TWI425793B - Dynamic Adjustment of Operational Function of Network Gateway System and Its Adjustment Method - Google Patents

Dynamic Adjustment of Operational Function of Network Gateway System and Its Adjustment Method Download PDF

Info

Publication number
TWI425793B
TWI425793B TW99142199A TW99142199A TWI425793B TW I425793 B TWI425793 B TW I425793B TW 99142199 A TW99142199 A TW 99142199A TW 99142199 A TW99142199 A TW 99142199A TW I425793 B TWI425793 B TW I425793B
Authority
TW
Taiwan
Prior art keywords
module
data
network gateway
identification
computing module
Prior art date
Application number
TW99142199A
Other languages
Chinese (zh)
Other versions
TW201225592A (en
Original Assignee
Univ Shu Te
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Shu Te filed Critical Univ Shu Te
Priority to TW99142199A priority Critical patent/TWI425793B/en
Publication of TW201225592A publication Critical patent/TW201225592A/en
Application granted granted Critical
Publication of TWI425793B publication Critical patent/TWI425793B/en

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

動態調整運作功能的網路閘道系統及其調整方法Network gateway system for dynamically adjusting operation function and adjustment method thereof

本發明係有關於一種網路閘道系統,特別是有關於一種配合安全存取模組以動態調整運作功能的網路閘道系統及其調整方法。The present invention relates to a network gateway system, and more particularly to a network gateway system that cooperates with a security access module to dynamically adjust operational functions and an adjustment method thereof.

先前技術中,網路閘道器主要建立於兩個網路之間,用以轉換兩網路的資料封包類型與格式,以使兩網路上的網路設備進行網路鏈結。In the prior art, the network gateway is mainly built between two networks to convert the data packet type and format of the two networks, so that the network devices on the two networks are network-linked.

然而,不同的網路鏈結環境需要不同功能的網路閘道器,若是網路鏈結環境的環境條件有所更動,即需更換新的網路閘道器以符合環境條件需求。其次,網路閘道器於製造出廠後,其功能多為固定,市面上的網路閘道器雖帶有更新韌體能力以提升網路閘道器的工作效能,但存在韌體更新失敗導致網路閘道器損壞的風險。而且韌體更新後,多為提升網路閘道器在原網路鏈結環境的執行工作效能,而非增加網路閘道器在其它網路鏈結環境的運作功能,故網路閘道器的適用性亦有其限制所在。However, different network link environments require network gateways with different functions. If the environmental conditions of the network link environment are changed, a new network gateway needs to be replaced to meet the environmental requirements. Secondly, after the network gateway is manufactured, its functions are mostly fixed. The network gateway in the market has the ability to update the firmware to improve the performance of the network gateway, but the firmware update fails. Risk of damage to the network gateway. Moreover, after the firmware is updated, the performance of the network gateway in the original network link environment is improved, instead of increasing the operation function of the network gateway in other network link environments, so the network gateway The applicability also has its limitations.

本發明欲解決的問題係提供一種在不更動電路與韌體,即能提升網路閘道器運作效能並運作功能的網路閘道系統。The problem to be solved by the present invention is to provide a network gateway system that can improve the operation efficiency and operation function of the network gateway without changing the circuit and the firmware.

為解決上述問題,本發明揭露一種動態調整運作功能的網路閘道系統,係包含:一安全存取模組與一網路閘道器。安全存取模組儲存至少一附加功能資料。網路閘道器包括一組件配置模組與一運算模組,其中組件配置模組用以供配置或移除安全存取模組,運算模組電性耦接該組件配置模組。當安全存取模組配置於組件配置模組時,運算模組會鏈結安全存取模組,並於鏈結成功時執行附加功能資料。To solve the above problems, the present invention discloses a network gateway system for dynamically adjusting an operation function, comprising: a security access module and a network gateway. The secure access module stores at least one additional functional material. The network gateway includes a component configuration module and a computing module, wherein the component configuration module is configured to configure or remove the security access module, and the computing module is electrically coupled to the component configuration module. When the security access module is configured in the component configuration module, the computing module links the secure access module and performs additional functional data when the link is successful.

為解決上述問題,本發明揭露一種網路閘道器之動態調整運作功能方法,適用的網路閘道器包括相互電性耦接之一組件配置模組與一運算模組。方法包括:配置一安全存取模組於組件配置模組;利用運算模組透過組件配置模組以鏈結安全存取模組;以及根據鏈結結果以決定是否執行安全存取模組之一附加功能資料。In order to solve the above problems, the present invention discloses a dynamic adjustment operation function method of a network gateway device. The applicable network gateway device includes a component configuration module and an operation module electrically coupled to each other. The method comprises: configuring a secure access module in the component configuration module; using the computing module to link the secure access module through the component configuration module; and determining whether to execute the secure access module according to the link result Additional function data.

本發明之特點係在於:(1)網路閘道器不需更動任何驅動程式或韌體,即可附加與使用新的功能組件,故不存在更新程式或韌體的風險。(2)在不同的使用場合,使用者僅需配置對應功能的安全存取模組於網路閘道器,網路閘道器即能驅動安全存取模組包括的功能組件或程式,以因應不同的工作需求。(3)當安全存取模組損壞,或是附加功能資料為不正常的資料時,使用者僅需更換新的安全存取模組,並不會損害網路閘道器的運作。(4)本發明所揭露之系統可結合權限管理,在不同單位的網路閘道器安置不同的安全存取模組,使得網路閘道器僅能運作對應單位的程式或組件。(5)可預先將識別消費者金融卡、信用卡的身份確認機制建制於安全存取模組中,網路閘道器在配置安全存取模組時,可執行身份確認機制以簡化電子交易行為(網路交易、電子付費、物品租借…等)的身份認證作業,且能減少資料傳輸次數以加速電子交易行為。The invention is characterized in that: (1) the network gateway can add and use new functional components without any driver or firmware, so there is no risk of updating the program or firmware. (2) In different use cases, the user only needs to configure the corresponding function security access module to the network gateway, and the network gateway can drive the functional components or programs included in the security access module to Respond to different job needs. (3) When the security access module is damaged or the additional function data is abnormal, the user only needs to replace the new security access module without damaging the operation of the network gateway. (4) The system disclosed in the present invention can be combined with rights management to install different security access modules in network gateways of different units, so that the network gateway can only operate programs or components of corresponding units. (5) The identity verification mechanism for identifying the consumer financial card and the credit card may be pre-established in the secure access module, and the network gateway may perform an identity confirmation mechanism to simplify the electronic transaction behavior when configuring the secure access module. (Internet transactions, electronic payments, item rentals, etc.) identity authentication operations, and can reduce the number of data transmissions to accelerate electronic trading behavior.

茲配合圖式將本發明較佳實施例詳細說明如下。DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The preferred embodiments of the present invention will be described in detail below with reference to the drawings.

首先請參照圖1繪示本發明網路閘道系統實施例之第一種系統架構示意圖。本實施例中,網路閘道系統包括一安全存取模組20與一網路閘道器10,安全存取模組20內儲有一附加功能資料21,網路閘道器10更包括一組件配置模組11與一運算模組12。First, please refer to FIG. 1 , which is a schematic diagram of a first system architecture of an embodiment of a network gateway system according to the present invention. In this embodiment, the network gateway system includes a security access module 20 and a network gateway device 10. The security access module 20 stores an additional function data 21, and the network gateway device 10 further includes a The component configuration module 11 and a computing module 12.

組件配置模組11用以供配置或移除安全存取模組20,組件配置模組11與安全存取模組20為相對應結構的組件,舉例而言,安全存取模組20為一晶片卡(例:RFID資料卡、SAM資料卡)時,組件配置模組11係為晶片插座或晶片配置槽;亦或,安全存取模組20為外接式功能介面卡(Extend Function Card),組件配置模組11即為介面卡插座(插槽),但不以此為限,只要是結構相互對應者即可。The component configuration module 11 is configured to configure or remove the security access module 20, and the component configuration module 11 and the security access module 20 are components of a corresponding structure. For example, the security access module 20 is a In the case of a chip card (for example, an RFID data card or a SAM data card), the component configuration module 11 is a chip socket or a chip configuration slot; or the security access module 20 is an external function interface card (Extend Function Card). The component configuration module 11 is an interface card socket (slot), but is not limited thereto, as long as the structures correspond to each other.

運算模組12則電性耦接至組件配置模組11,並用以判斷是否有安全存取模組20配置於組件配置模組11。當運算模組12判斷出有安全存取模組20配置於組件配置模組11時,會透過組件配置模組11以鏈結安全存取模組20,在鏈結成功時,執行安全存取模組20的附加功能資料21。網路閘道器10即能在不更動內部程式、韌體與實體元件的情形下,運行新的功能服務。The computing module 12 is electrically coupled to the component configuration module 11 and configured to determine whether the secure access module 20 is disposed in the component configuration module 11. When the computing module 12 determines that the secure access module 20 is configured in the component configuration module 11, the component security module 20 is linked through the component configuration module 11 to perform secure access when the link is successful. Additional functional data 21 of the module 20. The network gateway 10 can run new functional services without changing internal programs, firmware and physical components.

反之,若鏈結失敗時,運算模組12則運行原有的功能服務。Conversely, if the link fails, the computing module 12 runs the original functional service.

請參照圖2繪示本發明網路閘道系統實施例之第二種系統架構示意圖。本實施例中,網路閘道器10更包括一儲存模組13,其內儲有一種以上的系統功能資料131。當網路閘道器10啟動時,會讀取並執行此系統功能資料131。2 is a schematic diagram of a second system architecture of an embodiment of the network gateway system of the present invention. In this embodiment, the network gateway 10 further includes a storage module 13 in which more than one system function data 131 is stored. This system function data 131 is read and executed when the network gateway 10 is started.

然而,當安全存取模組20配置於網路閘道器10的組件配置模組11時,運算模組12會鏈結安全存取模組20,根據鏈結結果而有不同的執行模式,說明如下:However, when the security access module 20 is disposed in the component configuration module 11 of the network gateway 10, the computing module 12 links the secure access module 20, and has different execution modes according to the link result. described as follows:

(1)當運算模組12鏈結安全存取模組20失敗時,運算模組12不會讀取附加功能資料21,更甚者,運算模組12係執行網路閘道器10原有的系統功能資料131。(1) When the computing module 12 fails to link the secure access module 20, the computing module 12 does not read the additional function data 21, and moreover, the computing module 12 executes the original network gateway 10 System function data 131.

(2)當運算模組12鏈結安全存取模組20成功,且系統功能資料131與附加功能資料21為相異資料種類時,運算模組12會根據需求以執行系統功能資料131與附加功能資料21。(2) When the computing module 12 links the secure access module 20 successfully, and the system function data 131 and the additional function data 21 are different data types, the computing module 12 executes the system function data 131 and attached according to requirements. Functional data 21.

(3)當運算模組12鏈結安全存取模組20成功,且系統功能資料131與附加功能資料21為相同資料種類時,運算模組12分析系統功能資料131與附加功能資料21之資料版本,從中擇一讀取並執行。舉例:當系統功能資料131的資料版本新於附加功能資料21的資料版本時,運算模組12讀取並執行系統功能資料131。反之,當附加功能資料21之資料版本新於系統功能資料131之資料版本時,運算模組12即讀取並執行附加功能資料21。(3) When the computing module 12 links the secure access module 20 successfully, and the system function data 131 and the additional function data 21 are the same data type, the computing module 12 analyzes the system function data 131 and the additional function data 21 Version, choose one to read and execute. For example, when the data version of the system function data 131 is newer than the data version of the additional function data 21, the operation module 12 reads and executes the system function data 131. On the other hand, when the data version of the additional function data 21 is newer than the data version of the system function data 131, the arithmetic module 12 reads and executes the additional function data 21.

(4)當安全存取模組20未配置於組件配置模組11時,由運算模組12讀取並執行系統功能資料131。(4) When the secure access module 20 is not disposed in the component configuration module 11, the system function data 131 is read and executed by the computing module 12.

運算模組12鏈結安全存取模組20期間,係對安全存取模組20進行認證。認證模式有數種(但不以其為限,相關認證模式亦可),說明如下:When the computing module 12 links the secure access module 20, the secure access module 20 is authenticated. There are several types of authentication modes (but not limited to them, and related authentication modes are also available), as explained below:

(1)請參照圖3A繪示本發明網路閘道系統實施例之第一種認證模式示意圖。安全存取模組20包括附加功能資料21與識別資料22,識別資料22記錄有安全存取模組20的裝置編碼(或晶片編碼)。網路閘道器10的儲存模組13儲存有一設備識別表132,其記錄有多個裝置編碼(即可配置於網路閘道器10的安全存取模組20的裝置編碼)。在運算模組12鏈結並認證安全存取模組20期間,運算模組12會利用設備識別表132分析與匹配識別資料22,當匹配成功時,運算模組12即認定鏈結成功,以讀取並執行附加功能資料21。反之,則認定鏈結失敗。此外,設備識別表132更記錄每一識別資料22對應之一功能使用權限資料,網路閘道器10即可根據人員所屬、工作單位類別以啟動對應權限的功能服務。(1) Please refer to FIG. 3A, which is a schematic diagram of a first authentication mode of an embodiment of the network gateway system of the present invention. The secure access module 20 includes additional functional data 21 and identification data 22, and the identification data 22 records the device code (or wafer code) of the secure access module 20. The storage module 13 of the network gateway 10 stores a device identification table 132 in which a plurality of device codes (ie, device codes of the secure access module 20 of the network gateway 10) are recorded. During the operation of the computing module 12 and authentication of the secure access module 20, the computing module 12 analyzes and matches the identification data 22 by using the device identification table 132. When the matching is successful, the computing module 12 determines that the link is successful, Read and execute the additional function data 21. Otherwise, the link is determined to have failed. In addition, the device identification table 132 further records one function usage authority data corresponding to each identification data 22. The network gateway device 10 can activate the corresponding function service according to the category to which the person belongs and the work unit.

舉例(功能服務規劃):A單位包括A1地區、A2地區與A3地區,各地區分別配置網路閘道器G1、網路閘道器G2與網路閘道器G3。然而,A1地區的網路設備需要功能資料F1與功能資料F2,A2地區的網路設備需要功能資料F2與功能資料F3,A3地區的網路設備需要功能資料F3。此時,將具有功能資料F1與功能資料F2的安全存取模組20配置於網路閘道器G1,將具有功能資料F2與功能資料F3的安全存取模組20配置於網路閘道器G2,將具有功能資料F3的安全存取模組20配置於網路閘道器G3。此時,網路閘道器G1即能運行功能資料F1與功能資料F2,但不具有運行功能資料F3的能力;網路閘道器G2即能運行功能資料F2與功能資料F3,但不具有運行功能資料F1的能力;網路閘道器G3即能運行功能資料F3,但不具有運行功能資料F1與功能資料F2的能力。如此即能限制各區域的網路閘道器10所能使用的功能與使用權限。Example (Functional Service Planning): The A unit includes the A1 area, the A2 area, and the A3 area. Each area is configured with a network gateway G1, a network gateway G2, and a network gateway G3. However, the network equipment in the A1 area requires the function data F1 and the function data F2. The network equipment in the A2 area needs the function data F2 and the function data F3, and the network equipment in the A3 area needs the function data F3. At this time, the secure access module 20 having the function data F1 and the function data F2 is disposed in the network gateway G1, and the secure access module 20 having the function data F2 and the function data F3 is disposed in the network gateway. The device G2 configures the secure access module 20 having the function data F3 in the network gateway G3. At this time, the network gateway G1 can run the function data F1 and the function data F2, but does not have the ability to run the function data F3; the network gateway G2 can run the function data F2 and the function data F3, but does not have The ability to run the function data F1; the network gateway G3 can run the function data F3, but does not have the ability to run the function data F1 and the function data F2. In this way, the functions and usage rights of the network gateway 10 of each area can be restricted.

又例:A單位包括A1地區、A2地區與A3地區,在各地區分別配置一門禁感應器,各門禁感應器連接至一網路閘道器10。當A單位的工作人員開放A1地區與A2地區供B單位人員自由進出時,僅需配置一安全存取模組20於網路閘道器10,安全存取模組20包括B單位的認證機制資料與附加功能資料21,當B單位人員前往A1地區或A2地區時,A1地區或A2地區的門禁感應器會感應到B單位人員的認證卡,並協同網路閘道器10以完成對認證卡的認證行為,網路閘道器10會啟動附加功能資料21以提供相關功能服務。反之,當B單位人員前往A3地區時,A3地區的感應器會感應到B單位人員的認證卡,但B單位人員不具有進入A3地區的權限,故網路閘道器10在認證時會判定不讓B單位人員進入A3地區,同時不啟動相關的附加功能資料21。For example, the A unit includes the A1 area, the A2 area, and the A3 area. Each of the areas is provided with an access sensor, and each access sensor is connected to a network gateway 10. When the staff of the A unit opens the A1 area and the A2 area for the B unit personnel to enter and exit freely, only one security access module 20 needs to be configured in the network gateway 10, and the security access module 20 includes the B unit authentication mechanism. Data and additional function data 21, when the B unit personnel go to the A1 area or the A2 area, the access control sensor of the A1 area or the A2 area will sense the certification card of the B unit personnel, and cooperate with the network gateway 10 to complete the authentication. The card's authentication behavior, the network gateway 10 will initiate additional functional information 21 to provide related functional services. Conversely, when the B unit personnel travels to the A3 area, the sensor in the A3 area will sense the authentication card of the B unit personnel, but the B unit personnel do not have the authority to enter the A3 area, so the network gateway 10 will determine when authenticating. The B unit personnel are not allowed to enter the A3 area, and the related additional function data 21 is not activated.

更甚者,網路閘道器10係鏈結後端之一伺服設備30,其提供前述的設備識別表132至網路閘道器10。Moreover, the network gateway 10 is one of the servo devices 30 at the rear end of the chain, which provides the aforementioned device identification table 132 to the network gateway 10.

(2)請參照圖3B繪示本發明網路閘道系統實施例之第二種認證模式示意圖。本實施例中,安全存取模組20包括一辨識碼產生模組23,而運算模組12包括一識別邏輯資料133。當運算模組12認證安全存取模組20時,會執行辨識碼產生模組23以取得一辨識資料,並利用識別邏輯資料133分析辨識資料,以決定是否執行附加功能資料21。(2) Please refer to FIG. 3B, which is a schematic diagram of a second authentication mode of the embodiment of the network gateway system of the present invention. In this embodiment, the security access module 20 includes an identification code generation module 23, and the operation module 12 includes an identification logic 133. When the computing module 12 authenticates the secure access module 20, the identification code generating module 23 is executed to obtain an identification data, and the identification data is analyzed by the identification logic data 133 to determine whether to execute the additional functional data 21.

舉例(金鑰認證機制):網路閘道器10包括一認證金鑰資料,其驅動安全存取模組20之同時提供認證金鑰資料給辨識碼產生模組23。辨識碼產生模組23會產生對應金鑰的回應碼,運算模組12利用識別邏輯資料133分析此回應碼,判斷所鏈結的安全存取模組20是否可為網路閘道器10使用。當運算模組12判斷所鏈結的安全存取模組20是正確且能使用時,即啟用安全存取模組20包括的附加功能資料21;反之,則運算模組12判斷所鏈結的安全存取模組20為不正確,且不能為網路閘道器10所使用,即不啟用安全存取模組20包括的附加功能資料21。Example (Key Authentication Mechanism): The network gateway 10 includes a certificate key data that drives the secure access module 20 while providing authentication key data to the identification code generation module 23. The ID generation module 23 generates a response code corresponding to the key, and the operation module 12 analyzes the response code by using the identification logic 133 to determine whether the linked security access module 20 can be used by the network gateway 10. . When the computing module 12 determines that the linked secure access module 20 is correct and can be used, the additional functional data 21 included in the secure access module 20 is enabled; otherwise, the computing module 12 determines the linked The secure access module 20 is incorrect and cannot be used by the network gateway 10, i.e., the additional functional data 21 included in the secure access module 20 is not enabled.

更甚者,網路閘道器10係鏈結後端之一伺服設備30,其提供前述的識別邏輯資料133(或更進一步包括認證金鑰資料)至網路閘道器10。Moreover, the network gateway 10 is a servo device 30 at the back end of the chain that provides the aforementioned identification logic 133 (or further including authentication key data) to the network gateway 10.

當運算模組12分析辨識資料後,會將一分析結果傳輸至伺服設備30,伺服設備30會分析此分析結果以傳輸對應辨識資料的功能使用權限資料至運算模組12,令運算模組12根據功能使用權限資料判定是否執行附加功能資料21。After the computing module 12 analyzes the identification data, an analysis result is transmitted to the servo device 30, and the servo device 30 analyzes the analysis result to transmit the function usage authority data corresponding to the identification data to the computing module 12, so that the computing module 12 It is determined whether or not to execute the additional function data 21 based on the function usage authority data.

更甚者,功能使用權限資料記錄有啟動功能權限,運算模組12根據功能使用權限資料以執行附加功能資料21的局部功能單元,其對應前述辨識資料的權限,即網路閘道器10可使用附加功能資料21的權限。Moreover, the function usage permission data record has the activation function permission, and the operation module 12 executes the permission function data according to the function to execute the partial function unit of the additional function data 21, which corresponds to the authority of the identification data, that is, the network gateway 10 can Use the permission of the additional function data 21.

(3)請參照圖3C繪示本發明網路閘道系統實施例之第三種認證模式示意圖。本實施例與圖3A與圖3B所述認證模式相異,不同處在於,安全存取模組20更包括一裝置識別模組24,網路閘道器10更包括一裝置資料134。當安全存取模組20受網路閘道器10之電力時,係執行裝置識別模組24。裝置識別模組24會識別裝置資料134,判定所安置的網路閘道器10是否符合可執行安全存取模組20的規格,以根據判定結果決定是否開放附加功能資料21以供運算模組12讀取並執行。此可避免安全存取模組20被盜用並安置於任一種網路閘道器10,避免安全存取模組20的附加功能資料21被任意使用,同時達到權限控管的目的。(3) Please refer to FIG. 3C, which is a schematic diagram of a third authentication mode of the embodiment of the network gateway system of the present invention. The embodiment is different from the authentication mode shown in FIG. 3A and FIG. 3B. The difference is that the security access module 20 further includes a device identification module 24, and the network gateway device 10 further includes a device profile 134. When the secure access module 20 is powered by the network gateway 10, the device identification module 24 is executed. The device identification module 24 identifies the device data 134, determines whether the installed network gateway 10 meets the specifications of the executable security access module 20, and determines whether to open the additional function data 21 for the operation module according to the determination result. 12 read and execute. This prevents the secure access module 20 from being stolen and placed in any of the network gateways 10, so that the additional functional data 21 of the secure access module 20 is prevented from being used arbitrarily, and at the same time, the purpose of the rights control is achieved.

此外,網路閘道器10可配置多個組件配置模組11,以供同時安置多個安全存取模組20,網路閘道器10即能同時運行多個附加功能資料21,以提供多種附加功能服務。而此等配置模式雷同單一組件配置模組11的配置模式,在此不贅述。In addition, the network gateway 10 can be configured with a plurality of component configuration modules 11 for simultaneously arranging a plurality of secure access modules 20, and the network gateway 10 can simultaneously run a plurality of additional functional data 21 to provide A variety of additional feature services. The configuration mode of the single component configuration module 11 is similar to that of the configuration mode.

請參照圖4A繪示本發明網路閘道器10實施例之動態調整運作功能方法示意圖。請同時參照圖1至圖3C以利於了解,方法說明如下:4A is a schematic diagram of a dynamic adjustment operation function of the embodiment of the network gateway 10 of the present invention. Please refer to FIG. 1 to FIG. 3C at the same time for understanding, and the method is as follows:

配置一安全存取模組20於組件配置模組11(步驟S110)。如前述,組件配置模組11與安全存取模組20為相對應結構的組件,舉例而言,安全存取模組20為一晶片卡(例:RFID資料卡、SAM資料卡)時,組件配置模組11係為晶片插座或晶片配置槽;亦或,安全存取模組20為外接式功能介面卡(Extend Function Card),組件配置模組11即為介面卡插座(插槽),但不以此為限,只要是結構相互對應者即可。A secure access module 20 is disposed in the component configuration module 11 (step S110). As described above, the component configuration module 11 and the security access module 20 are components of a corresponding structure. For example, when the security access module 20 is a chip card (eg, an RFID data card, a SAM data card), the component The configuration module 11 is a chip socket or a chip configuration slot; or the security access module 20 is an external function interface card (Extend Function Card), and the component configuration module 11 is an interface card socket (slot), but Not limited to this, as long as the structure corresponds to each other.

利用運算模組12透過組件配置模組11以鏈結安全存取模組20(步驟S120)。運算模組12係電性耦接至組件配置模組11,並用以判斷是否有安全存取模組20配置於組件配置模組11,當運算模組12判斷出有安全存取模組20配置於組件配置模組11時,會透過組件配置模組11以鏈結安全存取模組20。The computing module 12 is used to link the secure access module 20 through the component configuration module 11 (step S120). The computing module 12 is electrically coupled to the component configuration module 11 and is configured to determine whether the secure access module 20 is disposed in the component configuration module 11. When the computing module 12 determines that the secure access module 20 is configured When the module 11 is configured, the module 11 is configured to securely access the module 20 through the component configuration module 11.

根據鏈結結果以決定是否執行安全存取模組20之一附加功能資料21(步驟S130)。根據鏈結結果而有不同的執行模式,說明如下:Based on the link result, it is determined whether or not to execute the additional function material 21 of one of the secure access modules 20 (step S130). There are different execution modes depending on the link result, as explained below:

(1)當運算模組12成功鏈結安全存取模組20時,執行安全存取模組20的附加功能資料21;反之,當運算模組12鏈結安全存取模組20失敗時,運算模組12不會讀取附加功能資料21,更甚者,運算模組12係執行網路閘道器10原有的系統功能資料131。(1) when the computing module 12 successfully links the secure access module 20, the additional function data 21 of the secure access module 20 is executed; otherwise, when the computing module 12 fails to link the secure access module 20, The computing module 12 does not read the additional function data 21, and moreover, the computing module 12 executes the original system function data 131 of the network gateway 10.

(2)當運算模組12鏈結安全存取模組20成功,且系統功能資料131與附加功能資料21為相異資料種類時,運算模組12會根據需求以執行系統功能資料131與附加功能資料21。(2) When the computing module 12 links the secure access module 20 successfully, and the system function data 131 and the additional function data 21 are different data types, the computing module 12 executes the system function data 131 and attached according to requirements. Functional data 21.

(3)當運算模組12鏈結安全存取模組20成功,且系統功能資料131與附加功能資料21為相同資料種類時,由運算模組12分析系統功能資料131與附加功能資料21之資料版本,從中擇一讀取並執行。(3) When the computing module 12 links the secure access module 20 successfully, and the system function data 131 and the additional function data 21 are of the same data type, the computing module 12 analyzes the system function data 131 and the additional function data 21 The version of the data, from which one reads and executes.

請同時參照圖4B繪示本發明網路閘道器10實施例之資料版本比對示意圖。運算模組12係比對系統功能資料131與附加功能資料21之資料版本,判斷附加功能資料21之資料版本是否較新(步驟S150)。Please refer to FIG. 4B as a schematic diagram of the data version comparison of the embodiment of the network gateway 10 of the present invention. The computing module 12 compares the data versions of the system function data 131 and the additional function data 21 to determine whether the data version of the additional function data 21 is newer (step S150).

當系統功能資料131之資料版本新於附加功能資料21之資料版本時,運算模組12讀取並執行系統功能資料131(步驟S151)。When the data version of the system function data 131 is newer than the data version of the additional function data 21, the arithmetic module 12 reads and executes the system function data 131 (step S151).

反之,當附加功能資料21之資料版本新於系統功能資料131之資料版本時,運算模組12讀取並執行附加功能資料21(步驟S152)。On the other hand, when the data version of the additional function data 21 is newer than the data version of the system function data 131, the arithmetic module 12 reads and executes the additional function data 21 (step S152).

(4)當安全存取模組20未配置於組件配置模組11時,由運算模組12讀取並執行系統功能資料131。(4) When the secure access module 20 is not disposed in the component configuration module 11, the system function data 131 is read and executed by the computing module 12.

請同時參照圖4C、圖4D、圖4E與圖4F繪示本發明網路閘道器10實施例之認證示意圖。運算模組12鏈結安全存取模組20期間,係對安全存取模組20進行認證,說明如下:Please refer to FIG. 4C, FIG. 4D, FIG. 4E and FIG. 4F for the authentication diagram of the embodiment of the network gateway 10 of the present invention. During the operation of the security module 20 by the computing module 12, the security access module 20 is authenticated as follows:

利用運算模組12認證安全存取模組20(步驟S161)。認證模式有數種(但不以其為限,相關認證模式亦可),說明如下:The secure access module 20 is authenticated by the computing module 12 (step S161). There are several types of authentication modes (but not limited to them, and related authentication modes are also available), as explained below:

第一種認證方法:利用運算模組12讀取安全存取模組20之一識別資料22(步驟S171)。請同時參照圖4D與圖3A,安全存取模組20包括附加功能資料21與識別資料22,識別資料22記錄有安全存取模組20的裝置編碼(或晶片編碼)。網路閘道器10的儲存模組13儲存有一設備識別表132,其記錄有多個裝置編碼(即可配置於網路閘道器10的安全存取模組20的裝置編碼)。The first authentication method: the operation module 22 reads the identification data 22 of one of the secure access modules 20 (step S171). Referring to FIG. 4D and FIG. 3A simultaneously, the secure access module 20 includes additional functional data 21 and identification data 22, and the identification data 22 records the device code (or wafer code) of the secure access module 20. The storage module 13 of the network gateway 10 stores a device identification table 132 in which a plurality of device codes (ie, device codes of the secure access module 20 of the network gateway 10) are recorded.

由運算模組12根據設備識別表132分析識別資料22(步驟S172)。在運算模組12鏈結並認證安全存取模組20期間,運算模組12會利用設備識別表132分析與匹配識別資料22。不論分析與匹配結果為何,皆由運算模組12將分析結果記錄為認證結果(步驟S173)。The identification data 22 is analyzed by the arithmetic module 12 based on the device identification table 132 (step S172). During the operation of the computing module 12 and authentication of the secure access module 20, the computing module 12 analyzes and matches the identification data 22 using the device identification table 132. Regardless of the analysis and matching results, the calculation result is recorded by the arithmetic module 12 as the authentication result (step S173).

第二種認證方法:請同時參照圖4E與圖3B,安全存取模組20包括一辨識碼產生模組23,而運算模組12包括一識別邏輯資料133。當運算模組12認證安全存取模組20時,由運算模組12執行辨識碼產生模組23以取得一辨識資料(步驟S181)。再由運算模組12利用一識別邏輯資料133分析辨識資料(步驟S182)。最後,由運算模組12將分析結果形成認證結果(步驟S183)。The second authentication method: Referring to FIG. 4E and FIG. 3B simultaneously, the security access module 20 includes an identification code generation module 23, and the operation module 12 includes an identification logic data 133. When the computing module 12 authenticates the secure access module 20, the computing module 12 executes the identification code generating module 23 to obtain an identification data (step S181). The computing module 12 then analyzes the identification data using an identification logic 133 (step S182). Finally, the analysis result is formed by the arithmetic module 12 to form an authentication result (step S183).

舉例(金鑰認證機制):網路閘道器10包括一認證金鑰資料,其驅動安全存取模組20之同時提供認證金鑰資料給辨識碼產生模組23。辨識碼產生模組23會產生對應金鑰的回應碼,運算模組12利用識別邏輯資料133分析此回應碼,判斷所鏈結的安全存取模組20是否可為網路閘道器10使用。Example (Key Authentication Mechanism): The network gateway 10 includes a certificate key data that drives the secure access module 20 while providing authentication key data to the identification code generation module 23. The ID generation module 23 generates a response code corresponding to the key, and the operation module 12 analyzes the response code by using the identification logic 133 to determine whether the linked security access module 20 can be used by the network gateway 10. .

然而,如圖4F,當網路閘道器10鏈結後端的伺服設備30時,步驟S173更包括:由運算模組12將分析結果傳輸至伺服設備30(步驟S191)。由伺服設備30分析網路閘道器10傳輸的分析結果,以傳輸對應辨識資料之功能使用權限資料至運算模組12(步驟S192)。最後,由運算模組12將功能使用權限資料形成認證結果(步驟S193)。However, as shown in FIG. 4F, when the network gateway 10 links the servo device 30 at the back end, step S173 further includes: transmitting the analysis result to the servo device 30 by the operation module 12 (step S191). The analysis result transmitted by the network gateway 10 is analyzed by the servo device 30 to transmit the function usage authority data corresponding to the identification data to the operation module 12 (step S192). Finally, the function usage authority data is used by the computing module 12 to form an authentication result (step S193).

不論是以何種認證模式,運算模組12皆會記錄認證結果以形成鏈結結果(步驟S162)。Regardless of the authentication mode, the computing module 12 records the authentication result to form a link result (step S162).

此外,當網路閘道器10鏈結後端的伺服設備30,且運算模組12決定執行附加功能資料21時,運算模組12會根據伺服設備30傳送的功能使用權限資料以執行附加功能資料21的局部功能單元。In addition, when the network gateway 10 links the servo device 30 at the back end, and the computing module 12 decides to execute the additional function data 21, the computing module 12 performs the additional function data according to the function usage authority data transmitted by the servo device 30. 21 local functional unit.

綜上所述,乃僅記載本發明為呈現解決問題所採用的技術手段之實施方式或實施例而已,並非用來限定本發明專利實施之範圍。即凡與本發明專利申請範圍文義相符,或依本發明專利範圍所做的均等變化與修飾,皆為本發明專利範圍所涵蓋。In the above, it is merely described that the present invention is an embodiment or an embodiment of the technical means for solving the problem, and is not intended to limit the scope of implementation of the present invention. That is, the equivalent changes and modifications made in accordance with the scope of the patent application of the present invention or the scope of the invention are covered by the scope of the invention.

10...網路閘道器10. . . Network gateway

11...組件配置模組11. . . Component configuration module

12...運算模組12. . . Computing module

13...儲存模組13. . . Storage module

131...系統功能資料131. . . System function data

132...設備識別表132. . . Equipment identification table

133...識別邏輯資料133. . . Identification logic

134...裝置資料134. . . Device data

20...安全存取模組20. . . Secure access module

21...附加功能資料twenty one. . . Additional function data

22...識別資料twenty two. . . Identification data

23...辨識碼產生模組twenty three. . . Identification code generation module

24...裝置識別模組twenty four. . . Device identification module

30...伺服設備30. . . Servo device

圖1 繪示本發明網路閘道系統實施例之第一種系統架構示意圖;1 is a schematic diagram showing a first system architecture of an embodiment of a network gateway system of the present invention;

圖2 繪示本發明網路閘道系統實施例之第二種系統架構示意圖;2 is a schematic diagram showing a second system architecture of an embodiment of the network gateway system of the present invention;

圖3A 繪示本發明網路閘道系統實施例之第一種認證模式示意圖;3A is a schematic diagram showing a first authentication mode of an embodiment of the network gateway system of the present invention;

圖3B 繪示本發明網路閘道系統實施例之第二種認證模式示意圖;3B is a schematic diagram showing a second authentication mode of the embodiment of the network gateway system of the present invention;

圖3C 繪示本發明網路閘道系統實施例之第三種認證模式示意圖;3C is a schematic diagram showing a third authentication mode of the embodiment of the network gateway system of the present invention;

圖4A 繪示本發明網路閘道器實施例之動態調整運作功能方法示意圖;4A is a schematic diagram showing a method for dynamically adjusting operation functions of an embodiment of a network gateway according to the present invention;

圖4B 繪示本發明網路閘道器實施例之資料版本比對示意圖;以及4B is a schematic diagram showing a comparison of data versions of an embodiment of the network gateway of the present invention;

圖4C、圖4D、圖4E與圖4F繪示本發明網路閘道器實施例之認證示意圖。4C, 4D, 4E and 4F are schematic diagrams showing the authentication of the embodiment of the network gateway of the present invention.

10...網路閘道器10. . . Network gateway

11...組件配置模組11. . . Component configuration module

12...運算模組12. . . Computing module

20...安全存取模組20. . . Secure access module

21...附加功能資料twenty one. . . Additional function data

Claims (27)

一種動態調整運作功能的網路閘道系統,其包括:一安全存取模組,其儲存至少一附加功能資料;一網路閘道器,其包括:一組件配置模組,用以供該安全存取模組配置或移除於該組件配置模組;以及一運算模組,其電性耦接該組件配置模組,當該安全存取模組配置於該組件配置模組時,該運算模組係鏈結該安全存取模組,並於該鏈結成功時,在不更動內部程式、韌體與實體元件的情形下,執行該附加功能資料,若鏈結失敗時,該運算模組則運行原有的功能服務。 A network gateway system for dynamically adjusting an operation function, comprising: a security access module storing at least one additional function data; and a network gateway device comprising: a component configuration module for providing The security access module is configured or removed from the component configuration module; and a computing module is electrically coupled to the component configuration module. When the security access module is configured in the component configuration module, The computing module links the secure access module, and when the link is successful, the additional function data is executed without changing the internal program, the firmware and the physical component, and if the link fails, the operation is performed. The module runs the original functional service. 如申請專利範圍第1項所述之網路閘道系統,其中該網路閘道器更包括一儲存模組,至少一系統功能資料儲存於該儲存模組。 The network gateway system of claim 1, wherein the network gateway further comprises a storage module, and at least one system function data is stored in the storage module. 如申請專利範圍第2項所述之網路閘道系統,其中該運算模組係讀取並執行該系統功能資料。 The network gateway system of claim 2, wherein the computing module reads and executes the system function data. 如申請專利範圍第2項所述之網路閘道系統,其中該運算模組於該鏈結失敗時讀取並執行該系統功能資料。 The network gateway system of claim 2, wherein the computing module reads and executes the system function data when the link fails. 如申請專利範圍第2項所述之網路閘道系統,其中該系統功能資料與該附加功能資料為相同資料種類,且該運算模組分析該系統功能資料與該附加功能資料之資料版本,從中擇一讀取並執行。 The network gateway system of claim 2, wherein the system function data and the additional function data are the same data type, and the computing module analyzes the system function data and the data version of the additional function data, Choose from one to read and execute. 如申請專利範圍第5項所述之網路閘道系統,其中當該 系統功能資料之資料版本新於該附加功能資料之資料版本時,該運算模組讀取並執行該系統功能資料。 The network gateway system as described in claim 5, wherein When the data version of the system function data is new to the data version of the additional function data, the operation module reads and executes the system function data. 如申請專利範圍第5項所述之網路閘道系統,其中當該附加功能資料之資料版本新於該系統功能資料之資料版本時,該運算模組讀取並執行該附加功能資料。 The network gateway system of claim 5, wherein the computing module reads and executes the additional functional data when the data version of the additional functional data is new to the data version of the system functional data. 如申請專利範圍第1項所述之網路閘道系統,其中該運算模組鏈結該安全存取模組時,係認證該安全存取模組,以決定是否執行該附加功能資料。 The network gateway system of claim 1, wherein when the computing module links the secure access module, the secure access module is authenticated to determine whether to execute the additional functional data. 如申請專利範圍第8項所述之網路閘道系統,其中該安全存取模組更包括一識別資料,該網路閘道器更包括一儲存模組以儲存一設備識別表,該運算模組認證該安全存取模組時,係利用該設備識別表分析該識別資料,以決定是否執行該附加功能資料。 The network gateway system of claim 8, wherein the security access module further comprises an identification data, the network gateway further comprising a storage module for storing a device identification table, the operation When the module authenticates the secure access module, the device identification table is used to analyze the identification data to determine whether to execute the additional function data. 如申請專利範圍第9項所述之網路閘道系統,其更包括一伺服設備鏈結該網路閘道器,該網路閘道器係取得該伺服設備提供之該設備識別表。 The network gateway system of claim 9, further comprising a servo device linking the network gateway, the network gateway obtaining the device identification table provided by the servo device. 如申請專利範圍第9項所述之網路閘道系統,其中該設備識別表更記錄每一識別資料對應之一功能使用權限資料。 The network gateway system according to claim 9, wherein the device identification table further records one function usage authority data corresponding to each identification data. 如申請專利範圍第8項所述之網路閘道系統,其中該安全存取模組包括一辨識碼產生模組,該運算模組更包括一識別邏輯資料,該運算模組認證該安全存取模組時,係執行該辨識碼產生模組以取得一辨識資料,並利用該識別邏輯資料分析該辨識資料,以決定是否執行該附加 功能資料。 The network gateway system of claim 8, wherein the security access module comprises an identification code generation module, the operation module further comprising an identification logic data, the operation module authenticating the security storage When the module is taken, the identification code generating module is executed to obtain an identification data, and the identification data is analyzed by using the identification logic data to determine whether to perform the additional Functional data. 如申請專利範圍第12項所述之網路閘道系統,其更包括一伺服設備鏈結該網路閘道器,該網路閘道器係取得該伺服設備提供之該識別邏輯資料。 The network gateway system of claim 12, further comprising a servo device that links the network gateway, the network gateway obtaining the identification logic data provided by the servo device. 如申請專利範圍第12項所述之網路閘道系統,其中該運算模組分析辨識資料後,將一分析結果傳輸至鏈結該網路閘道器之一伺服設備,該伺服設備分析該分析結果以傳輸對應該辨識資料之功能使用權限資料至該運算模組,令該運算模組根據該功能使用權限資料判定是否執行該附加功能資料。 The network gateway system according to claim 12, wherein the computing module analyzes the identification data, and transmits an analysis result to a servo device linked to the network gateway, the servo device analyzing the The analysis result is used to transmit the function usage permission data corresponding to the identification data to the operation module, so that the operation module determines whether to execute the additional function data according to the function usage authority data. 如申請專利範圍第14項所述之網路閘道系統,其中該運算模組執行該附加功能資料時,更根據該功能使用權限資料執行該附加功能資料中對應該辨識資料之權限的局部功能單元。 The network gateway system of claim 14, wherein the computing module executes the additional function data, and further performs the local function of the additional function data corresponding to the permission to identify the data according to the function usage authority data. unit. 如申請專利範圍第1項所述之網路閘道系統,其中該安全存取模組更包括一裝置識別模組,該網路閘道器更包括一裝置資料,該安全存取模組配置於組件配置模組時,係受電以執行該裝置識別模組,該裝置識別模組係識別該裝置資料以決定是否供該運算模組讀取該附加功能資料。 The network gateway system of claim 1, wherein the security access module further comprises a device identification module, the network gateway further comprising a device data, the security access module configuration When the component is configured, the device is powered to execute the device identification module, and the device identification module identifies the device data to determine whether the operation module reads the additional function data. 一種網路閘道器之動態調整運作功能方法,該網路閘道器包括相互電性耦接之一組件配置模組與一運算模組,該方法包括:配置一安全存取模組於該組件配置模組; 利用該運算模組透過該組件配置模組以鏈結該安全存取模組;以及根據鏈結結果以決定是否執行該安全存取模組之一附加功能資料,若是,在不更動內部程式、韌體與實體元件的情形下,執行該附加功能資料,若否,則該運算模組則運行原有的功能服務。 A method for dynamically adjusting a function of a network gateway device, the network gateway device comprising a component configuration module and a computing module electrically coupled to each other, the method comprising: configuring a security access module to Component configuration module; Using the computing module to link the security access module through the component configuration module; and determining whether to execute an additional function data of the security access module according to the link result, and if not, not changing the internal program, In the case of firmware and physical components, the additional functional data is executed, and if not, the computing module runs the original functional service. 如申請專利範圍第17項所述之方法,其中該網路閘道器更包括一儲存模組,至少一系統功能資料儲存於該儲存模組,其中該方法更包括下列步驟:利用該運算模組讀取並執行該系統功能資料。 The method of claim 17, wherein the network gateway further comprises a storage module, and at least one system function data is stored in the storage module, wherein the method further comprises the step of: utilizing the operation mode The group reads and executes the system function data. 如申請專利範圍第17項所述之方法,其中該網路閘道器更包括一儲存模組,至少一系統功能資料儲存於該儲存模組,其中該方法更包括下列步驟:當該運算模組成功鏈結該安全存取模組時,執行該附加功能資料;以及當該運算模組鏈結該安全存取模組失敗時,讀取該儲存模組儲存之該系統功能資料。 The method of claim 17, wherein the network gateway further comprises a storage module, and at least one system function data is stored in the storage module, wherein the method further comprises the following steps: when the operation mode When the group successfully links the security access module, the additional function data is executed; and when the computing module fails to link the security access module, the system function data stored by the storage module is read. 如申請專利範圍第17項所述之方法,其中該網路閘道器更包括一儲存模組,至少一系統功能資料儲存於該儲存模組,其中該方法更包括下列步驟:當該運算模組成功鏈結該安全存取模組時,利用該運算模組分析該系統功能資料與該附加功能資料之資料版本,從中擇一讀取並執行。 The method of claim 17, wherein the network gateway further comprises a storage module, and at least one system function data is stored in the storage module, wherein the method further comprises the following steps: when the operation mode When the group successfully links the security access module, the computing module is used to analyze the system function data and the data version of the additional function data, and select and execute it. 如申請專利範圍第20項所述之方法,其中當該系統功 能資料之資料版本新於該附加功能資料之資料版本時,該運算模組讀取並執行該系統功能資料。 The method of claim 20, wherein the system works When the data version of the data is new to the data version of the additional function data, the computing module reads and executes the system function data. 如申請專利範圍第20項所述之方法,其中當該附加功能資料之資料版本新於該系統功能資料之資料版本時,該運算模組讀取並執行該附加功能資料。 The method of claim 20, wherein the computing module reads and executes the additional functional data when the data version of the additional functional data is new to the data version of the system functional data. 如申請專利範圍第17項所述之方法,其中利用該運算模組透過該組件配置模組以鏈結該安全存取模組該步驟包括:利用該運算模組認證該安全存取模組;以及記錄認證結果以形成該鏈結結果。 The method of claim 17, wherein the step of using the computing module to link the secure access module to the module includes: authenticating the secure access module by using the computing module; And document the certification results to form the link results. 如申請專利範圍第23項所述之方法,其中該網路閘道器更包括一儲存模組記錄一設備識別表,而利用該運算模組認證該安全存取模組之該步驟包括:利用該運算模組讀取該安全存取模組之一識別資料;由該運算模組根據該設備識別表分析該識別資料;以及由該運算模組將分析結果記錄為該認證結果。 The method of claim 23, wherein the network gateway further comprises a storage module for recording a device identification table, and the step of authenticating the secure access module by using the computing module comprises: utilizing The computing module reads the identification data of the security access module; the computing module analyzes the identification data according to the device identification table; and the analysis module records the analysis result as the authentication result. 如申請專利範圍第23項所述之方法,其中該安全存取模組更包括一辨識碼產生模組,而利用該運算模組認證該安全存取模組之該步驟包括:由該運算模組執行該辨識碼產生模組以取得一辨識資料;由該運算模組利用一識別邏輯資料分析該辨識資 料;以及由該運算模組將分析結果形成該認證結果。 The method of claim 23, wherein the secure access module further comprises an identification code generating module, and the step of authenticating the secure access module by using the computing module comprises: The group executes the identification code generating module to obtain an identification data; the computing module analyzes the identification resource by using an identification logic data And the calculation result is formed by the operation module to form the certification result. 如申請專利範圍第25項所述之方法,其中由該運算模組將分析結果形成該認證結果之該步驟包括:由該運算模組將該分析結果傳輸至鏈結該網路閘道器之一伺服設備;由該伺服設備分析該分析結果以傳輸對應該辨識資料之功能使用權限資料至該運算模組;以及由該運算模組將該功能使用權限資料形成該認證結果。 The method of claim 25, wherein the step of forming, by the computing module, the analysis result to form the authentication result comprises: transmitting, by the computing module, the analysis result to the link network gate device a servo device; the analysis result is analyzed by the servo device to transmit the function usage permission data corresponding to the identification data to the operation module; and the operation module uses the permission data to form the authentication result. 如申請專利範圍第25項所述之方法,其中由根據鏈結結果以決定是否執行該安全存取模組之一附加功能資料之該步驟後包括:當該運算模組決定執行該附加功能資料時,根據該功能使用權限資料執行該附加功能資料中對應該辨識資料之權限的局部功能單元。 The method of claim 25, wherein the step of determining whether to execute the additional function data of the secure access module according to the link result comprises: when the computing module decides to execute the additional function data The local functional unit of the additional function data corresponding to the authority to identify the data is executed according to the function usage permission data.
TW99142199A 2010-12-03 2010-12-03 Dynamic Adjustment of Operational Function of Network Gateway System and Its Adjustment Method TWI425793B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW99142199A TWI425793B (en) 2010-12-03 2010-12-03 Dynamic Adjustment of Operational Function of Network Gateway System and Its Adjustment Method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW99142199A TWI425793B (en) 2010-12-03 2010-12-03 Dynamic Adjustment of Operational Function of Network Gateway System and Its Adjustment Method

Publications (2)

Publication Number Publication Date
TW201225592A TW201225592A (en) 2012-06-16
TWI425793B true TWI425793B (en) 2014-02-01

Family

ID=46726241

Family Applications (1)

Application Number Title Priority Date Filing Date
TW99142199A TWI425793B (en) 2010-12-03 2010-12-03 Dynamic Adjustment of Operational Function of Network Gateway System and Its Adjustment Method

Country Status (1)

Country Link
TW (1) TWI425793B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI220183B (en) * 2002-10-09 2004-08-11 Elitegroup Computer Sys Co Ltd Upgrade setup system of portable computer
TWI220962B (en) * 2003-01-20 2004-09-11 Mediatek Inc Firmware updating method and related apparatus for checking content of replacing firmware before firmware updating
TWI276003B (en) * 2004-03-16 2007-03-11 Hon Hai Prec Ind Co Ltd Storage gateway and data backup method thereof
TW200937289A (en) * 2008-02-27 2009-09-01 Mstar Semiconductor Inc Apparatus and method for firmware update

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI220183B (en) * 2002-10-09 2004-08-11 Elitegroup Computer Sys Co Ltd Upgrade setup system of portable computer
TWI220962B (en) * 2003-01-20 2004-09-11 Mediatek Inc Firmware updating method and related apparatus for checking content of replacing firmware before firmware updating
TWI276003B (en) * 2004-03-16 2007-03-11 Hon Hai Prec Ind Co Ltd Storage gateway and data backup method thereof
TW200937289A (en) * 2008-02-27 2009-09-01 Mstar Semiconductor Inc Apparatus and method for firmware update

Also Published As

Publication number Publication date
TW201225592A (en) 2012-06-16

Similar Documents

Publication Publication Date Title
EP3451257A1 (en) Device lifecycle distributed ledger
US10268837B2 (en) Validation of containers
US8052060B2 (en) Physical access control system with smartcard and methods of operating
EP2524471B1 (en) Anytime validation for verification tokens
CN104160405B (en) Safety means environment for trusting configuration
CN103201747B (en) For verifying the method and apparatus of multiple data handling system
US10268565B2 (en) Validation of containers
BR112019015066A2 (en) BCHAIN UNIVERSAL CONNECTIONS SYSTEM ALL / EVERYTHING / EVERY PART
US20080215358A1 (en) Method, system, and storage medium for implementing business process modules
CN1322387C (en) Method for firming legitimate of software and device for executing software
CN109446259B (en) Data processing method and device, processor and storage medium
CN107453873B (en) Intelligent IC card data verification method and system
US11609757B1 (en) Continuous integration framework for development of software for EMV-based card present transaction processing
JP2010518499A (en) Method for authenticating access to at least one automated component of an industrial facility
JP5360192B2 (en) Personal authentication system and personal authentication method
NL2031835B1 (en) License management for software defined silicon
Meridji et al. System security requirements: A framework for early identification, specification and measurement of related software requirements
Kobashi et al. Validating security design patterns application using model testing
WO2004100094A2 (en) System and method for using open apis to provide integrated security policies for flexible management and customization of payment instruments
TWI425793B (en) Dynamic Adjustment of Operational Function of Network Gateway System and Its Adjustment Method
CN106992860A (en) A kind of detection method of server TPM modules
Barati et al. Design and verification of privacy patterns for business process models
CN101894234A (en) COS general file access control system
AU2015200701B2 (en) Anytime validation for verification tokens
Verreydt et al. Expressive and systematic risk assessments with instance-centric threat models

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees