JPH03169135A - Method and apparatus for maintaining cryptographic data - Google Patents
Method and apparatus for maintaining cryptographic dataInfo
- Publication number
- JPH03169135A JPH03169135A JP1307531A JP30753189A JPH03169135A JP H03169135 A JPH03169135 A JP H03169135A JP 1307531 A JP1307531 A JP 1307531A JP 30753189 A JP30753189 A JP 30753189A JP H03169135 A JPH03169135 A JP H03169135A
- Authority
- JP
- Japan
- Prior art keywords
- ram
- power supply
- opened
- relay
- contact
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 14
- 238000012545 processing Methods 0.000 claims abstract description 17
- 238000004891 communication Methods 0.000 claims abstract description 13
- 238000012423 maintenance Methods 0.000 claims abstract description 6
- 230000005856 abnormality Effects 0.000 claims description 18
- 238000004321 preservation Methods 0.000 claims description 5
- 102100031584 Cell division cycle-associated 7-like protein Human genes 0.000 description 3
- 101000777638 Homo sapiens Cell division cycle-associated 7-like protein Proteins 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 101100297821 Schizosaccharomyces pombe (strain 972 / ATCC 24843) pli1 gene Proteins 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Abstract
Description
【発明の詳細な説明】
(産業上の利用分野〉
この発明は、ファクシミリやデータ通信分野において通
信の秘密を保持するための暗号化装置を含む通信装置の
暗号化データ保全方法及びその装置に関するものである
。[Detailed Description of the Invention] (Industrial Application Field) The present invention relates to a method and device for preserving encrypted data in a communication device including an encryption device for maintaining communication secrecy in the field of facsimile and data communication. It is.
(従来の技術)
近年、ファクシミリやデータ通信分野における通信装置
には、暗号化した通信のための秘密データを内蔵したも
のがある。(Prior Art) In recent years, some communication devices in the field of facsimile and data communication have built-in secret data for encrypted communication.
保守点検等のために、このような秘密データにアクセス
する必要がある場合は、テンキーを操作して暗証番号等
を入力し、正式な手続きを経てこれを行なうようにして
いる。When it is necessary to access such confidential data for maintenance and inspection purposes, the user must operate the numeric keypad to enter a password, etc., and go through formal procedures.
(発明が解決しようとする課題〉
しかしながら、第三者が不正に暗号化装置の開を開けて
中央処理装置を介して秘密データを記憶したメモリの内
容を読み取ることにより、秘密データとしての暗号化さ
れたプログラムが流出してしまうという恐れかあった。(Problem to be solved by the invention) However, when a third party illegally opens the encryption device and reads the contents of the memory that stores the secret data via the central processing unit, the encrypted data cannot be encrypted as secret data. There was a fear that the programs that were created would be leaked.
この発明が解決しようとする課題は、上記問題点を除去
し、少なくとも中央処理装置を蓋う暗号化装置が不正に
開かれて該中央処理装置を介して秘密データにアクセス
しようとする場合に、その暗号化されたプログラムを自
動的に破壊して暗号化データを簡単に保全する暗号化デ
ータ保全方法及び比較的安価な暗号化データ保全装置を
提供することにある。The problem to be solved by the present invention is to eliminate the above-mentioned problems, and at least solve the problem when an encryption device covering a central processing unit is illegally opened and an attempt is made to access secret data via the central processing unit. It is an object of the present invention to provide an encrypted data preservation method and a relatively inexpensive encrypted data preservation device for easily preserving encrypted data by automatically destroying the encrypted program.
(課題を解決するための手段)
上記課題を解決するため、本発明に係る暗号化データ保
全方法は、RAMと協働する中央処理装置のプログラム
制御により暗号化を実施している暗号化装置を含む通信
装置の暗号化データ保全方法であって、少なくとも前記
中央処理装置を蓋う暗号化装置が不正に開かれたことを
判別し、前記RAMへ給電している電源線を切り離し、
RAMの給電を停止することによりRAM内のプログラ
ムを破壊することを特徴とするものである。(Means for Solving the Problems) In order to solve the above problems, an encrypted data preservation method according to the present invention uses an encryption device that performs encryption under program control of a central processing unit that cooperates with a RAM. A method for preserving encrypted data in a communication device including at least the central processing unit, which determines that an encryption device covering the central processing unit has been illegally opened, and disconnects a power line feeding power to the RAM;
This method is characterized in that the program in the RAM is destroyed by stopping power supply to the RAM.
また、暗号化データ保全装置は、RAMと協働する中央
処理装置のプログラム制御により暗号化を実施している
暗号化装置を含む通信装置における暗号化データ保全装
置であって、RAMへ給電する電源装置と、少なくとも
中央処理装置を蓋う暗号化装置の異常開を判別する異常
判別装置と、電源装置とRAMとの間を接続し異常判別
装置の異常判別により開とするスイッチとを有すること
を特徴とするものである。The encrypted data security device is an encrypted data security device in a communication device that includes an encryption device that performs encryption under program control of a central processing unit that cooperates with the RAM, and is a power source that supplies power to the RAM. The apparatus includes an abnormality determination device that determines whether an encryption device that covers at least the central processing unit is abnormally opened, and a switch that connects the power supply device and the RAM and opens when the abnormality determination device determines that there is an abnormality. This is a characteristic feature.
(作用)
本発明に係る暗号化データ保全方法においては、正規手
続きによらず、少なくとも中央処理装置を蓋う暗号化装
置が、不正に開かれると、これが判別される。この判別
により、RAMへ給電している電源線を切り離す。電源
線の切り離しにより、RAMの給電が停止することにな
り、RAM内のプログラムを破壊するものであり、秘密
データとしての暗号化されたプログラムが第三者に渡る
ことが防止される。(Function) In the encrypted data preservation method according to the present invention, it is determined that at least the encryption device covering the central processing unit is illegally opened without following a normal procedure. Based on this determination, the power supply line feeding the RAM is disconnected. By disconnecting the power line, the power supply to the RAM is stopped, which destroys the program in the RAM, and prevents the encrypted program as secret data from being passed on to a third party.
また、上記方法を実現する装置としては、異常判別装置
が少なくとも中央処理装置を蓋う暗号化装置の異常開を
判別する。この判別によりスイッチを動作させて回路を
開とし、RAMの電源線を切り離すことによりRAM内
に記憶しているプログラムを破壊する。Further, as an apparatus for implementing the above method, an abnormality determination device determines whether an encryption device covering at least a central processing unit has been abnormally opened. Based on this determination, the switch is operated to open the circuit and the power supply line of the RAM is disconnected, thereby destroying the program stored in the RAM.
(実施例) 本発明の一実施例について図面を参照して説明する。(Example) An embodiment of the present invention will be described with reference to the drawings.
第1図はこの発明の一実施例を示すブロック図であって
、1は装置全体を制御するCPU (中央処理装置〉、
2は暗号化のための秘密データを内蔵したRAM (ラ
ンダムアクセスメモリ)、3は電源装置、4はRAMの
電源をバックアップするための電池、5,6は逆流防止
用のダイオード、71は不正に暗号化装置の扉が開かれ
た場合それを判別する異常判別装置、72は前記異常判
別装置71に応答して動作する平常時接点閉のスイッチ
である。例えば、異常判別装置71として扉の機械的変
化を検出する変位センサを用い、スイッチ72としてセ
ンサ出力により駆動され開となる接点を用いる。又は、
異常判別装置71としてマイク口スイッチのアクチュエ
ー夕を扉に接するようにして用い、スイッチ72として
そのマイクロスイッチの接点機構が用いられる。このよ
うに異常判別装置71とスイッチ72とは別個のもので
あっても、一体のものであってもよい。8は保守時にC
PUI経由でオン・オフするリレーであり、81はリレ
ー8の接点であって平常時開である。FIG. 1 is a block diagram showing an embodiment of the present invention, in which 1 is a CPU (central processing unit) that controls the entire device;
2 is a RAM (random access memory) that contains secret data for encryption, 3 is a power supply, 4 is a battery to back up the power of the RAM, 5 and 6 are diodes to prevent backflow, and 71 is an unauthorized An abnormality determining device 72 that determines when the door of the encryption device is opened is a switch whose contact is normally closed and operates in response to the abnormality determining device 71. For example, a displacement sensor that detects a mechanical change in the door is used as the abnormality determination device 71, and a contact that is driven to open by the sensor output is used as the switch 72. Or
As the abnormality determination device 71, the actuator of a microphone port switch is used in contact with the door, and as the switch 72, the contact mechanism of the microswitch is used. In this way, the abnormality determination device 71 and the switch 72 may be separate or integrated. 8 is C during maintenance
This is a relay that is turned on and off via the PUI, and 81 is a contact of the relay 8, which is normally open.
平常時、電源部3はCPLI1、RAM2、リレー8等
暗号化データ保全装置が必要とする電源を給電していて
、RAM2は平常時は、@源部3よリダイオード6およ
び平常時接点閉の異常判別装置71のスイッチ72を経
由してRAM2の動作に必要な電源を給電している。In normal times, the power supply unit 3 supplies the power required by the encrypted data security devices such as CPLI1, RAM2, and relay 8. In normal times, the RAM2 is connected to the power supply unit 3, the rediode 6, and the normally closed contact. Power necessary for the operation of the RAM 2 is supplied via the switch 72 of the abnormality determination device 71.
また、停電時等電源部3への給電がなくなった場合には
、RAM2は電源をバックアップするための電池4より
、ダイオード5および平常時接点閉の異常判別装置71
のスイッチ72を経由して、RAM2に記憶ざれている
内容を保持する為に必要な電源のみを給電している。In addition, when the power is not supplied to the power supply unit 3 such as during a power outage, the RAM 2 uses the battery 4 for backing up the power supply to detect the diode 5 and the normally closed contact abnormality determination device 71.
Only the power necessary to maintain the contents stored in the RAM 2 is supplied via the switch 72.
そこで暗号化装置の扉が不正に開かれると、異常判別装
置71は作動してスイッチ72が接点開となりRAM2
への給電を停止して、RAM2に保持されていた秘密デ
ータを破壊する。If the door of the encryption device is opened illegally, the abnormality determination device 71 is activated and the switch 72 contacts open, causing the RAM 2
The secret data held in RAM2 is destroyed.
また、保守時には、例えばテンキーを操作して暗証番号
等を入力するという、正規手続きをとることにより、C
PLI1を経由してリレー8が作動しリレー8の接点8
1閉となる。Also, during maintenance, by using regular procedures such as operating a numeric keypad and entering a PIN number, etc.
Relay 8 is activated via PLI1, and contact 8 of relay 8
1 closed.
この場合は、暗号化装置の扉を開け異常判別装置71が
作動し、スイッチ72の接点開となっても、RAM2は
電源装置3、ダイオード6、リレー8の接点81を経由
してRAM2の動作に必要な電源を給電出来る為、RA
M2に保持ざれていた秘密データは破壊ざれない。In this case, even if the door of the encryption device is opened and the abnormality determination device 71 is activated, and the contact of the switch 72 is opened, the RAM 2 will be activated via the power supply device 3, the diode 6, and the contact 81 of the relay 8. Because it can supply the necessary power to the RA
The secret data held in M2 will not be destroyed.
保守後は、暗号化装置の扉を閉め異常判別装置71のス
イッチ72を接点閉とした後、CPtJ1を経由してリ
レー8を復旧させリレー8の接点81を開とすることに
より終了する。After maintenance, the door of the encryption device is closed and the switch 72 of the abnormality determination device 71 is closed, and then the relay 8 is restored via CPtJ1 and the contact 81 of the relay 8 is opened.
なお、不正にRAM内の秘密データを疎み出す場合には
、CPUを取り外して、インサーキットエミュレー夕を
取り付ける必要があるので異常判別装置は、CPU自身
を蓋う筺体の異常開を検出するようにしてもよい。In addition, in order to illegally leak confidential data in RAM, it is necessary to remove the CPU and install an in-circuit emulator, so the abnormality detection device is designed to detect abnormal opening of the casing that covers the CPU itself. You can also do this.
また、本発明は、上記実施例に限定されるものではなく
、本発明の趣旨に基づいて種々の変形が可能であり、こ
れらを本発明の範囲から排除するものではない。Further, the present invention is not limited to the above embodiments, and various modifications can be made based on the spirit of the present invention, and these are not excluded from the scope of the present invention.
(発明の効果〉
以上、詳細に説明したようにこの発明によれば、第三者
が不正に通信装置の暗号化装置や中央処理装置を蓋う筐
体を開けると、RAMへ給電している電源線を切り離し
、RAMへの給電を停止し、RAMの内容を破壊するこ
とにより、比較的安価に暗号化プログラムの流出を防止
することができる。(Effects of the Invention) As described above in detail, according to the present invention, when a third party illegally opens the casing that covers the encryption device and central processing unit of a communication device, power is supplied to the RAM. By disconnecting the power supply line, stopping power supply to the RAM, and destroying the contents of the RAM, leakage of the encrypted program can be prevented at a relatively low cost.
したがって、本発明により、通信の秘密が保持ざれ、デ
ータの保全による装置の信頼性を高めることができる。Therefore, according to the present invention, communication secrecy can be maintained, and reliability of the device can be enhanced by data security.
第1図は本発明に係る暗号化データ保全装置の一実施例
のブロック図である。
1・・・CPU,2・・・RAM,3・・・電源装置、
4・・・電池、5,6・・・ダイオード、71・・・異
常判別装置、72・・・スイッチ、8・・・リレー、8
1・・・接点。
特 許 出 願 人
汁
理
士
山
本
恵
第
1
図FIG. 1 is a block diagram of an embodiment of an encrypted data security device according to the present invention. 1...CPU, 2...RAM, 3...Power supply device,
4... Battery, 5, 6... Diode, 71... Abnormality determination device, 72... Switch, 8... Relay, 8
1... Contact. Patent application Megumi Yamamoto, a human judge, Figure 1
Claims (2)
により暗号化を実施している暗号化装置を含む通信装置
の暗号化データ保全方法であって、 少なくとも前記中央処理装置を蓋う暗号化装置が不正に
開かれたことを判別し、前記RAMへ給電している電源
線を切り離し、RAMの給電を停止することによりRA
M内のプログラムを破壊することを特徴とする暗号化デ
ータ保全方法。(1) A method for preserving encrypted data in a communication device including an encryption device that performs encryption under program control of a central processing unit that cooperates with a RAM, the encryption device covering at least the central processing unit. The system determines that the RAM has been opened illegally, disconnects the power supply line that supplies power to the RAM, and stops power supply to the RAM.
An encrypted data preservation method characterized by destroying a program in M.
により暗号化を実施している暗号化装置を含む通信装置
における暗号化データ保全装置であって、 RAMへ給電する電源装置と、 少なくとも中央処理装置を蓋う暗号化装置の異常開を判
別する異常判別装置と、 電源装置とRAMとの間を接続し異常判別装置の異常判
別により開とするスイッチと を有することを特徴とする暗号化データ保全装置。(2) An encrypted data security device for a communication device that includes an encryption device that performs encryption under program control of a central processing unit that cooperates with the RAM, the power supply device that supplies power to the RAM, and at least the central processing unit. Encrypted data characterized by having an abnormality determination device that determines whether an encryption device that covers the device is abnormally open, and a switch that connects a power supply device and a RAM and is opened when the abnormality determination device determines that the error is open. Maintenance device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP1307531A JPH03169135A (en) | 1989-11-29 | 1989-11-29 | Method and apparatus for maintaining cryptographic data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP1307531A JPH03169135A (en) | 1989-11-29 | 1989-11-29 | Method and apparatus for maintaining cryptographic data |
Publications (1)
Publication Number | Publication Date |
---|---|
JPH03169135A true JPH03169135A (en) | 1991-07-22 |
Family
ID=17970212
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP1307531A Pending JPH03169135A (en) | 1989-11-29 | 1989-11-29 | Method and apparatus for maintaining cryptographic data |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPH03169135A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018534753A (en) * | 2015-11-05 | 2018-11-22 | リチウム・エナジー・アンド・パワー・ゲーエムベーハー・ウント・コー.カーゲー | Battery system for vehicle |
-
1989
- 1989-11-29 JP JP1307531A patent/JPH03169135A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018534753A (en) * | 2015-11-05 | 2018-11-22 | リチウム・エナジー・アンド・パワー・ゲーエムベーハー・ウント・コー.カーゲー | Battery system for vehicle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8006101B2 (en) | Radio transceiver or other encryption device having secure tamper-detection module | |
US6993654B2 (en) | Secure encryption processor with tamper protection | |
JP3923860B2 (en) | Electric management service method | |
CN103914899A (en) | Alarm entrance guard controller and control system and method thereof | |
CN112182643A (en) | Data privacy protection method and device, electronic equipment and storage medium | |
CN101262669B (en) | A secure guarantee method for information stored in a mobile terminal | |
KR20080069666A (en) | Upgradable security module | |
JPH03169135A (en) | Method and apparatus for maintaining cryptographic data | |
CN107835170A (en) | Machine system and method is torn in a kind of intelligent Pos equipment safeties mandate open | |
US11551544B2 (en) | Impeding unauthorized network infiltration at remote critical infrastructure facilities | |
JP6266430B2 (en) | Object management method and system | |
US20230104923A1 (en) | Secure tamper resistant data processing, storage, and transmission gateway and controller and data anomaly detection program | |
KR100697945B1 (en) | Portable information device and method for preventing disclosing a data | |
CN102541766A (en) | Classified memory with security information protecting function based on WSN (wireless sensor network) base station control | |
US10777376B2 (en) | Method and system for hardware tamper detection and mitigation for solid state circuit breaker and its controller | |
CN101930523B (en) | File protection system and method | |
KR100314409B1 (en) | Ram data emergency erase method | |
CN100357864C (en) | Keyboard encrypting method | |
JP4302922B2 (en) | Electronic device, electronic device control method, and electronic device control program | |
CN107168122B (en) | A kind of power equipment case centralized control system and method | |
TWI412950B (en) | Document protection system and method thereof | |
CN107980136A (en) | Data processing equipment and the method for running the data processing equipment | |
US20230376619A1 (en) | Tamper and zeroization response unit | |
CN112948808B (en) | Authorization management method and system, authorization management device and embedded device | |
CN111708293A (en) | MCU design method with active defense function and online debugging function |