embodiment isstarted up again;

FIG. 10 is a sequence diagram illustrating one example of a process whenan information processing system according to a second embodiment isstarted up for the first time;

FIG. 11 is a sequence diagram illustrating one example of a process whenthe information processing system according to the second embodiment isstarted up again; and

FIG. 12 is a sequence diagram illustrating one example of a process whenan information processing system according to a third embodiment isstarted up again.

DETAILED DESCRIPTION OF EMBODIMENTS

Hereinafter, embodiments of the present disclosure will be describedbased on the drawings.

System Configuration

FIG. 1 is a diagram illustrating a configuration example of aninformation processing system 1 according to an embodiment. In FIG. 1,the information processing system 1 includes information processingdevices 10-1, 10-2 (hereinafter, simply referred to as an “informationprocessing device 10” unless otherwise distinguished). The number ofinformation processing devices 10 is not limited to two. For example, aplurality of other information processing devices 10 may be connected tothe information processing device 10-1.

Hereinafter, the information processing system 1 will be illustrativelydescribed as a navigation system (car navigation system) that is mountedin a vehicle and provides traveling path guidance and the like.

For example, the information processing device 10-1 is a vehicle-mounteddevice that constitutes the navigation system, and has a function ofplaying back a digital versatile disc (DVD), a compact disc (CD),television, and radio, or connecting to a mobile phone using short-rangewireless communication.

For example, the information processing device 10-2 is a vehicle-mounteddevice that constitutes the navigation system, and has a function ofproviding traveling path guidance and the like to a destinationspecified by a user.

The information processing device 10-1 and the information processingdevice 10-2 are connected to each other through a bus 501 such asUniversal Serial Bus (USB), Ethernet (registered trademark), controllerarea network (CAN), and digital visual interface (DVI).

By configuring the navigation system with a plurality of devices, thenavigation system affects the design of the shape of the vehicle less,and the amount of development work for the entire system can berelatively reduced.

Hardware Configuration

FIG. 2 is a diagram illustrating a hardware configuration example of theinformation processing device 10 according to the embodiment. Theinformation processing device 10 in FIG. 2 includes a drive device 100,an auxiliary storage device 102, a memory device 103, a CPU 104, aninterface device 105, and the like that are connected to each otherthrough a bus B.

For example, an information processing program that implements processesin the information processing device 10 is provided through a recordingmedium 101. When the recording medium 101 on which the informationprocessing program is recorded is set in the drive device 100, theinformation processing program is installed on the auxiliary storagedevice 102 from the recording medium 101 through the drive device 100.The information processing program does not need to be installed throughmerely the recording medium 101 and may be downloaded from anothercomputer through a network. The auxiliary storage device 102 stores theinstalled information processing program and also stores needed files,data, and the like.

The memory device 103 is, for example, a random access memory (RAM).When an instruction to start up the program is provided, the memorydevice 103 reads the program from the auxiliary storage device 102 andstores the program. The CPU 104 implements functions related to theinformation processing device 10 in accordance with the program storedin the memory device 103. The interface device 105 is used as aninterface for connecting to the network.

One example of the recording medium 101 is a portable recording mediumsuch as a CD-ROM, a DVD, or a USB memory. One example of the auxiliarystorage device 102 is a hard disk drive (HDD), a flash memory, or thelike. Both of the recording medium 101 and the auxiliary storage device102 are one example of a computer-readable recording medium.

First Embodiment

Functional Configuration

A functional configuration of the information processing device 10according to a first embodiment will be described with reference to FIG.3. FIG. 3 is a diagram illustrating one example of a function blockdiagram of the information processing device 10 according to the firstembodiment. The information processing device 10 includes a start-upunit 12, an acquisition unit 13, a first-time authentication unit (oneexample of a “first authentication unit”) 14, a snapshot start-up unit15, a reauthentication unit (one example of a “second authenticationunit”) 16, an update unit 17, a communication unit 18, and an executionunit 19. Each unit represents a function implemented by a process thatone or more programs installed on the information processing device 10cause the CPU 104 of the information processing device 10 to execute.

The start-up unit 12 controls start-up and stop (shutdown) of theinformation processing device 10. The start-up unit 12 starts up theinformation processing device 10 without using a snapshot after theinformation processing device 10 is powered ON. The start-up unit 12stops the information processing device 10 after the informationprocessing device 10 is powered OFF.

After the information processing device 10 is powered ON, theacquisition unit 13 acquires a snapshot of data stored in a register ofthe CPU 104, the memory device 103, and the like that are main storagedevices of the information processing device 10, in a state whereanother information processing device 10 (one example of an “externaldevice”) is not authenticated yet. The acquisition unit 13 stores theacquired snapshot in snapshot data 112 of the storage unit 11.

When the information processing device 10 is started up for the firsttime, the first-time authentication unit 14 authenticates the otherinformation processing device 10 after the snapshot acquired by theacquisition unit 13 is stored in the storage unit 11. When theinformation processing device 10 is started up again, the first-timeauthentication unit 14 authenticates the other information processingdevice 10 using the snapshot data 112 stored in the storage unit 11. Thefirst-time authentication unit 14 is implemented by an inter-deviceauthentication program that is a predetermined program installed on theinformation processing device 10.

The snapshot start-up unit 15 starts up the information processingdevice 10 using the snapshot data 112 stored in the storage unit 11. Thesnapshot start-up unit 15 is implemented by a high-speed start-upprogram that is a predetermined program installed on the informationprocessing device 10.

The reauthentication unit 16 performs encryption or coding using asession key that is generated based on session data 113, andauthenticates the other information processing device 10. The sessiondata 113 is data after the previous authentication of the otherinformation processing device 10.

The update unit 17 deletes the snapshot data 112 stored in the storageunit 11 when the predetermined programs installed on the informationprocessing device 10 are updated. The communication unit 18 communicateswith the other information processing device 10, an external server, andthe like.

The execution unit 19 executes the predetermined application programsand the like installed on the information processing device 10.

The information processing device 10 includes the storage unit 11. Thestorage unit 11 is implemented using the auxiliary storage device 102and the like. The storage unit 11 stores key data 111, the snapshot data112, the session data 113, and the like.

Process

When Started Up for First Time (Merely One Retains Snapshot)

A process when the information processing system 1 according to thefirst embodiment is started up for the first time will be described withreference to FIG. 4. FIG. 4 is a sequence diagram illustrating oneexample of a process when the information processing system 1 accordingto the first embodiment is started up for the first time. For example,the following process is executed after the information processingsystem 1 is powered ON for the first time, and after the informationprocessing system 1 is started up for the first time after the programsof the information processing device 10 are updated by version updateand the like.

In the following description, for example, the information processingdevice 10-1 retains the snapshot, and the information processing device10-2 is started up as usual.

In step S1-1 and step S1-2, the information processing device 10-1 andthe information processing device 10-2 are powered ON.

The start-up unit 12 of each of the information processing device 10-1and the information processing device 10-2 loads (reads), initializes,and executes an operating system (OS) (step S2-1 and step S2-2). The OSmay be loaded by a bootloader and the like of the CPU 104.

The start-up unit 12 of each of the information processing device 10-1and the information processing device 10-2 loads and initializes theinter-device authentication program (step S3-1 and step S3-2).

The start-up unit 12 of the information processing device 10-1 loads andinitializes each of the other application programs in the informationprocessing device 10-1 (step S4).

The acquisition unit 13 of the information processing device 10-1acquires the snapshot and retains the snapshot in the snapshot data 112of the storage unit 11 (step S5). For example, the informationprocessing device 10-1 determines whether or not the snapshot hasalready been retained using the high-speed start-up program. When thesnapshot is not retained, the information processing device 10-1determines that the information processing device 10-1 is started up forthe first time, and retains an image of the register of the CPU 104 orthe memory device 103 as a snapshot in the non-volatile auxiliarystorage device 102. Accordingly, the image retained as a snapshot can beread after a device such as a vehicle-mounted device that is completelystopped from being supplied with electric power after power-OFF in orderto minimize non-operational electric power consumption is started upagain.

The first-time authentication unit 14 of each of the informationprocessing device 10-1 and the information processing device 10-2executes the inter-device authentication program and performs afirst-time device authentication process (step S6-1 and step S6-2). Theinformation processing device 10-1 and the information processing device10-2 authenticate each other. Merely one of the information processingdevice 10-1 and the information processing device 10-2 may authenticatethe other. Accordingly, connection error or invalid connection betweendevices can be suppressed.

The first-time authentication unit 14 of the information processingdevice 10-1 does not perform the authentication process for theinformation processing device 10-2 using the inter-device authenticationprogram while the process of retaining the snapshot in step S5 is beingcompleted. Accordingly, data generated in the middle of theauthentication process and data after the completion of theauthentication process are securely excluded from the snapshot in astate (timing) where the initialization process for each of the otherapplication programs is completed to a certain extent.

The execution unit 19 of the information processing device 10-1 executeseach of the other application programs in the information processingdevice 10-1 (step S7).

The start-up unit 12 of the information processing device 10-2 loads,initializes, and executes each of the other application programs in theinformation processing device 10-2 (step S8).

The process of step S7 in the information processing device 10-1 isperformed in parallel with the process of step S8 in the informationprocessing device 10-2. By the processes of step S7 and step S8, theinformation processing device 10-1 and the information processing device10-2 execute processes of playing back music, providing path guidance,and the like in response to an operation and the like of the user.

The reauthentication unit 16 of each of the information processingdevice 10-1 and the information processing device 10-2 executes theinter-device authentication program and performs a devicereauthentication process (step S9-1 and step S9-2). For example, thereauthentication unit 16 of each of the information processing device10-1 and the information processing device 10-2 repeats the devicereauthentication process until power-OFF at periodic timings or a timingat which plugging of a cable for connecting to the other informationprocessing device is detected. Accordingly, when a device issuccessfully authenticated and then, is replaced with another device,the replacement device can be authenticated.

For example, the start-up unit 12 of each of the information processingdevice 10-1 and the information processing device 10-2 stops processesperformed by the execution unit 19 and the like, and powers theinformation processing device 10-1 and the information processing device10-2 OFF in response to a power-OFF operation in the vehicle (step S10-1and step S10-2).

When Started Up for First Time (Each Retains Snapshot)

A process when the information processing system 1 according to thefirst embodiment is started up for the first time will be described withreference to FIG. 5. FIG. 5 is a sequence diagram illustrating oneexample of a process when the information processing system 1 accordingto the first embodiment is started up for the first time.

In the following description, for example, each of the informationprocessing device 10-1 and the information processing device 10-2retains the snapshot.

In such a case, the process procedure of the information processingdevice 10-2 is the same as the process procedure of the informationprocessing device 10-1 illustrated in FIG. 4. That is, the processes ofstep S4-1, step S5-1, and step S7-1 in the information processing device10-1 and the processes of step S4-2, step S5-2, and step S7-2 in theinformation processing device 10-2 are the same as the processes of stepS4, step S5, and step S7 illustrated in FIG. 4.

First-Time Device Authentication Process

The first-time device authentication process of the first-timeauthentication unit 14 in step S6-1 and step S6-2 in FIG. 4 and FIG. 5will be described with reference to FIG. 6. FIG. 6 is a sequence diagramillustrating one example of the first-time device authentication processof the information processing system 1 according to the embodiment.

In the following description, the information processing device 10-1authenticates the information processing device 10-2. When theinformation processing device 10-1 and the information processing device10-2 authenticate each other, the following process is performed foreach of the information processing device 10-1 and the informationprocessing device 10-2.

In step S101, the first-time authentication unit 14 of the informationprocessing device 10-1 generates a random value.

The first-time authentication unit 14 of the information processingdevice 10-1 transmits the generated random value and an ID (number) of acommon key to the information processing device 10-2 (step S102). Eachof the random value and the ID of the common key has a different valueeach time the first-time device authentication process is performed.

The first-time authentication unit 14 of the information processingdevice 10-2 references the key data 111 and generates a ciphertext byencrypting the received random value using the common key correspondingto the received ID of the common key (step S103). Data of the common keyis stored in advance in the key data 111 in association with the ID.

The first-time authentication unit 14 of the information processingdevice 10-2 generates a session key using the session data 113 that ispredetermined data in the first-time device authentication process, andretains the session key (step S104).

The first-time authentication unit 14 of the information processingdevice 10-2 transmits the generated ciphertext and the session key tothe information processing device 10-1 (step S105). For example, thefirst-time authentication unit 14 of the information processing device10-2 transmits the session key after encrypting the session key usingthe common key corresponding to the received ID of the common key.

The first-time authentication unit 14 of the information processingdevice 10-1 decrypts the received ciphertext using the common keycorresponding to the ID of the common key transmitted in step S102 (stepS106).

The first-time authentication unit 14 of the information processingdevice 10-1 determines whether or not the random value included in thedecrypted ciphertext matches the random value transmitted in step S102(step S107). When the random values match, the first-time authenticationunit 14 of the information processing device 10-1 determines that thedevice authentication succeeds. When the random values do not match, thefirst-time authentication unit 14 of the information processing device10-1 determines that the device authentication fails, and causes thecommunication unit 18 of the information processing device 10-1 todisconnect the communication with the information processing device10-2.

The first-time authentication unit 14 of the information processingdevice 10-1 decrypts and retains the session key (step S108).

Device Reauthentication Process

The device reauthentication process of the reauthentication unit 16 instep S9-1 and step S9-2 in FIG. 4 and FIG. 5 will be described withreference to FIG. 7. FIG. 7 is a sequence diagram illustrating oneexample of the device reauthentication process of the informationprocessing system 1 according to the embodiment.

In the following description, the information processing device 10-1authenticates the information processing device 10-2. When theinformation processing device 10-1 and the information processing device10-2 authenticate each other, the following process is performed foreach of the information processing device 10-1 and the informationprocessing device 10-2.

In step S201, the reauthentication unit 16 of the information processingdevice 10-1 generates a random value.

The reauthentication unit 16 of the information processing device 10-1transmits the generated random value to the information processingdevice 10-2 (step S202).

The reauthentication unit 16 of the information processing device 10-2generates a ciphertext by encrypting the received random value using thesession key (step S203).

The reauthentication unit 16 of the information processing device 10-2transmits the ciphertext including the encrypted random value to theinformation processing device 10-1 (step S204).

The reauthentication unit 16 of the information processing device 10-1decrypts the received ciphertext using the session key (step S205).

The reauthentication unit 16 of the information processing device 10-1determines whether or not the random value included in the decryptedciphertext matches the random value transmitted in step S202 (stepS206). When the random values match, the reauthentication unit 16 of theinformation processing device 10-1 determines that the deviceauthentication succeeds. When the random values do not match, thereauthentication unit 16 of the information processing device 10-1determines that the device authentication fails, and causes thecommunication unit 18 of the information processing device 10-1 todisconnect the communication with the information processing device10-2.

As described thus far, in the device reauthentication process,authentication is performed using the session key that is a key, forexample, having a relatively short length and is generated using datawhen the previous device authentication has succeeded. Thus, the deviceauthentication process can be performed at a higher speed than thefirst-time device authentication process.

The first-time device authentication process and the devicereauthentication process may use a well-known device authenticationmethod such as a public key instead of using the common key.

When Started Up Again (Merely One is Started Up Using Snapshot)

A process when the information processing system 1 according to thefirst embodiment is started up again will be described with reference toFIG. 8. FIG. 8 is a sequence diagram illustrating one example of aprocess when the information processing system 1 according to the firstembodiment is started up again.

In the following description, for example, the information processingdevice 10-1 is started up using the snapshot, and the informationprocessing device 10-2 is started up as usual.

In step S20-1 and step S20-2, the information processing device 10-1 andthe information processing device 10-2 are powered ON.

The snapshot start-up unit 15 of the information processing device 10-1loads and executes the high-speed start-up program for start-up usingthe snapshot (step S21). For example, the high-speed start-up program isexecuted in a basic input-output system (BIOS) of the informationprocessing device 10-1.

The snapshot start-up unit 15 of the information processing device 10-1loads the snapshot data 112 retained in step S5 in FIG. 4 using thehigh-speed start-up program (step S22). For example, the informationprocessing device 10-1 determines whether or not the snapshot data 112has already been retained using the high-speed start-up program. Whenthe snapshot data 112 has been retained, the information processingdevice 10-1 determines that the information processing device 10-1 isstarted up again, and loads the snapshot.

The start-up unit 12 of the information processing device 10-2 loads(reads), initializes, and executes the OS (step S23).

The start-up unit 12 of the information processing device 10-2 loads andinitializes the inter-device authentication program (step S24).

The processes of step S21 and step S22 in the information processingdevice 10-1 are performed in parallel with the processes of step S23 andstep S24 in the information processing device 10-2.

The snapshot start-up unit 15 of the information processing device 10-1executes the first-time device authentication process in step S25-1 inparallel with the process of executing each of the other applicationprograms in step S26. When the information processing device 10-1 isstarted up again, the snapshot start-up unit 15 of the informationprocessing device 10-1 may set the priority of a task of theinter-device authentication program to be higher than the priority of atask of each of the other application programs in the OS. Accordingly,the first-time device authentication process is executed preferentiallyover the initialization process for each of the other applicationprograms that is executed after the snapshot is retained by theacquisition unit 13. Thus, when it takes a relatively long amount oftime to complete the first-time device authentication process, theamount of time for completing the start-up of the entire informationprocessing system 1 can be reduced.

The subsequent processes of steps S25-1 and S25-2 to steps S29-1 andS29-2 are the same as the processes of steps S6-1 and S6-2 to stepsS10-1 and S10-2 in FIG. 4.

When Started Up Again (Each is Started Up Using Snapshot)

A process when the information processing system 1 according to thefirst embodiment is started up again will be described with reference toFIG. 9. FIG. 9 is a sequence diagram illustrating one example of aprocess when the information processing system 1 according to the firstembodiment is started up again.

In the following description, for example, each of the informationprocessing device 10-1 and the information processing device 10-2 isstarted up using the snapshot.

In such a case, the process procedure of each of the informationprocessing device 10-1 and the information processing device 10-2 is thesame as the process procedure of the information processing device 10-1illustrated in FIG. 8. That is, the processes of step S500-1 to stepS506-1 in the information processing device 10-1 and step S500-2 to stepS506-2 in the information processing device 10-2 are the same as theprocesses of step S20-1, step S21, step S22, step S25-1, step S26, stepS28-1, and step S29-1 illustrated in FIG. 8.

According to the first embodiment, for example, the first embodimentdoes not need a separate dedicated chip that is needed when data relatedto the device authentication process is excluded from a snapshot targetby performing the device authentication process using a separatededicated chip. The image after the initialization process for theinter-device authentication program is completed can be included in thesnapshot. Thus, the device authentication process can be performed at ahigher speed.

Second Embodiment

In the first embodiment, for example, the image after the inter-deviceauthentication program is loaded and initialized is retained in thesnapshot.

In a second embodiment, for example, the image related to theinter-device authentication program is not included in the snapshot. Thesecond embodiment is substantially the same as the first embodiment andthus, will not be fully described. In the following description, commonparts in the first embodiment will not be described, and merelydifferent parts will be described. According to the second embodiment,for example, the same effect as the first embodiment is achieved whenthe process of loading or initializing the inter-device authenticationprogram is performed at a sufficiently high speed.

Process

When Started Up for First Time (Snapshot is Retained)

A process when the information processing system 1 according to thesecond embodiment is started up for the first time will be describedwith reference to FIG. 10. FIG. 10 is a sequence diagram illustratingone example of a process when the information processing system 1according to the second embodiment is started up for the first time.

The processes of steps S30-1 and S30-2 to steps S31-1 and S31-2corresponding to power-ON to the execution of the OS are the same as theprocesses of steps S1-1 and S1-2 to steps S2-1 and S2-2 in FIG. 4.

The start-up unit 12 of each of the information processing device 10-1and the information processing device 10-2 loads and initializes each ofthe other application programs in the information processing device 10-1and the information processing device 10-2 (step S32-1 and step S32-2).

The acquisition unit 13 of each of the information processing device10-1 and the information processing device 10-2 retains the snapshot(step S33-1 and step S33-2).

The start-up unit 12 of the information processing device 10-1 loads andinitializes the inter-device authentication program (step S34-1).

The start-up unit 12 of the information processing device 10-2 loads andinitializes the inter-device authentication program (step S34-2).

The subsequent processes of steps S36-1 and S36-2 to steps S40-1 andS40-2 are the same as the processes of steps S6-1 and S6-2 to stepsS10-1 and S10-2 in FIG. 4.

When Started Up Again (Started Up Using Snapshot)

A process when the information processing system 1 according to thesecond embodiment is started up again will be described with referenceto FIG. 11. FIG. 11 is a sequence diagram illustrating one example of aprocess when the information processing system 1 according to the secondembodiment is started up again.

The processes of steps S50-1 and S50-2 to step S52 corresponding topower-ON to the loading of the snapshot are the same as the processes ofsteps S20-1 and S20-2 to step S22 in FIG. 8.

The start-up unit 12 of the information processing device 10-1 loads andinitializes the inter-device authentication program (step S53).

The subsequent processes of step S54 to steps S60-1 and S60-2 are thesame as the processes of step S23 to steps S29-1 and S29-2 in FIG. 8.

Third Embodiment

In the first embodiment, for example, the first-time deviceauthentication process is executed after the loading of the snapshot iscompleted.

In a third embodiment, for example, the first-time device authenticationprocess is executed at a timing when the loading of the image related tothe inter-device authentication program is completed while the snapshotis being loaded. The third embodiment is substantially the same as thefirst embodiment and thus, will not be fully described. In the followingdescription, common parts in the first embodiment will not be described,and merely different parts will be described.

According to the third embodiment, for example, the process of loadingthe image related to each of the other application programs in thesnapshot can be executed in parallel with the first-time deviceauthentication process for the other information processing device 10.The amount of waiting time until the start of the first-time deviceauthentication process from power-ON in the other information processingdevice 10 is reduced. Thus, the other information processing device 10can be started up at a higher speed.

Process

When Started Up Again (Started Up Using Snapshot)

A process when the information processing system 1 according to thethird embodiment is started up again will be described with reference toFIG. 12. FIG. 12 is a sequence diagram illustrating one example of aprocess when the information processing system 1 according to the thirdembodiment is started up again.

The processes of steps S70-1 and S70-2 to step S71 corresponding topower-ON to the execution of the high-speed start-up program are thesame as the processes of steps S20-1 and S20-2 to step S21 in FIG. 8.

The snapshot start-up unit 15 of the information processing device 10-1preferentially loads the image related to the OS and the inter-deviceauthentication program in the snapshot retained in step S5 in FIG. 4using the high-speed start-up program (step S72). For example, theacquisition unit 13 may separately store snapshot data 112A and snapshotdata 112B in advance in the storage unit 11. The snapshot data 112A isthe image related to the OS and the inter-device authentication program.The snapshot data 112B is the image related to each of the otherapplication programs. The snapshot start-up unit 15 may first read thesnapshot data 112A, execute the inter-device authentication program, andexecute the first-time device authentication process for the informationprocessing device 10-2.

The subsequent processes of step S73 to steps S75-1 and S75-2 are thesame as the processes of step S23 to steps S25-1 and S25-2 in FIG. 8.

The snapshot start-up unit 15 of the information processing device 10-1loads the image related to each of the other application programs in thesnapshot retained in step S5 in FIG. 4 using the high-speed start-upprogram (step S76). The snapshot start-up unit 15 of the informationprocessing device 10-1 may execute the first-time device authenticationprocess in step S75-1 in parallel with the process of loading the imagerelated to each of the other application programs in step S76.Accordingly, the amount of time until the completion of start-up whenthe information processing device 10 is started up again is furtherreduced.

The subsequent processes of step S77 to steps S80-1 and S80-2 are thesame as the processes of step S26 to steps S29-1 and S29-2 in FIG. 8.

While embodiments of the present disclosure are described in detail thusfar, the present disclosure is not limited to such specific embodiments.Various modifications or changes can be carried out within the nature ofthe present disclosure disclosed in the claims.

For example, each functional unit of the information processing device10 may be implemented by cloud computing configured with one or morecomputers.

What is claimed is:
 1. An information processing method for use with aninformation processing device connected to at least one external device,the information processing method comprising: powering ON theinformation processing device; acquiring, from the informationprocessing device, a snapshot of data stored in a main memory of theinformation processing device in a state where the at least one externaldevice is not authenticated, after the information processing device ispowered ON; storing the snapshot of data in an auxiliary memory of theinformation processing device; performing a first authentication of theat least one external device in which the information processing deviceauthenticates the external device after the snapshot of data is storedin the auxiliary memory; re-starting the information processing devicebased on the snapshot of data stored in the auxiliary memory; andperforming a second authentication of the at least one external devicein which the information processing device re-authenticates the at leastone external device again after the information processing device isre-started based on the snapshot of data.
 2. The information processingmethod according to claim 1, wherein a process of the firstauthentication of the external device is not started until the snapshotof data is completely acquired from the information processing device.3. The information processing method according to claim 1, wherein thesnapshot of data includes data of an inter-device authentication programfor authenticating the external device, and the snapshot of data, whichincludes the inter-device authentication program, is acquired only aftercompletion of an initialization process for the inter-deviceauthentication program.
 4. The information processing method accordingto claim 1, further comprising: performing a third authentication of theat least one external device in which data for authenticating theexternal device is encrypted or coded using a key that is generatedbased on data after the external device is authenticated in the firstauthentication or the second authentication.
 5. The informationprocessing method according to claim 1, wherein: in the secondauthentication, the external device is authenticated by first readingdata required for authenticating the external device from data includedin the snapshot of data after the information processing device ispowered ON again; and after the second authentication, other dataincluded in the snapshot of data is read, and a process that uses theother data is performed.
 6. The information processing method accordingto claim 1, further comprising: deleting the snapshot stored in theauxiliary storage device when a predetermined program installed on theinformation processing device is updated, wherein in the acquiring ofthe snapshot of data, the snapshot stored in the main storage device ofthe information processing device is acquired in a case when thesnapshot is not stored in the auxiliary storage device after theinformation processing device is powered ON.
 7. An informationprocessing device connected to at least one external device, theinformation processing device comprising: a processor programmed to:power ON the information processing device; acquire, from theinformation processing device, a snapshot of data stored in a mainmemory of the information processing device in a state where the atleast one external device is not authenticated, after the informationprocessing device is powered ON; store the snapshot of data in anauxiliary memory of the information processing device; perform a firstauthentication of the at least one external device in which theinformation processing device authenticates the external device afterthe snapshot of data is stored in the auxiliary memory; re-start theinformation processing device based on the snapshot of data stored inthe auxiliary memory; and perform a second authentication of the atleast one external device in which the information processing devicere-authenticates the at least one external device again after theinformation processing device is re-started based on the snapshot ofdata.
 8. A non-transitory computer readable medium storing a program foruse with an information processing device having a processor and beingconnected to at least one external device, the program causing theinformation processing device to execute a process comprising: poweringON the information processing device; acquiring, from the informationprocessing device, a snapshot of data stored in a main memory of theinformation processing device in a state where the at least one externaldevice is not authenticated, after the information processing device ispowered ON; storing the snapshot of data in an auxiliary memory of theinformation processing device; performing a first authentication of theat least one external device in which the information processing deviceauthenticates the external device after the snapshot of data is storedin the auxiliary memory; re-starting the information processing devicebased on the snapshot of data stored in the auxiliary memory; andperforming a second authentication of the at least one external devicein which the information processing device re-authenticates the at leastone external device again after the information processing device isre-started based on the snapshot of data.