JPS60171536A - Function secrecy system - Google Patents

Function secrecy system

Info

Publication number
JPS60171536A
JPS60171536A JP59027787A JP2778784A JPS60171536A JP S60171536 A JPS60171536 A JP S60171536A JP 59027787 A JP59027787 A JP 59027787A JP 2778784 A JP2778784 A JP 2778784A JP S60171536 A JPS60171536 A JP S60171536A
Authority
JP
Japan
Prior art keywords
station
slave station
function
data
slave
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP59027787A
Other languages
Japanese (ja)
Inventor
Kenji Hara
憲二 原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yaskawa Electric Corp
Original Assignee
Yaskawa Electric Manufacturing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yaskawa Electric Manufacturing Co Ltd filed Critical Yaskawa Electric Manufacturing Co Ltd
Priority to JP59027787A priority Critical patent/JPS60171536A/en
Publication of JPS60171536A publication Critical patent/JPS60171536A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To attain the secrecy of function by securing a common functional equation for both upper and lower data processings, comparing the arithmetic results of random number data between both processings and opening the own function only when the coincidence is obtained from said comparison. CONSTITUTION:In case the privacy is needed for a function D among those functions A-D of a slave station 1, the station 1 transmits the data (x) which is delivered and not prescribed by a random number generating means set within the station 1 to a master station 2. The station 2 supplies the received data (x) to a functional equation y=f(x) of its own to obtain (y). The station 2 sends the (y) back to the station 1. The station 1 supplies the received (y) and the data (x) sent to the station 2 to obtain (y'). If y=y' is obtained from a comparison, the function D is opened. While the function D is not opened in the case of ynot equal to y'.

Description

【発明の詳細な説明】 〔産業上の利用分野」 本発明は、データ処理装置の機能を秘匿する方式に関す
る。
DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to a method for concealing the functions of a data processing device.

さらに詳しくは、工場自動化(FuctoryAuto
mation )に供されるマイクロプロセッサを搭載
した制御装置(FAコントローラと称されている)の機
能を秘匿し、ある条件のときのみ所定の機能を開放し、
データ処理を行わせるようにする方式に関するものであ
る。
For more information, see Factory Automation.
The functions of a control device equipped with a microprocessor (referred to as an FA controller) used in
This relates to a method for performing data processing.

しかしながら1本発明はこの分野に限られることなく、
上位データ処理装置と、下位データ処理装置のデータコ
ミーニケーションを、ある条件のときのみ行わせるよう
にする方式として一般に適用可能であることは、以下の
説明で明らか#Cなろう。
However, the present invention is not limited to this field;
It will be clear from the following description that this method is generally applicable as a method for causing data communication between a higher-level data processing device and a lower-level data processing device to be performed only under certain conditions.

〔背景技術J 従来、各種の工業用制御装置は各種のモジ−一ル(ユニ
ット)群から構成されていた。
[Background Art J Conventionally, various industrial control devices have been composed of various module groups.

そのため、これらのモジュールは、前記工業用制御装置
から見ればひとつの部品でるり、種々の機能をもまたも
のを多品種生産する必要があっだ。
Therefore, from the perspective of the industrial control device, these modules are a single part, but it is necessary to produce a wide variety of modules with various functions.

しかしながら、工場自動化のためのFAコントローラを
、安価に、しかも効率良く実現するためには、各モジ、
−ルにCPUを搭載して、インテリジェント化を行い、
CP Uのソフトウェアで各種機能を実現することが必
要となる。(ちなみに、本発明者は、このインテリジェ
ント化されたモジュールを「機能モジュール」と呼んで
いる。)これによって今まで多種必要であまたモジーー
ルを整理でき、ひいては製造コストの削減が可能となる
からである。
However, in order to realize an FA controller for factory automation at low cost and efficiently, each module,
- Equipped with a CPU to make it intelligent,
It is necessary to implement various functions using CPU software. (Incidentally, the inventor calls this intelligent module a "functional module.") This makes it possible to organize the various modules that were previously required, which in turn makes it possible to reduce manufacturing costs. .

ところが、このようにインテリジェント化を進め、ひと
つのモジュールが多種の機能を有するようにすると、製
造会社が自社内で使用するだめの機能(社内用機能)と
、モジュール購入者が使用する機能(外販用機能)とが
混在することになる。
However, as intelligent technology advances and a single module has a wide variety of functions, there are functions that manufacturing companies cannot use internally (in-house functions) and functions that are used by module purchasers (externally sold functions). functions) will be mixed.

そうなった場合、社内で使用するために多大の投資を行
1て開発した機能をモジュール購入者が自由に使えると
いうのVi製造会社にとって大きな損失となる。
If this happens, it will be a big loss for the Vi manufacturing company, as the module purchaser will be able to freely use functions that it has invested and developed for internal use.

そこで、製造会社の社内で使用する機能もしくは、特定
の利用者のみに使用させる機能(は、購入者には開放せ
ず、秘匿しておくことが必要となってくる。
Therefore, functions that are used internally by a manufacturing company or functions that are only available to specific users need to be kept secret and not made available to purchasers.

容易に考えられる手段としては、ソフトウェアが格納さ
れるFROMを社内用と外販用の2種を用意することで
あるが、これでは、製造工程の繁雑化を1ねき、しかも
部品が社内用と外販用とで異なることになり、品質管理
上も得策でない。
An easy way to think of this is to prepare two types of FROM in which software is stored, one for internal use and one for external sales, but this would only make the manufacturing process more complicated, and also avoid parts being used internally. This is not a good idea from a quality control point of view as it will be different for external sales.

また、ジャンパー線や、スイッチ等で、社内用と外販用
を切り替える方式では、容易に見やふられ、心無い者に
よって盗用(プログラムの複写)されてしまう。
In addition, using jumper wires, switches, etc. to switch between in-house use and external use allows easy oversight and theft (copying of programs) by unscrupulous people.

〔先行出願の開示j プログラムの複写もしくは無断使用を防止するものとし
て、特開昭57−86964.特開昭57−11179
2などが提案されている。
[Disclosure of Prior Applications] To prevent copying or unauthorized use of programs, Japanese Patent Laid-Open No. 57-86964. Japanese Patent Publication No. 57-11179
2 etc. have been proposed.

ところが前者は汎用大型電算機の利用者を制限するもの
であり、後者はNO工作機用NCテープカセットからの
複写を防止するものであるが、あらかじめ所定の「キー
」(暗唱番号)を設定しておく手間が必要となっている
However, the former restricts users of general-purpose large-sized computers, and the latter prevents copying from NC tape cassettes for NO machine tools, but a predetermined "key" (recitation number) must be set in advance. It requires time and effort to maintain it.

また、1口ない者にとっては、その「キー」を探し出す
のは、さほど困難なものでなく、機能の秘匿は完全でな
い。
Furthermore, for those who don't have one mouth, it is not very difficult to find the "key", and the functions are not completely hidden.

〔発明の目的」 本発明は、このような問題点に鑑みてなされたもので、
モジュールの機能を開放するキーを第3者がめることが
不可能な方式を提供することを目的とする。
[Object of the invention] The present invention was made in view of the above problems, and
It is an object of the present invention to provide a method in which it is impossible for a third party to insert a key to open the functions of a module.

〔発明の要旨」 上記目的を達成するため、本発明は上位及び下位のデー
タ処理装置の双方が共通の関数式を備え、一方が乱数デ
ータを他方に送信するとともに、その乱数データを前記
関数式に入力して得た答と、他方よシ返送された演算結
果とを比較し、同一であるときのみ自己の機能を開放す
るにしたことに特徴がある。
[Summary of the Invention] In order to achieve the above object, the present invention provides that both upper and lower data processing devices have a common function formula, one transmits random number data to the other, and the random number data is transmitted to the function formula. It is unique in that it compares the answer obtained by inputting it to the calculation result sent back from the other side, and only opens its own functions when they are the same.

〔発明の実施例〕[Embodiments of the invention]

以↑第1図及び第2図を参照して本発明の具体的実施例
を説明する。
Hereinafter, specific embodiments of the present invention will be described with reference to FIGS. 1 and 2.

第1図は、本発明の概念を示すブロック図であシ、従局
1が主局2に隷属している。この従局1が前述の機能モ
ジュールの単体(単一ブロック)を意味し、主局2は主
として通信制御をつかさどる装置でロシ、多数の従局1
を統括する。
FIG. 1 is a block diagram showing the concept of the present invention, in which a slave station 1 is slaved to a master station 2. In FIG. This slave station 1 means a single unit (single block) of the above-mentioned functional module, and the master station 2 is a device mainly in charge of communication control.
supervise.

−例として、ここでは従局1がA、B、C,Dの4つの
機能を持っており、このうちDは社内用機能であって社
外には秘゛匿する必要があるものとする。
- As an example, here it is assumed that the slave station 1 has four functions A, B, C, and D, and among these, D is an in-house function and needs to be kept secret from outside the company.

つまり、従局1は社内用と外販用が共通で、単体で外販
されることを予定している。
In other words, slave station 1 is intended for both internal and external sales, and is planned to be sold separately.

なお主局2は、社内用と外販用とが区別され、これから
説明するように、前記機能りを開放する手段を備えるも
のが社内用となる。
The main station 2 is divided into those for internal use and those for external sales, and as will be explained below, those equipped with a means for opening the above functions are those for internal use.

さて、前記機能りを開放するため、本発明では主局及び
従局に、同一の関数式y=f(x) に従って演算する
機能を備えて、イニシャル時に、第2図に示すフローの
コミュニケーションを行う。
Now, in order to release the above-mentioned functions, in the present invention, the main station and the slave station are provided with the function of calculating according to the same functional formula y=f(x), and at the initial time, communication according to the flow shown in FIG. 2 is performed. .

以下順を追って説明する。A step-by-step explanation will be given below.

(al まず従局1は、主局2に対し、規定されないデ
ータX(例えば、自局内に設けた乱数発生手段によって
出力されたデータ)を送信する。
(al) First, the slave station 1 transmits to the master station 2 unspecified data X (for example, data output by a random number generation means provided within the slave station).

(l〕)主局2は受信したデータXを自局に有する関数
式y=’f(x)に入力し請求めたyを従局Iに送信す
る。
(l) The master station 2 inputs the received data X into the functional formula y='f(x) in its own station, and transmits the requested y to the slave station I.

(C1従局1は、受信したyと、自局内の関数式y’=
f(x)に、(alで送信したデータXを入力してめた
y/ とを比較し、y=y’ であれば、機能りを開放
する。
(C1 slave station 1 uses the received y and the function formula y'=
Compare f(x) with y/, which was obtained by inputting the data X sent in (al), and if y=y', the function is released.

なお、y’=y’ であれば、Dの機能は開放されずに
コミュニケーションを終わる。
Note that if y'=y', the communication ends without the function of D being released.

つ捷り、主局と従局の関数式が一致しないと機能モジュ
ールの0機能は動作しないのである。
If the function equations of the master station and slave station do not match, the 0 function of the functional module will not operate.

〔発明の効果J 以上述べたように本発明によれば、外販される機能モジ
ュールに社内用の機能が含1れていても、所定の関数式
を関知しない第3者にとっては、その社内用機能は開放
できず、製造業者の機密を完全に保護することができる
[Effect of the Invention J As described above, according to the present invention, even if a function module sold externally includes a function for internal use, a third party who is not familiar with the predetermined function The functions cannot be opened and the manufacturer's secrets can be completely protected.

しかも社内用と外販用とが同一となるので、その製造工
程が簡略化し、安価に製造できる。
Furthermore, since the products for internal use and those for external sales are the same, the manufacturing process is simplified and the product can be manufactured at low cost.

また、心無い第3者が、なんダかのキーをめようと、デ
ータX及びデータyをモニタしても、データXが乱数等
の一定でない値であるので、その試みは完全に失敗する
Furthermore, even if an unscrupulous third party monitors data X and data y in an attempt to find a key, the attempt will completely fail because data X is a non-constant value such as a random number.

以上、機能モジュールについて説明を加えたが、大型コ
ンピュータとハンドベルトコンピュータ間のコミュニケ
ーションや、その他データ処理装置の機能を秘匿する方
式として、本発明を容易に適用できることは明らかであ
る。
Although the functional modules have been described above, it is clear that the present invention can be easily applied as a system for concealing communication between a large-sized computer and a hand belt computer, and other functions of a data processing device.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は本発明の概企図、第2図は本発明の動作を示す
フローチャー1・である。 l:従局、2:主局
FIG. 1 is a schematic diagram of the present invention, and FIG. 2 is a flowchart 1 showing the operation of the present invention. l: slave station, 2: master station

Claims (2)

【特許請求の範囲】[Claims] (1) 複数の機能を有する従局と、その従局群を通信
制御によって統括する主局からなるシステムにおいて− 従局と主局に共通の関数式にもとづいて演算を行う手段
を備え、 従局は主局に対し任意データを送信するとともに、従局
内でこの任意データを前記関数式に代入して演算し、 主局は受信した前記任意データを主局内の前記関数式に
代入して演算し、その結果を従局に返信し、 従局はその返信された演算結果と5、前記従局内、での
演算結果とを比較し、一致したときのみ従局が有する所
定の機能の使用を許可することを特徴とする機能秘匿方
式。
(1) In a system consisting of a slave station with multiple functions and a master station that controls the slave stations through communication control, the slave station is equipped with a means for performing calculations based on a function formula common to the slave station and the master station, and the slave station is connected to the master station. At the same time as transmitting arbitrary data to the slave station, this arbitrary data is substituted into the above-mentioned function formula in the slave station and calculated, and the master station substitutes the received arbitrary data into the above-mentioned function formula in the main station and calculates the result. is returned to the slave station, and the slave station compares the returned calculation result with the calculation result in the slave station, and only when they match, allows the slave station to use a predetermined function. Functional concealment method.
(2) 前記任意データは、従局内に備えた乱数発生手
段によって発生した乱数データとすることを特徴とする
特許請求の範囲第1項記載の機能秘匿方式。
(2) The function concealment system according to claim 1, wherein the arbitrary data is random number data generated by a random number generating means provided in the slave station.
JP59027787A 1984-02-15 1984-02-15 Function secrecy system Pending JPS60171536A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP59027787A JPS60171536A (en) 1984-02-15 1984-02-15 Function secrecy system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP59027787A JPS60171536A (en) 1984-02-15 1984-02-15 Function secrecy system

Publications (1)

Publication Number Publication Date
JPS60171536A true JPS60171536A (en) 1985-09-05

Family

ID=12230683

Family Applications (1)

Application Number Title Priority Date Filing Date
JP59027787A Pending JPS60171536A (en) 1984-02-15 1984-02-15 Function secrecy system

Country Status (1)

Country Link
JP (1) JPS60171536A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01248265A (en) * 1988-03-30 1989-10-03 Hitachi Ltd System for limiting use of system
JPH05327693A (en) * 1990-12-17 1993-12-10 Nippon Telegr & Teleph Corp <Ntt> Authentication method in digital mobile communication
JPH11110193A (en) * 1997-09-30 1999-04-23 Toshiba Corp Computer system and library link method applied to the computer system
JP2002346336A (en) * 2001-05-28 2002-12-03 Tousetsu:Kk Apparatus for detoxifying poisonous gas
JP2004227077A (en) * 2003-01-20 2004-08-12 Seiko Epson Corp Information viewing system, information play-back device and information providing device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01248265A (en) * 1988-03-30 1989-10-03 Hitachi Ltd System for limiting use of system
JPH05327693A (en) * 1990-12-17 1993-12-10 Nippon Telegr & Teleph Corp <Ntt> Authentication method in digital mobile communication
JPH11110193A (en) * 1997-09-30 1999-04-23 Toshiba Corp Computer system and library link method applied to the computer system
JP2002346336A (en) * 2001-05-28 2002-12-03 Tousetsu:Kk Apparatus for detoxifying poisonous gas
JP2004227077A (en) * 2003-01-20 2004-08-12 Seiko Epson Corp Information viewing system, information play-back device and information providing device

Similar Documents

Publication Publication Date Title
Rheinboldt Differential-algebraic systems as differential equations on manifolds
Apkarian et al. Continuous-time analysis, eigenstructure assignment, and H/sub 2/synthesis with enhanced linear matrix inequalities (LMI) characterizations
Meadows Applying formal methods to the analysis of a key management protocol
RU2147790C1 (en) Method for transferring software license to hardware unit
US7627119B2 (en) Encryption of control programs
US5173939A (en) Access control subsystem and method for distributed computer system using compound principals
CN108616539A (en) A kind of method and system that block chain transaction record accesses
US5940506A (en) Method of using a hand-held device to protect information stored in a computer system
JP2001252884A (en) Robot, robot system, and method of controlling robot
ATE278218T1 (en) SECURE COMPUTER ARCHITECTURE
JPS61141065A (en) Bus system
EP0740241A3 (en) Control system for semiconductor spray process tools
JP2022141772A (en) Cryptographic datashare control for blockchain
JPS60171536A (en) Function secrecy system
CN111797374A (en) Supply chain access control system and method based on public chain intelligent contract
US5805802A (en) Module for the protection of software
CN109391469B (en) Method and device for implementing safety function in control field
US7103769B1 (en) IEEE 1394 link layer chip with “5C” authentication and key exchange accelerator
US20210349449A1 (en) Systems and methods for distributed control of manufacturing processes
Bailey et al. Bounds on suboptimality in the control of linear dynamic systems
CN115712371A (en) Customer service robot operation method, server, operation system, electronic device and storage medium
JP2006500814A5 (en)
KR920007479B1 (en) Method for holding security of data transmission
CN108257319A (en) A kind of USBKEY secure storages cabinet and its application process with encryption and decryption functions
JPS6423642A (en) Confidential information sharing system