JPH03169135A - Method and apparatus for maintaining cryptographic data - Google Patents

Method and apparatus for maintaining cryptographic data

Info

Publication number
JPH03169135A
JPH03169135A JP1307531A JP30753189A JPH03169135A JP H03169135 A JPH03169135 A JP H03169135A JP 1307531 A JP1307531 A JP 1307531A JP 30753189 A JP30753189 A JP 30753189A JP H03169135 A JPH03169135 A JP H03169135A
Authority
JP
Japan
Prior art keywords
ram
power supply
opened
relay
contact
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP1307531A
Other languages
Japanese (ja)
Inventor
Satoru Nakagawa
哲 中川
Yoshio Morishita
森下 芳生
Shunichi Miyasaka
宮坂 俊一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Secom Co Ltd
Oki Electric Industry Co Ltd
Original Assignee
Secom Co Ltd
Oki Electric Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Secom Co Ltd, Oki Electric Industry Co Ltd filed Critical Secom Co Ltd
Priority to JP1307531A priority Critical patent/JPH03169135A/en
Publication of JPH03169135A publication Critical patent/JPH03169135A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To prevent leakage of a cryptographic program by disconnecting a power line feeding power to a RAM when a 3rd party opens an enclosure covering a cryphtographic device and a central processing unit for a communication equipment illicitly to stop the power supply to the RAM and destroying the content of the RAM. CONSTITUTION:A relay 8 is operated via CPU 1 and a contact 81 of the relay 8 is closed by taking the normal procedure under maintenance that, e.g. a ten- key is operated to enter a password or the like. In such a case, the door of a cryptographic device is opened to activate a fault discriminator 71 and even when the contact of a switch 72 is opened, the RAM 2 is energized for its required operation through a power supply device 3, a diode 6 and the relay contact 81 of the relay 8, then secret data stored in the RAM 2 is not destroyed. However, if the door is opened illicitly, the fault discriminator 71 is operated, the contact of the switch 72 is opened, the power supply to the RAM 2 is stopped and the secret data stored in the RAM 2 is destroyed. Thus, the interception of the cryptographic program by the 3rd party is prevented.

Description

【発明の詳細な説明】 (産業上の利用分野〉 この発明は、ファクシミリやデータ通信分野において通
信の秘密を保持するための暗号化装置を含む通信装置の
暗号化データ保全方法及びその装置に関するものである
[Detailed Description of the Invention] (Industrial Application Field) The present invention relates to a method and device for preserving encrypted data in a communication device including an encryption device for maintaining communication secrecy in the field of facsimile and data communication. It is.

(従来の技術) 近年、ファクシミリやデータ通信分野における通信装置
には、暗号化した通信のための秘密データを内蔵したも
のがある。
(Prior Art) In recent years, some communication devices in the field of facsimile and data communication have built-in secret data for encrypted communication.

保守点検等のために、このような秘密データにアクセス
する必要がある場合は、テンキーを操作して暗証番号等
を入力し、正式な手続きを経てこれを行なうようにして
いる。
When it is necessary to access such confidential data for maintenance and inspection purposes, the user must operate the numeric keypad to enter a password, etc., and go through formal procedures.

(発明が解決しようとする課題〉 しかしながら、第三者が不正に暗号化装置の開を開けて
中央処理装置を介して秘密データを記憶したメモリの内
容を読み取ることにより、秘密データとしての暗号化さ
れたプログラムが流出してしまうという恐れかあった。
(Problem to be solved by the invention) However, when a third party illegally opens the encryption device and reads the contents of the memory that stores the secret data via the central processing unit, the encrypted data cannot be encrypted as secret data. There was a fear that the programs that were created would be leaked.

この発明が解決しようとする課題は、上記問題点を除去
し、少なくとも中央処理装置を蓋う暗号化装置が不正に
開かれて該中央処理装置を介して秘密データにアクセス
しようとする場合に、その暗号化されたプログラムを自
動的に破壊して暗号化データを簡単に保全する暗号化デ
ータ保全方法及び比較的安価な暗号化データ保全装置を
提供することにある。
The problem to be solved by the present invention is to eliminate the above-mentioned problems, and at least solve the problem when an encryption device covering a central processing unit is illegally opened and an attempt is made to access secret data via the central processing unit. It is an object of the present invention to provide an encrypted data preservation method and a relatively inexpensive encrypted data preservation device for easily preserving encrypted data by automatically destroying the encrypted program.

(課題を解決するための手段) 上記課題を解決するため、本発明に係る暗号化データ保
全方法は、RAMと協働する中央処理装置のプログラム
制御により暗号化を実施している暗号化装置を含む通信
装置の暗号化データ保全方法であって、少なくとも前記
中央処理装置を蓋う暗号化装置が不正に開かれたことを
判別し、前記RAMへ給電している電源線を切り離し、
RAMの給電を停止することによりRAM内のプログラ
ムを破壊することを特徴とするものである。
(Means for Solving the Problems) In order to solve the above problems, an encrypted data preservation method according to the present invention uses an encryption device that performs encryption under program control of a central processing unit that cooperates with a RAM. A method for preserving encrypted data in a communication device including at least the central processing unit, which determines that an encryption device covering the central processing unit has been illegally opened, and disconnects a power line feeding power to the RAM;
This method is characterized in that the program in the RAM is destroyed by stopping power supply to the RAM.

また、暗号化データ保全装置は、RAMと協働する中央
処理装置のプログラム制御により暗号化を実施している
暗号化装置を含む通信装置における暗号化データ保全装
置であって、RAMへ給電する電源装置と、少なくとも
中央処理装置を蓋う暗号化装置の異常開を判別する異常
判別装置と、電源装置とRAMとの間を接続し異常判別
装置の異常判別により開とするスイッチとを有すること
を特徴とするものである。
The encrypted data security device is an encrypted data security device in a communication device that includes an encryption device that performs encryption under program control of a central processing unit that cooperates with the RAM, and is a power source that supplies power to the RAM. The apparatus includes an abnormality determination device that determines whether an encryption device that covers at least the central processing unit is abnormally opened, and a switch that connects the power supply device and the RAM and opens when the abnormality determination device determines that there is an abnormality. This is a characteristic feature.

(作用) 本発明に係る暗号化データ保全方法においては、正規手
続きによらず、少なくとも中央処理装置を蓋う暗号化装
置が、不正に開かれると、これが判別される。この判別
により、RAMへ給電している電源線を切り離す。電源
線の切り離しにより、RAMの給電が停止することにな
り、RAM内のプログラムを破壊するものであり、秘密
データとしての暗号化されたプログラムが第三者に渡る
ことが防止される。
(Function) In the encrypted data preservation method according to the present invention, it is determined that at least the encryption device covering the central processing unit is illegally opened without following a normal procedure. Based on this determination, the power supply line feeding the RAM is disconnected. By disconnecting the power line, the power supply to the RAM is stopped, which destroys the program in the RAM, and prevents the encrypted program as secret data from being passed on to a third party.

また、上記方法を実現する装置としては、異常判別装置
が少なくとも中央処理装置を蓋う暗号化装置の異常開を
判別する。この判別によりスイッチを動作させて回路を
開とし、RAMの電源線を切り離すことによりRAM内
に記憶しているプログラムを破壊する。
Further, as an apparatus for implementing the above method, an abnormality determination device determines whether an encryption device covering at least a central processing unit has been abnormally opened. Based on this determination, the switch is operated to open the circuit and the power supply line of the RAM is disconnected, thereby destroying the program stored in the RAM.

(実施例) 本発明の一実施例について図面を参照して説明する。(Example) An embodiment of the present invention will be described with reference to the drawings.

第1図はこの発明の一実施例を示すブロック図であって
、1は装置全体を制御するCPU (中央処理装置〉、
2は暗号化のための秘密データを内蔵したRAM (ラ
ンダムアクセスメモリ)、3は電源装置、4はRAMの
電源をバックアップするための電池、5,6は逆流防止
用のダイオード、71は不正に暗号化装置の扉が開かれ
た場合それを判別する異常判別装置、72は前記異常判
別装置71に応答して動作する平常時接点閉のスイッチ
である。例えば、異常判別装置71として扉の機械的変
化を検出する変位センサを用い、スイッチ72としてセ
ンサ出力により駆動され開となる接点を用いる。又は、
異常判別装置71としてマイク口スイッチのアクチュエ
ー夕を扉に接するようにして用い、スイッチ72として
そのマイクロスイッチの接点機構が用いられる。このよ
うに異常判別装置71とスイッチ72とは別個のもので
あっても、一体のものであってもよい。8は保守時にC
PUI経由でオン・オフするリレーであり、81はリレ
ー8の接点であって平常時開である。
FIG. 1 is a block diagram showing an embodiment of the present invention, in which 1 is a CPU (central processing unit) that controls the entire device;
2 is a RAM (random access memory) that contains secret data for encryption, 3 is a power supply, 4 is a battery to back up the power of the RAM, 5 and 6 are diodes to prevent backflow, and 71 is an unauthorized An abnormality determining device 72 that determines when the door of the encryption device is opened is a switch whose contact is normally closed and operates in response to the abnormality determining device 71. For example, a displacement sensor that detects a mechanical change in the door is used as the abnormality determination device 71, and a contact that is driven to open by the sensor output is used as the switch 72. Or
As the abnormality determination device 71, the actuator of a microphone port switch is used in contact with the door, and as the switch 72, the contact mechanism of the microswitch is used. In this way, the abnormality determination device 71 and the switch 72 may be separate or integrated. 8 is C during maintenance
This is a relay that is turned on and off via the PUI, and 81 is a contact of the relay 8, which is normally open.

平常時、電源部3はCPLI1、RAM2、リレー8等
暗号化データ保全装置が必要とする電源を給電していて
、RAM2は平常時は、@源部3よリダイオード6およ
び平常時接点閉の異常判別装置71のスイッチ72を経
由してRAM2の動作に必要な電源を給電している。
In normal times, the power supply unit 3 supplies the power required by the encrypted data security devices such as CPLI1, RAM2, and relay 8. In normal times, the RAM2 is connected to the power supply unit 3, the rediode 6, and the normally closed contact. Power necessary for the operation of the RAM 2 is supplied via the switch 72 of the abnormality determination device 71.

また、停電時等電源部3への給電がなくなった場合には
、RAM2は電源をバックアップするための電池4より
、ダイオード5および平常時接点閉の異常判別装置71
のスイッチ72を経由して、RAM2に記憶ざれている
内容を保持する為に必要な電源のみを給電している。
In addition, when the power is not supplied to the power supply unit 3 such as during a power outage, the RAM 2 uses the battery 4 for backing up the power supply to detect the diode 5 and the normally closed contact abnormality determination device 71.
Only the power necessary to maintain the contents stored in the RAM 2 is supplied via the switch 72.

そこで暗号化装置の扉が不正に開かれると、異常判別装
置71は作動してスイッチ72が接点開となりRAM2
への給電を停止して、RAM2に保持されていた秘密デ
ータを破壊する。
If the door of the encryption device is opened illegally, the abnormality determination device 71 is activated and the switch 72 contacts open, causing the RAM 2
The secret data held in RAM2 is destroyed.

また、保守時には、例えばテンキーを操作して暗証番号
等を入力するという、正規手続きをとることにより、C
PLI1を経由してリレー8が作動しリレー8の接点8
1閉となる。
Also, during maintenance, by using regular procedures such as operating a numeric keypad and entering a PIN number, etc.
Relay 8 is activated via PLI1, and contact 8 of relay 8
1 closed.

この場合は、暗号化装置の扉を開け異常判別装置71が
作動し、スイッチ72の接点開となっても、RAM2は
電源装置3、ダイオード6、リレー8の接点81を経由
してRAM2の動作に必要な電源を給電出来る為、RA
M2に保持ざれていた秘密データは破壊ざれない。
In this case, even if the door of the encryption device is opened and the abnormality determination device 71 is activated, and the contact of the switch 72 is opened, the RAM 2 will be activated via the power supply device 3, the diode 6, and the contact 81 of the relay 8. Because it can supply the necessary power to the RA
The secret data held in M2 will not be destroyed.

保守後は、暗号化装置の扉を閉め異常判別装置71のス
イッチ72を接点閉とした後、CPtJ1を経由してリ
レー8を復旧させリレー8の接点81を開とすることに
より終了する。
After maintenance, the door of the encryption device is closed and the switch 72 of the abnormality determination device 71 is closed, and then the relay 8 is restored via CPtJ1 and the contact 81 of the relay 8 is opened.

なお、不正にRAM内の秘密データを疎み出す場合には
、CPUを取り外して、インサーキットエミュレー夕を
取り付ける必要があるので異常判別装置は、CPU自身
を蓋う筺体の異常開を検出するようにしてもよい。
In addition, in order to illegally leak confidential data in RAM, it is necessary to remove the CPU and install an in-circuit emulator, so the abnormality detection device is designed to detect abnormal opening of the casing that covers the CPU itself. You can also do this.

また、本発明は、上記実施例に限定されるものではなく
、本発明の趣旨に基づいて種々の変形が可能であり、こ
れらを本発明の範囲から排除するものではない。
Further, the present invention is not limited to the above embodiments, and various modifications can be made based on the spirit of the present invention, and these are not excluded from the scope of the present invention.

(発明の効果〉 以上、詳細に説明したようにこの発明によれば、第三者
が不正に通信装置の暗号化装置や中央処理装置を蓋う筐
体を開けると、RAMへ給電している電源線を切り離し
、RAMへの給電を停止し、RAMの内容を破壊するこ
とにより、比較的安価に暗号化プログラムの流出を防止
することができる。
(Effects of the Invention) As described above in detail, according to the present invention, when a third party illegally opens the casing that covers the encryption device and central processing unit of a communication device, power is supplied to the RAM. By disconnecting the power supply line, stopping power supply to the RAM, and destroying the contents of the RAM, leakage of the encrypted program can be prevented at a relatively low cost.

したがって、本発明により、通信の秘密が保持ざれ、デ
ータの保全による装置の信頼性を高めることができる。
Therefore, according to the present invention, communication secrecy can be maintained, and reliability of the device can be enhanced by data security.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は本発明に係る暗号化データ保全装置の一実施例
のブロック図である。 1・・・CPU,2・・・RAM,3・・・電源装置、
4・・・電池、5,6・・・ダイオード、71・・・異
常判別装置、72・・・スイッチ、8・・・リレー、8
1・・・接点。 特  許  出  願  人 汁 理 士 山 本 恵 第 1 図
FIG. 1 is a block diagram of an embodiment of an encrypted data security device according to the present invention. 1...CPU, 2...RAM, 3...Power supply device,
4... Battery, 5, 6... Diode, 71... Abnormality determination device, 72... Switch, 8... Relay, 8
1... Contact. Patent application Megumi Yamamoto, a human judge, Figure 1

Claims (2)

【特許請求の範囲】[Claims] (1)RAMと協働する中央処理装置のプログラム制御
により暗号化を実施している暗号化装置を含む通信装置
の暗号化データ保全方法であって、 少なくとも前記中央処理装置を蓋う暗号化装置が不正に
開かれたことを判別し、前記RAMへ給電している電源
線を切り離し、RAMの給電を停止することによりRA
M内のプログラムを破壊することを特徴とする暗号化デ
ータ保全方法。
(1) A method for preserving encrypted data in a communication device including an encryption device that performs encryption under program control of a central processing unit that cooperates with a RAM, the encryption device covering at least the central processing unit. The system determines that the RAM has been opened illegally, disconnects the power supply line that supplies power to the RAM, and stops power supply to the RAM.
An encrypted data preservation method characterized by destroying a program in M.
(2)RAMと協働する中央処理装置のプログラム制御
により暗号化を実施している暗号化装置を含む通信装置
における暗号化データ保全装置であって、 RAMへ給電する電源装置と、 少なくとも中央処理装置を蓋う暗号化装置の異常開を判
別する異常判別装置と、 電源装置とRAMとの間を接続し異常判別装置の異常判
別により開とするスイッチと を有することを特徴とする暗号化データ保全装置。
(2) An encrypted data security device for a communication device that includes an encryption device that performs encryption under program control of a central processing unit that cooperates with the RAM, the power supply device that supplies power to the RAM, and at least the central processing unit. Encrypted data characterized by having an abnormality determination device that determines whether an encryption device that covers the device is abnormally open, and a switch that connects a power supply device and a RAM and is opened when the abnormality determination device determines that the error is open. Maintenance device.
JP1307531A 1989-11-29 1989-11-29 Method and apparatus for maintaining cryptographic data Pending JPH03169135A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP1307531A JPH03169135A (en) 1989-11-29 1989-11-29 Method and apparatus for maintaining cryptographic data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP1307531A JPH03169135A (en) 1989-11-29 1989-11-29 Method and apparatus for maintaining cryptographic data

Publications (1)

Publication Number Publication Date
JPH03169135A true JPH03169135A (en) 1991-07-22

Family

ID=17970212

Family Applications (1)

Application Number Title Priority Date Filing Date
JP1307531A Pending JPH03169135A (en) 1989-11-29 1989-11-29 Method and apparatus for maintaining cryptographic data

Country Status (1)

Country Link
JP (1) JPH03169135A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2018534753A (en) * 2015-11-05 2018-11-22 リチウム・エナジー・アンド・パワー・ゲーエムベーハー・ウント・コー.カーゲー Battery system for vehicle

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2018534753A (en) * 2015-11-05 2018-11-22 リチウム・エナジー・アンド・パワー・ゲーエムベーハー・ウント・コー.カーゲー Battery system for vehicle

Similar Documents

Publication Publication Date Title
US8006101B2 (en) Radio transceiver or other encryption device having secure tamper-detection module
US6993654B2 (en) Secure encryption processor with tamper protection
JP3923860B2 (en) Electric management service method
CN103914899A (en) Alarm entrance guard controller and control system and method thereof
CN112182643A (en) Data privacy protection method and device, electronic equipment and storage medium
CN101262669B (en) A secure guarantee method for information stored in a mobile terminal
KR20080069666A (en) Upgradable security module
JPH03169135A (en) Method and apparatus for maintaining cryptographic data
CN107835170A (en) Machine system and method is torn in a kind of intelligent Pos equipment safeties mandate open
US11551544B2 (en) Impeding unauthorized network infiltration at remote critical infrastructure facilities
JP6266430B2 (en) Object management method and system
US20230104923A1 (en) Secure tamper resistant data processing, storage, and transmission gateway and controller and data anomaly detection program
KR100697945B1 (en) Portable information device and method for preventing disclosing a data
CN102541766A (en) Classified memory with security information protecting function based on WSN (wireless sensor network) base station control
US10777376B2 (en) Method and system for hardware tamper detection and mitigation for solid state circuit breaker and its controller
CN101930523B (en) File protection system and method
KR100314409B1 (en) Ram data emergency erase method
CN100357864C (en) Keyboard encrypting method
JP4302922B2 (en) Electronic device, electronic device control method, and electronic device control program
CN107168122B (en) A kind of power equipment case centralized control system and method
TWI412950B (en) Document protection system and method thereof
CN107980136A (en) Data processing equipment and the method for running the data processing equipment
US20230376619A1 (en) Tamper and zeroization response unit
CN112948808B (en) Authorization management method and system, authorization management device and embedded device
CN111708293A (en) MCU design method with active defense function and online debugging function