摘要 |
PROBLEM TO BE SOLVED: To provide a communication authentication method for disabling illegal access even if authentication information is leaked.SOLUTION: When a terminal 1 is connected to a terminal 2 for data transmission/reception in a network including the terminals 1, 2 and a management server, the terminal 1 transmits a connection authentication request to the management server in a procedure 1. When the management server investigates validity in the connection authentication request so as to confirm the validity in the procedure 2, a connection authentication response is transmitted to the terminal 1 by attaching authentication information. The terminal 1 transmits a connection request to the terminal 2 by attaching the authentication information in the procedure 3, the terminal 2 transmits the validity confirmation request of the request from the terminal 1 to the management server by attaching the authentication information in the procedure 4. The management server investigates the validity of the request so as to transmit a connection request validity confirmation response to the terminal 2 when the request is valid in the procedure 5. The terminal 2 transmits a connection request permission response to the terminal 1 in the procedure 6. The terminal 1 and the terminal 2 mutually perform communication in the procedure 7. The management server generates a plurality of digits of a random number as the authentication information in the procedure 2 in each case, and deletes the random number immediately before the termination of the procedure 5. |