TW200402010A - Encryption system and encryption device - Google Patents

Encryption system and encryption device Download PDF

Info

Publication number
TW200402010A
TW200402010A TW92112603A TW92112603A TW200402010A TW 200402010 A TW200402010 A TW 200402010A TW 92112603 A TW92112603 A TW 92112603A TW 92112603 A TW92112603 A TW 92112603A TW 200402010 A TW200402010 A TW 200402010A
Authority
TW
Taiwan
Prior art keywords
terminal
cryptographic
network
data
mentioned
Prior art date
Application number
TW92112603A
Other languages
Chinese (zh)
Other versions
TWI276018B (en
Inventor
Akira Okamoto
Makoto Izawa
Hiromitsu Narita
Original Assignee
Micro Res Lab Inc
Niigata Seimitsu Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Micro Res Lab Inc, Niigata Seimitsu Co Ltd filed Critical Micro Res Lab Inc
Publication of TW200402010A publication Critical patent/TW200402010A/en
Application granted granted Critical
Publication of TWI276018B publication Critical patent/TWI276018B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to encryption system and encryption device. An encryption device (1) for performing encryption/decryption to terminate security by encryption between personal computers (7 to 9) having encryption software is connected between the personal computer (7 to 9) and terminals (2 to 4) having no encryption software. The encryption device (1), for example, encrypts data received from a DB server (3) before transmitting the data to the personal computer (7) and decrypts the data received from the personal computer (8) before transmitting the data to a network printer (2). Thus, it is possible to use encryption in an enterprise LAN having terminals (2 to 4) in which dedicated encryption software cannot be installed, thereby building a network (10) having little danger of that secret information in the LAN is stolen by an unauthorized intrusion and attack from outside.

Description

200402010 Ο) 玖、發明說明 【發明所屬之技術領域】 本發明有關於密碼系統及密碼裝置,特別是適用於在 於網絡上可以減低由外部之攻擊而資訊之盗取或塗改等之 缺點而實施資訊之密碼化/解碼處理之系統及裝置而合宜 之密碼系統及密碼裝置。 【先前技術】 如果以單獨台使用個人電腦時,個人電腦內部之資訊 之被盗取或改塗改之危險性少。惟將個人電腦連接於網路 等之網絡時,即由於交換(接·送)之資訊乃在於很多之網 絡中被轉轉發送,因此在該途中被盗取塗改之機會係一下 子地增多。又從外部之不正當存取而被盗取、塗改等情形 也增多。 爲了解決此問題而有:防火牆、抗病毒、存取控制、 資訊之密碼化、VPN(Virtual Private Network)等等,其中 利用密碼化之系統乃,將資訊予以密碼化後送至對方,而 將它解碼後予以利用,採如上述之措施之後,就算是在於 網絡之中途而資訊之被盗取之時,由於資訊被密碼化所以 資訊本身之被閱見之可能性少,又被塗改之缺點也可以減 低。又在VPN係使用實質的專用線而抑取來自外部之不當 存取。 上述之保全(保密)技術乃分別單獨地供使用’惟任意 的組合使用時’更可提高保全效果。 (2) (2)200402010 例如,在於VPN網絡中有實施密碼化之系統之存在。 此種系統予以分類時可以分類爲:①Site-To-Site型、② Remote-Access型、③End-To-End型之三型。第1圖係說明 這些三型之密碼系統之圖。 第1圖所示,在於VPN網絡中,複數之桌上型個人電 腦101A之藉由LAN(Local Area Network)(區域網絡)等所連 接之擬點A網絡100 A,及複數之桌上型個人電腦10 1B之藉 由LAN所連接之擬點B網絡100B係介著構成假想專用線之 網絡200而被連接而成。 在於Site-To-Site型時乃,在於各擬點網絡100A, 100B之出入口設置閘路(gateway)10 2A,102B,而在於該 閘路102A,102B實施密碼化/解碼處理,由而在於閘路間 之網絡200實施資料之密碼通訊。 在於Remote Access型係在於閘路102A,102B與遙控 終端機103,104之間實施密碼化/解碼處理,由而在於閘 路與遙控終端機之間實施資訊之密碼通訊。 上述之任一型式乃均只在於擬點網絡100A,100B之 外部而實施密碼通訊者,具有擬點內之資訊完全沒有被保 護之缺點。構築於擬點內之LAN係連接於網路(Inter Net) 等之網絡(Net-Work)200,必要時由LAN內之個人電腦對 於網絡實施存取由而可以實施資訊之互相交換(接·交)。 惟如這樣LAN係連接於網路,即由發生由外部之不正當之 侵入或攻擊而LAN內部之資訊之被盗取或塗改之危險性。 此時,擬點網絡100A,100B之出入口之閘路102A, -6- (3) (3)r200402010 10 2B乃容易成爲由外部之攻擊之對象,負荷也會集中,因 此具有必要設置昂貴之機器,且對於這些機器個別的做難 解之設定及管理之缺點。 再者,也具備各擬點網絡100A,100B之內部乃對於 除了閘路以外之侵入□(經由無線LAN等)之侵入即完全沒 有防備之缺點。 對於上述之問題,End-To-End型乃在於擬點網絡100A ,100B內之各桌上型個人電腦101A,101B而實施密碼化/ 解碼處理,由而在於對象之終端機間實施密碼通訊。依此 型時,不管在於擬點內或擬點外,完全可以保護資訊,所 以完全解決Site-To-Site型、Remote Access型之上述缺點。 由於以往終端機之處理能力低,所以End-To-End型非現實 ,惟由於半導體(特別是CPU處理能力)之進步而最近即成爲 可能實現。 惟欲在於End-To-End型中利用密碼起見,須要在於擬 密碼通訊之終端機之全部,安裝密碼軟體,施予各種設定 才行。但是連接於擬點網絡1〇〇 A,100B內之LAN等之終端 機卻有,可以安裝密碼軟體之桌上型個人電腦101 A,10 1B 以外之終端機也存在。 例如,印表機、傳真等物理的無法安裝密碼軟體之終 端機,或印表機伺服器或資料庫伺服器等等由於動作安定 上等之問題而不宜安裝多餘之軟體之終端機,沒有OS (操 作系統)之具備單純之網絡終端功能之終端機等等也存在 ,所以雖然在於End-To-End型之密碼系統上,仍然無法利 (4) (4)「200402010 用密碼,具有不能有效的保護資訊之問題存在。 再者,在於以往之End-To-End型密碼系統乃,在於複 數擬點內之終端間,實施密碼通訊者,只在於一個擬點之 封閉之世界中(例如只在於擬點A網絡1 0 0 A內)就無法利用 密碼。又例如在於擬點B網絡100B內有無法安裝密碼軟體 之終端機存在之情形,或在於擬點B網絡1 〇 〇 B內,備有龐 大數目之終端機’由而對於這些全部安裝密碼軟體係不現 實等情形時,即在於擬點A,B間不能利用End-To-End型之 密碼系統’在這種情形時,如果有至少在於擬點A網絡 100 A內地利用密碼之要求時,以往並沒有實現該要求之手 段。 本發明乃爲了解決上述問題所創作,其目的乃提供一 種在於具有無法安裝密碼軟體之終端機之企業LAN之中亦 可以利用密碼,由而減低由來自外部之不正當侵入或攻擊 而LAN內部之機密資訊之被盗取塗改之危險性者。 再者本發明之另一目的爲,在於複數之擬點間竇施資 訊時,於只在於一個封閉之擬點網絡內也可以利用密碼實 施通訊。 【發明內容】 本發明之密碼系統’乃直接或間接的連接,介著網絡 實施資料通訊之複數之終端機,與設置於上述複數之終端 機之間之專用之密碼裝置或載置密碼處理功能之中繼裝置 而成之密碼裝置中’在於上述密碼裝置或上述中繼裝置中 -8- (5) (5)200402010 ,將由某一擬點網絡之內部或在其外部之某一方之終端機 所受訊之資料密碼化,而送訊至在於上述或某一擬點網絡 之內部之另一方之終端機,同時將由上述另一方之終端機 所受訊之資料之密碼予以解碼後送訊至上述一方之終端機 的構成爲其特徵。 本例中之專用之密碼裝置係指專門的實施資料之密碼 化處理或解碼處理之裝置。又載置密碼化處理之功能之中 繼裝置乃,只要具有可以實施資料之密碼化處理及解碼處 理之功能即又備有其他功能也可以之裝置而言。 在於本發明之其他態樣乃直接或間接的連接介著網絡 實施資料通訊之複數之終端機,與設置於上述複數之終端 機之間之專用之密碼裝置,或載置了密碼處理功能之中繼 裝置而成之密碼系統中,在於上述密碼裝置或上述中繼裝 置中,將由在於某一擬點網絡之外部之上述網絡所受訊之 資料予以密碼化而送訊至在於上述或某一擬點網絡之內部 之上述終端機,同時將由上述終端機所受訊之資料之密碼 予以解碼後送訊至上述網絡的構成爲其特徵。 本發明之其他之態樣乃,介著有線或無線之網絡連接 :在於某一擬點網絡之內部之具備密碼處理功能之第1之 終端機,與在於上述或某一擬點網絡之內部或外部之不具 備密碼處理功能之第2之終端機,與配置於上述第i之終端 機與第2之終端機之間,用於實施資料之密碼化處理或解 碼處理之密碼裝置或中繼裝置而成之密碼系統中,上述密 碼裝置或中繼裝置乃,具備有:爲了終端與上述第1之終端 -9 - 200402010 ⑹ 機之間而藉密碼化之保全而實施資料之密碼化處理及解碼 處理之密碼化/解碼手段,及將由一端口所輸入,藉上述密 碼化/解碼手段施予密碼化處理或解碼處理之資料輸出於 其他端口之資料轉送手段爲其特徵。 本發明之其他態樣乃上述密碼化/解碼手段係在於與上 述第1之終端機之間實施被密碼化之資料通訊,同時在於 與上述第2之終端機之終端機乃爲了實施沒有密碼化之資 料之通訊而實施上述密碼化處理及上述解碼處理爲其特徵 〇 本發明之其他態樣乃上述中繼裝置係具備有,將上述 密碼化/解碼手段之功能予以積體化之半導體晶片爲其特 徵。 本發明之其他態樣乃上述半導體晶片係具設於訊號之 送受訊部與基頻帶處理器之間爲其特徵。 又本發明之密碼裝置乃直接或間接的連接於介著網絡 實施資料通訊之複數之終端機之間,將由在於某一擬點網 絡之內部或外部之一方之終端機所受訊之資料予以密碼化 而送訊至在於上述或某擬點網絡之另一方之終端機,同時 ,將由上述另一方之終端機所受訊之密碼予以解碼,送訊 至上述一方之終端機爲其特徵。 本發明之其他態樣乃在於介著網絡實施資料通訊之終 端機與該網絡之間,直接或間接的連接於上述終端機,將 由在於某擬點網絡之外部之上述網絡所受訊之資料予以密 碼化而送訊至在於上述或某一擬點網絡內部之上述終端機 -10- (7) (7)200402010 ,同時,將由上述終端機所受訊之資料之密碼予以解碼送 訊至上述網絡爲其特徵。 本發明之其他態樣乃在於介著網絡實施資料通訊之複 數之終端機之間,直接或間接的連接於在於某一擬點網絡 之內部之一方之終端機近傍, 將由在於上述某一擬點網絡之內部或外部之另一方之 終端機所受訊之資料之密碼予以解碼,送至上述一方之終 端機,同時將由上述一方之終端機所受訊之資料予以密碼 化送訊至上述另一方之終端機爲其特徵。 本發明之其他態樣乃介著有線或無線之網絡連接於, 在於某一擬點網絡之內部之具有密碼處理功能之第1之終 端機,與在於上述或某一擬點網絡之內部或外部之不具備 密碼處理功能之第2之終端機之間,具備:在於與上述第1 之終端機之間,爲了終端藉密碼化之保全起見,實施資料 之密碼化處理及解碼處理之密碼化/解碼手段,及將由一 方之端口所輸入之藉上述密碼化/解碼處理手段而被密碼 化處理或解碼處理之資料輸出於其他端口之資料轉送手段 爲其特徵。 本發明之其他態樣乃上述密碼化/解碼手段乃,在於與 上述第1之終端機之間係實施密碼化之資料之通訊’在於 與上述第2之終端機之間係爲了實施沒有密碼化之資料之 通訊起見,實施上述密碼化處理及上述解碼處理爲其特徵 〇 本發明之其他態樣乃將上述密碼化/解碼手段以及上述 -11- 200402010 ⑼ 資料轉送之功能藉積體化於半導體晶片而構成爲其特徵。 本發明之其他態樣乃在於某一擬點網絡之內部之不具 有密碼處理功能之第1之終端機,與在於上述某一擬點網 絡內部或外部之具有密碼處理功能之第2之終端機之間’ 介著有線或無線之網絡連接於上述第1之終端機之近傍, 具備:爲了終端,在於與上述第1之終端機之間之藉密碼 化之保全而實施資料之密碼化處理及解碼處理之密碼化/ 解碼手段,及 將由一端口所輸入之由上述密碼化/解碼手段而施予 密碼化處理或解碼處理之資料輸出於其他端口之資料轉送 手段爲其特徵。 【實施方式】 (第1之實施形態) 下面依附圖說明本發明之第1實施形態。 第2圖表示適用本實施形態之密碼裝置之第1實施形態 之密碼系統之構成例之圖。 第2圖中符號1係本實施形態之密碼裝置(依本發明之專 用之密碼裝置或載置之密碼處理功能之中繼裝置均可)。 具有二個端口,在一方之端口連接網絡印表機2,DB伺服 器3,網絡終端機4等之裝置,在另一端口連接有集線器5 〇 本密碼裝置1乃,在於網絡印表機2,D B伺服器3,網 絡終端機4等之裝置與集線器5之間實施資料之中繼。 -12- 200402010 Ο) 網絡印表機2係物理的不能安裝密碼軟體之終端機。 DB伺服器3係由於動作安定上等之理由不合宜於安裝 多餘之密碼軟體之終端機。 網絡終端機4係沒有OS (操作系統)由而不能使密碼軟體 動作之終端機。所以設爲這些終端機2〜4沒有安裝密碼軟體 〇 又,集線器5係在於0 SI參照模式之物理層而中繼資料 之機器。除了連接上述密碼裝置1之外,也連接無線通訊用 之存取點(存取站)6,及桌上型個人電腦7。即此時之集線器 5係在於密碼裝置1,及存取點6及桌上型個人電腦7之間實 施資料之中繼。 又,在於上述存取點6,以無線連接桌上型個人電腦8 及膝上型個人電腦9。在於桌上型個人電腦7、8及膝上型個 人電腦9上可能安裝實施資料之密碼化及解碼之用之密碼軟 體,而設爲已安裝有密碼軟體。 如上所述,本實施形態之密碼裝置丨係具有二個端口, 對於一方之端口,介著集線器5或存取點6而間接的連接有 屬於具有密碼處理功能之終端機之個人電腦7〜9。 又在於另一端口,直接連接有’網絡印表機2,DB伺 服3 ’網絡終5而機4。並且由這些密碼裝置1,網絡印表機 2 ’ D B伺服器3,網絡終端機4,集線器5,存取點6,個人 電腦7〜9而構成一個擬點網絡。 由上述之構成,而在於未安裝(載置)密碼軟體之網絡 印表機2 ’ D B伺服器3及網絡印表機4,與安裝(載置)有密 -13- (10) (10)200402010 碼軟體之個人電腦7〜9(這些裝置2〜4、7〜9均相當於本發明 之終端機)之間,得介著密碼裝置1,集線器5及存取點6實 施資料通訊。 此時密碼裝置1係在於,與安裝有密碼軟體之個人電 腦7〜9之間實施密碼化之資料通訊,同時在於與沒有安裝 密碼軟體之終端機2〜4之間即爲了實施沒有密碼化之資料 通訊起見,實施密碼化處理以及密碼之解碼處理。 例如欲從桌上型個人電腦7對於網絡印表機2送出資料 印出時’首先使用安裝於桌上型個人電腦7之密碼軟體而 將資料密碼化,介著集線器5供給於密碼裝置1。接著密碼 裝置1係將所受訊之資料予以解碼,送到網絡印表機2。 又,例如欲將由D B伺服器3所管理之資料取入於膝上型 個人電腦9時,DB伺服器3乃隨應於要求將該要求之資料供 給於密碼裝置1,接受了該未密碼化之資料之密碼裝置1乃 將該資料密碼化之後,介著集線器5及存取點6送訊至膝上 型個人電腦9。膝上型個人電腦9係將所受訊之資料予以解 碼後利用於所欲之處理。 由上述之說明可以明瞭,由於使用本實施形態之密碼 裝置1,由而在於具備有不能安裝專用之密碼軟體之終端機 2〜4之企業內LAN之內,也可以利用密碼。由而可以構築, 由來自外部之不正當侵入或攻擊而LAN內部之機密資訊之被 盗取、塗改之危險性少之保全網路也。 又,密碼裝置1與各終端機2〜4之間,雖然不能利用密 碼,惟連繫這些之電纜11係物理的短之配線,此部份之由外200402010 〇) Description of the invention [Technical field to which the invention belongs] The present invention relates to cryptographic systems and cryptographic devices, and is particularly suitable for implementing information on the network to reduce the shortcomings of theft or alteration of information by external attacks. System and device for cryptographic / decoding processing and suitable cryptosystem and device. [Prior art] If a personal computer is used on a separate computer, there is less danger that the information inside the personal computer will be stolen or altered. However, when a personal computer is connected to a network such as the Internet, the information exchanged (received / sent) is retransmitted in many networks, so the chances of being stolen and altered in the process are increased. The number of cases such as theft and alteration caused by unauthorized access from outside also increased. In order to solve this problem, there are: firewall, anti-virus, access control, information encryption, VPN (Virtual Private Network), etc. Among them, the system using encryption is to encrypt the information and send it to the other party, and send It is decoded and used. After taking the measures described above, even if the information is stolen in the middle of the network, because the information is encrypted, the information itself is less likely to be seen, and it is altered. It can also be reduced. In addition, in the VPN system, a substantial dedicated line is used to suppress inappropriate access from the outside. The above-mentioned security (confidentiality) technology is provided separately for use, but when used in any combination, the security effect can be further improved. (2) (2) 200402010 For example, there is a system that implements encryption in the VPN network. This system can be classified into three types: ① Site-To-Site type, ② Remote-Access type, ③ End-To-End type. Figure 1 is a diagram illustrating these three types of cryptosystems. As shown in FIG. 1, in a VPN network, a plurality of desktop personal computers 101A are connected to a quasi-point A network 100 A via a LAN (Local Area Network), and a plurality of desktop individuals The quasi-point B network 100B connected to the computer 10 1B via the LAN is connected via a network 200 constituting a virtual dedicated line. In the case of the Site-To-Site type, a gateway 10 2A, 102B is provided at the entrance and exit of each quasi-point network 100A, 100B, and the gateway 102A, 102B implements a ciphering / decoding process. The road-to-road network 200 implements cryptographic communication of data. The remote access type is to implement the encryption / decoding process between the gates 102A, 102B and the remote terminals 103, 104, and thus to implement the cryptographic communication of information between the gates and the remote terminals. Any of the above-mentioned types are those who implement cryptographic communication only on the outside of the quasi-point network 100A, 100B, and have the disadvantage that the information in the quasi-point is not protected at all. The LAN built in the virtual network is connected to a network (Net-Work) 200 such as a network (Inter Net). If necessary, the personal computer in the LAN can access the network to exchange information (connection · cross). However, if the LAN is connected to the network in this way, there is a danger that the information inside the LAN will be stolen or altered due to an unauthorized intrusion or attack from the outside. At this time, the gates 102A, -6- (3) (3) r200402010 10 2B at the entrances and exits of the quasi-point network 100A, 100B are easy to be the target of external attacks, and the load will be concentrated, so it is necessary to install expensive equipment. And, for these machines, the shortcomings of individual settings and management are difficult to understand. In addition, there are disadvantages that the inside of each of the quasi-point networks 100A and 100B is completely unguarded against intrusions other than gates (via wireless LAN, etc.). For the above problems, the End-To-End type is to implement the encryption / decoding process on the desktop personal computers 101A and 101B in the quasi-point network 100A and 100B, and to implement the password communication between the target terminals. According to this type, whether it is inside or outside the quasi-point, the information can be completely protected, so the above-mentioned shortcomings of the Site-To-Site type and Remote Access type are completely solved. Due to the low processing capability of the terminal in the past, the End-To-End type is not realistic, but it has recently become possible due to the advancement of semiconductors (especially CPU processing capabilities). However, in order to use the password in the End-To-End type, it is necessary to install the password software on all the terminals that are intended to communicate with the password, and apply various settings. However, there are terminals connected to the LAN 100A and 100B in the quasi-point network. Terminals other than 101A and 10 1B can also be installed on the desktop personal computer that can install the password software. For example, printers, faxes, and other physical terminals that cannot be installed with password software, or printer servers or database servers, etc., are not suitable for installing extra software terminals due to high-level operation stability. There is no OS. (Operating system) There are also terminals with simple network terminal functions, so although they are on the End-To-End type password system, they still cannot be used. (4) (4) "200402010 It is not effective to use a password. The problem of protecting information exists. Furthermore, the previous End-To-End type cryptosystem was that between the terminals within a plurality of pseudo-points, the implementation of cryptographic communication was only in a closed world of pseudo-points (for example, only The password cannot be used in the network 100B of the pseudo-point A. Another example is the existence of a terminal that cannot install the password software in the network 100B of the pseudo-point B, or in the 100B of the network B of the pseudo-point. There are a large number of terminals 'so that it is unrealistic to install all password soft systems for these situations, that is, it is impossible to use End-To-End type password system between points A and B' If there is at least a request for using a password in the mainland of A network 100 A, there is no means to achieve the request in the past. The present invention was created to solve the above problem, and its purpose is to provide a terminal having software that cannot install passwords. It is also possible to use passwords in the corporate LAN of a mobile phone, thereby reducing the risk of theft and alteration of confidential information inside the LAN due to unauthorized intrusion or attack from the outside. Another object of the present invention is to When information is sent between multiple pseudo-nodes, communication can also be performed using a password in a closed pseudo-node network. [Summary of the Invention] The cryptographic system of the present invention is a direct or indirect connection that implements data communication through the network. Among the plurality of terminals, a dedicated cryptographic device or a relay device provided with a cryptographic processing function provided between the plurality of terminals is included in the aforementioned cryptographic device or the aforementioned relay device. -(5) (5) 200402010, the password of the data to be received by the terminal of a party inside or outside of a phantom network And send the message to the terminal of the other party located in the above or one of the intended networks, and at the same time decode the password of the data received by the terminal of the other party and send it to the terminal of the above party. The structure is its characteristics. The dedicated cryptographic device in this example refers to a device that implements cryptographic processing or decoding processing of data. A relay device that also carries the function of cryptographic processing is provided that it has a password that can implement data The functions of the processing and decoding processing are also devices that can also be equipped with other functions. The other aspect of the present invention is to directly or indirectly connect a plurality of terminals that implement data communication via the network, and the plurality of terminals provided in the plurality of terminals. In a cryptographic system made up of a dedicated cryptographic device between terminals or a relay device equipped with a cryptographic processing function, the above-mentioned cryptographic device or the above-mentioned relay device will consist of an external device located in a certain point network. The information received by the above-mentioned network is encrypted and sent to the above-mentioned terminals within the above-mentioned or a certain intended network. The password information of said terminal inquiry suffered evacuations be decoded to said network configuration information of its characteristics. Other aspects of the present invention are via a wired or wireless network connection: a first terminal with a password processing function located inside a certain point network, and inside or above a certain point network An external 2nd terminal that does not have a password processing function, and a cryptographic device or a relay device that is arranged between the i-th terminal and the 2nd terminal and is used to implement data encryption processing or decoding processing. In the completed cryptographic system, the above-mentioned cryptographic device or relay device is provided with: performing encryption processing and decoding of data by using cryptographic security for the terminal and the first terminal-9-200402010 It is characterized by the processing means of encryption / decoding, and the data transfer means input by one port and outputting the data which is encrypted or decoded by the above-mentioned encryption / decoding means to other ports. Another aspect of the present invention is that the above-mentioned encryption / decoding means is to implement encrypted data communication with the first terminal, and at the same time, the terminal with the second terminal is to implement no encryption. It is characterized by implementing the above-mentioned encryption process and the above-mentioned decoding process for communication of data. In another aspect of the present invention, the relay device is provided with a semiconductor chip that integrates the functions of the above-mentioned encryption / decoding means as: Its characteristics. Another aspect of the present invention is characterized in that the above-mentioned semiconductor chip is provided between a signal transmitting and receiving unit and a baseband processor. Moreover, the cryptographic device of the present invention is directly or indirectly connected between a plurality of terminals that implement data communication through the network, and the data received by the terminals located on one of the internal or external parties of the intended network is encrypted. The feature is to send the message to the terminal of the other party in the above-mentioned or a certain point network, and at the same time, decode the password received by the terminal of the other party and send the message to the terminal of the above-mentioned party. Another aspect of the present invention is that a terminal that implements data communication through a network and the network are directly or indirectly connected to the terminal, and will be provided by the information received by the network outside the network Encrypt and send the message to the above-mentioned terminal within the above-mentioned or a certain intended network-10- (7) (7) 200402010, at the same time, decode and send the password of the information received by the above-mentioned terminal to the above network For its characteristics. Another aspect of the present invention is that a plurality of terminals implementing data communication via a network are directly or indirectly connected to a terminal near one of the parties in a certain point network, and will be located in the above point. The password of the information received by the terminal of the other party inside or outside the network is decoded and sent to the terminal of the above party, and the information received by the terminal of the above party is encrypted and transmitted to the other party. The terminal is its feature. Other aspects of the present invention are connected via a wired or wireless network to a first terminal with a cryptographic processing function inside a certain point network, and to the inside or outside of the above or some point network Between the second terminal that does not have the password processing function, there is: between the terminal and the first terminal described above, for the security of the terminal borrowing encryption, the data is encrypted and decoded. Decoding means and data transfer means for outputting data encrypted or decoded by the above-mentioned ciphering / decoding processing means inputted from one port to other ports are its features. Another aspect of the present invention is the above-mentioned encryption / decoding means, and the communication with the first terminal is encrypted. The communication with the second terminal is not implemented for encryption. For the communication of data, the implementation of the above-mentioned encryption process and the above-mentioned decoding process are its characteristics. In other aspects of the present invention, the above-mentioned encryption / decoding means and the above-mentioned 11-200402010 ⑼ data transfer function are integrated into It is characterized by a semiconductor wafer. Other aspects of the present invention are the first terminal that does not have a password processing function inside a certain point network, and the second terminal that has a password processing function that is inside or outside a certain point network. Between 'is connected to the first terminal near via a wired or wireless network, and includes: for the terminal, the implementation of cryptographic processing of data between the first terminal and the first terminal through the security of cryptography and The features of the encryption / decoding means of decoding processing and the data transfer means of outputting the data subjected to the encryption or decoding processing by the above-mentioned encryption / decoding means input to one port to other ports are input. [Embodiment] (First Embodiment) The first embodiment of the present invention will be described below with reference to the drawings. Fig. 2 is a diagram showing a configuration example of a cryptographic system according to the first embodiment of the cryptographic device according to this embodiment. The symbol 1 in the figure 2 is the cryptographic device of this embodiment (either a dedicated cryptographic device or a relay device equipped with a cryptographic processing function according to the present invention). It has two ports. One port is connected to devices such as the network printer 2, DB server 3, and network terminal 4. The other port is connected to the hub 5. The password device 1 is the network printer 2. , DB server 3, network terminal 4 and other devices and hub 5 implement data relay. -12- 200402010 〇) Network printer 2 is a physical terminal that cannot be installed with password software. The DB server 3 is a terminal that is not suitable for installing redundant password software due to its excellent operation stability. The network terminal 4 is a terminal that cannot operate cryptographic software without an OS (operating system). Therefore, it is assumed that these terminals 2 to 4 are not installed with password software. Also, the hub 5 is a device that relays data at the physical layer of the 0 SI reference mode. In addition to the above-mentioned cryptographic device 1, an access point (access station) 6 for wireless communication, and a desktop personal computer 7 are also connected. That is, the hub 5 at this time is a relay for implementing data between the cryptographic device 1, and the access point 6 and the desktop personal computer 7. The access point 6 is connected to a desktop personal computer 8 and a laptop personal computer 9 wirelessly. The desktop personal computers 7, 8 and laptop personal computers 9 may be installed with cryptographic software for encrypting and decoding data, and it is assumed that the cryptographic software is already installed. As described above, the cryptographic device of this embodiment has two ports. For one port, personal computers 7 to 9 belonging to terminals having a cryptographic processing function are indirectly connected via the hub 5 or the access point 6. . It is on another port, which is directly connected to ‘Network printer 2’, DB server 3 ’Network terminal 5 and Machine 4. These cryptographic devices 1, a network printer 2 'DB server 3, a network terminal 4, a hub 5, an access point 6, and personal computers 7 to 9 constitute a pseudo-point network. It is composed of the above, but the network printer 2 ′ DB server 3 and network printer 4 without the password software installed (mounted) are closely related to the installation (mount) -13- (10) (10) Between the personal computers 7 ~ 9 of 200402010 code software (these devices 2 ~ 4, 7 ~ 9 are equivalent to the terminal of the present invention), data communication can be implemented through the cipher device 1, the hub 5, and the access point 6. At this time, the cryptographic device 1 is to implement encrypted data communication with the personal computers 7 to 9 on which the cryptographic software is installed, and to communicate with the terminals 2 to 4 on which no cryptographic software is installed. For data communication, cryptographic processing and password decoding processing are implemented. For example, when data is to be sent from the desktop personal computer 7 to the network printer 2, the data is first encrypted using the password software installed on the desktop personal computer 7, and supplied to the cryptographic device 1 via the hub 5. Then the cipher device 1 decodes the received data and sends it to the network printer 2. In addition, for example, when the data managed by the DB server 3 is to be taken into the laptop personal computer 9, the DB server 3 supplies the requested data to the cryptographic device 1 as required, and accepts the unencrypted data. The cryptographic device 1 of the data is encrypted to send the data to the laptop personal computer 9 via the hub 5 and the access point 6. The laptop personal computer 9 decodes the received information and uses it for desired processing. As can be understood from the above description, since the cryptographic device 1 of this embodiment is used, a password can also be used in an enterprise LAN provided with terminals 2 to 4 that cannot install dedicated cryptographic software. Therefore, it is possible to build a security network with less risk of theft and alteration of confidential information inside the LAN due to unauthorized intrusion or attack from the outside. In addition, although the password cannot be used between the cryptographic device 1 and each of the terminals 2 to 4, the cables 11 connecting these are physically short wirings.

014P -14- (11) (11)200402010 部之攻擊而被盗取或塗改之可能性非常少,所以保全上並不 會特別或問題。 第3圖係表示第1實施形態之密碼系統之其他構成例之 圖。又在此第3圖上,對於具有與第2圖之構成要素之同一功 能之構成要件係標上同一符號。 第2圖所示之密碼裝置1係備有有線之通訊介面,而以 有線連接於集線器5。相對的第3圖所示之密碼裝置1,係備有 無線之通訊介面,無線的連接於存取點6。且桌上型個人電 腦7也以無線連接於存取點6。所以在於第3圖之例子中不需 要集線器。第3圖之情形時,由密碼裝置1,,存取點6、個 人電腦7〜9而構成一個擬點網絡。其他之點係與第2圖者相 同。 再者,在於上述第2圖之例中,將密碼裝置1之功能積 體化於小型之1C,而將該1C實裝於集線器5也可以。又在於 第3圖之例中’將密碼裝置1 /之功能積體化於小型之I c將該 1C實裝於存取點6之中也可以。 (第2之實施形態) 下面說明本發明之第2實施形態。 第4圖表不適用本實施形態之密碼裝置之第2實施形態 之密碼系統之構成例之圖。又本第4圖中,與第2圖所示之 構成要件具有同一功能之要件係標上同~符號。 如第4圖所不’本實施形態之密碼裝置2 1乃,利用了網 路等之假想專用線之網絡2〇係連接於一方之端口,在於另 -15- (12) (12)200402010 一方之端口連接有集線器5 °此第4圖之情形係由:密碼裝 置21,集線器5、存取點6、個人電腦7〜9而構成一個擬點網 絡。再者,在於網絡20之前方存在有其他之擬點網絡(不圖 示),乃複數台的連接有,如第2圖所示之網絡印表機2、D B 伺服器3、網絡終端機4等’不能安裝密碼軟體之終端機, 或如個人電腦7〜9等安裝有密碼軟體之終端機。 在第2圖所示之第1實施形態乃,對於1台之密碼裝置1連 接有一台之裝置。以一台之密碼裝置1而專用的實施關於~ 台裝置之密碼化/解碼處理。詳述之,第2圖所示之密碼裝 置1係連接於安裝了密碼軟體之個人電腦7〜9,與沒有安裝 密碼軟體之一台之裝置之間’對於該一台之裝置終端了藉 密碼化之保全。 而相對的,第4圖所示之第2實施形態乃,密碼裝置2 1係 連接於安裝了密碼軟體之個人電腦7〜9,與以網絡連接之複 數台之裝置之間(不圖示)。上述複數台之裝置係,如第2圖 所示之網絡印表機2,D B伺服器3,網絡終端機4等,沒有 安裝密碼軟體者亦可以,或如個人電腦7〜9,安裝有密碼軟 體者亦可以。本實施形態之密碼裝置2 1乃對於複數台之裝 置(網絡20),終端藉密碼化之保全。此時密碼裝置2 1係具有 所連接之裝置之數目之資料庫,分別對於各裝置地以不同之 密碼鍵實施密碼化/解碼處理。 例如,介著網絡20由保全網絡1 0內之桌上型個人電腦7 對於在於其他之擬點網絡內之未安裝密碼軟體之外部裝置 送出資料時,首先使用安裝於個人電腦7之密碼軟體將資料 -16- (13) (13)200402010 密碼化’介著集線器5供給於密碼裝置2 1。接著密碼裝置2 1 ’乃’將接受之資料解碼,介著網絡20送出於其他擬點網 絡內之裝置。 再者’例如欲將以其他擬點網絡內之不具備密碼軟體 之外部裝置所管理之資料取入於保全網絡10內之膝上型個 人電腦9時,該其他擬點網絡內之外部裝置乃,隨應於被賦 予之要求而將該相當之資料送出至網絡20。此時接受(受訊) 了該未密碼化之資料之密碼裝置21乃將該資料密碼化,介 著集線器5及存取點6而送訊至膝上型個人電腦9。膝上型個 人電腦9係將所接受之資料解碼之後利用於所欲之處理。 如上所述,在連接於網絡20之其他之擬點網絡內,有 未安裝密碼軟體之裝置之存在之情形下,對於與該裝置之 間地實施資料通訊時,不能利用先前之End-To-End型密碼 系統。所以實施資料通訊之各個擬點網絡內係呈顯完全無 防備狀態。 相對的依本實施形態時,至少在於一方之擬點網絡(第 4圖之保全網絡10)即可以利用藉密碼化之保護。 本例中,在於其他擬點網絡也設置密碼系統21,由而 在於該其他擬點網絡內也可以利用藉密碼之保護。換言之 在於雙方之擬點內可以構築具有保全性之網路,又,在於 各擬點之出入口設置,第1圖所示之閘路(gate way),由而 在於網絡20上也可以利用密碼。 替代於在各擬點之出入口設置第1圖所示之閘路地, 在該密碼裝置21設定「密碼裝置21有無(需要或不需要)密 -17 - (14) (14)200402010 碼化/解碼處理」由而可能使之在於網絡20上也可以利用 密碼 > 例如在於密碼裝置2 1上設定:「安裝有密碼軟體之 各終端機之互相實施通訊時,在於密碼裝置2 i不做解碼處 理」。以及「與未安裝密碼軟體之終端機之間實施通訊時 ’即节在於松、碼裝置2 1實施解碼」之資訊。 此時’例如從保全網絡1 0內之桌上型個人電腦7而介 著網絡20對於其他擬點網絡內之具有密碼軟體之外部裝置 送出資料時’即首先利用安裝於桌上型個人電腦7之密碼 軟體而將資料予以密碼化,介著集線器5供給於密碼裝置 21 〇 接著密碼裝置2 1乃將接受之資料不經解碼地介著網絡 20送出於外部裝置,該外部裝置係將接受之資料予以解碼 後利用於所欲之處理。 相反的’經在於網絡20之前方之擬點網絡內之外部裝 置被密碼化之資料送出至保全網絡1 0內之桌上型個人電腦 7時,密碼裝置21係介著網絡20而從外部裝置所接受之資 料不做解碼地維持被密碼化之狀態地介著集線器5供給於 桌上型個人電腦7也。 又,連接於密碼裝置21之複數台之裝置乃並非一定需 要介著網絡來連接,直接或介著集線器來連接於密碼裝置 2 1也可以。直接連接時,密碼裝置2 1即須具有二個端口。 第5圖係表示第2之實施形態之密碼系統之其他構成例 之圖。又,在此第5圖中,對於具有與第4圖所示之構成要 件同一功能之構成要件即標上同一符號。第5圖所示之例 -18 - (15) (15)200402010 子也與第4圖所示之例子同樣,以一台之密碼裝置21對於 複數台之裝置終端藉密碼化之保全之例子。 第5圖所示之例乃·保全網絡1 0之內部係,該三台之個 人電腦7〜9均以無線LAN連接在存取點6,又存取點6係介 著密碼裝置21連接於網絡20。 一般而言,無線LAN乃與有線之網路比較時在於保全 (保密)上脆弱。很容易受來自外部之攻擊。做爲無線LAN 之標準保全功能而可能利用SSID( Service Set Identifier) 及WEP(Wired Equivalent Privacy),惟只利用這些之標準 無線LAN環境乃,資料之被盗取塗改等之可能性很高。再 者關於被盗取或洩漏係被害時也不容易察知。 相對的依本實施形態時,只要在於擬點網絡之出入口 設置一個密碼裝置2 1,就可以確保在於無線LAN內部之藉 密碼化之保全,所以有效的防止資料之盗取、塗改等等。 又,在於第5圖之例中得以無線來連接密碼裝置2 1與 存取點6之間。 又在於上述第4圖之例中,將密碼裝置2 1之功能積體 化成小型之1C,而將該1C實裝於存取點6中亦可以。 第6圖表示第2之實施形態之密碼系統之再一別之構成 之例之圖。 按在於上述第2圖〜第5圖說明了做爲本發明之「在某 一擬點網絡之內部之另一方之終端機」或「在某一擬點網 絡內部之具備密碼處理功能之第1之終端機」之例而舉出 安裝有密碼軟體之個人電腦7〜9,而在於密碼裝置1,1 > •19- (16) (16)200402010 ,2 1與個人電腦7 ~ 9之間而終端藉密碼化之保全之例子, 但本發明之上述終端機係不侷限於此例,將包含具備有與 密碼裝置1,1 /,2 1同樣之功能之其他密碼裝置,第6圖 係表示此時之構成例。 第6圖所示之例乃,擬點A,B之二個擬點網絡30A, 30B係介著路由器4〇A,40B及網路等之網絡20所連接。擬 點八網絡30八之內係由個人電腦31八〜33八,及密碼裝置21八-1〜21八-3而構成企業內1^1^。個人電腦31八〜33八均未安裝 密碼軟體之終端機。又密碼裝置21A_1〜21A-3係均具有與第 4圖之密碼裝置2 1同樣之功能者,一方之端口連接個人電腦 3 1 A〜33A,另一方之端口連接有路由器40A。 擬點B網絡30B內也同樣由個人電腦31 B〜3 3B及密碼裝 置21B0卜21B-3來構成企業內LAN。個人電腦31B〜33B均未安 裝密碼軟體之終端機。又密碼裝置21 B-1〜21 B-3均具有與第 4圖之密碼裝置2 1同樣之功能者。在其一方之端口連接個人 電腦31B〜33B,另一方之端口連接有路由器40B。 依上述之構成,在屬於不同擬點網絡30A,30B之個人 電腦之間乃介著密碼裝置21A-1〜21A-3,21B-1〜21B-3而實 施資料通訊。 例如欲從在於擬點A網絡30A內之個人電腦31A對於擬 點B網絡30B內之個人電腦33B送資料之送訊時,密碼裝置 21 A-1乃將由個人電腦31八所供給之資料予以密碼化介著 路由器40A,網絡20及路由器40B送訊至密碼裝置21B-3。 密碼裝置21B-3係將受訊之資料予以解碼後供給於個人電 -20- (17) (17)200402010 腦3 3 B。由而在於不同擬點網絡3 0 A,3 0 B之間可以利用密 碼。 又’例如在於擬點A網絡3 0 A之內部,在於未安裝密 碼軟體之各個人電腦3 1 A〜3 3 A互相之間乃介著密碼裝置 2 1 A -1〜2 1 A - 3實施資料通訊。例如從某一個人電腦3 i a對 於其他個人電腦33 A送資料時,密碼裝置21 a-χ係從個人電 腦3 1 A所給之資料予以密碼化送訊至密碼裝置2 i a - 3。密碼 裝置21A-3即將接受(受訊)之資料解碼後供給於個人電腦 33A 〇 在於擬點B網絡3 0 B之內部亦同樣,未安裝密碼軟體 之個人電腦31B〜33B互相之間係介著密碼裝置21B-1〜21B-3實施資料通訊。例如從某一個人電腦31]8對於其他個人電 腦3SB送資料時,密碼裝置將由個人電腦31B所給 之資料密碼化,送訊至密碼裝置21B-3。密碼裝置21B-3乃 將接受之資料解碼後供給於個人電腦33B。 如上所述,密碼裝置21A-1〜21A-3,21B-1〜21B-3乃均 與未安裝密碼軟體之個人電腦31A〜33A,31B〜33B係實施 未經密碼化之資料之通訊,同時在於具有密碼處理功能之 終端機之密碼裝置21Α-1~21Α-3,21B-1〜21B-3之間即爲了 實施密碼化之資料之通訊而實施密碼化處理以及密碼之解 碼處理。 如上所述,將密碼裝置21A-1〜21A-3, 21B-1〜21B-3分 別連接於個人電腦31 A〜33 A,31 B〜3 3B之近傍,由而當然 在於不同之擬點網絡30A,30B之間,在於不具備密碼軟 •21 - (18) (18)200402010 體之個人電腦之企業內LAN之中也可能利用密碼。由而可 以使各擬點網絡30A,30B成爲,從外部之不正侵入或攻 擊而企業LAN內部之機密資訊所盗取、塗改之危險性少之 保全性(保密性)之網絡也。 再者,在上述第6圖之例乃,各擬點網絡30 A,30B均 具備複數台之具有密碼處理功能之終端機(密碼裝置21 A-1〜21 A-3,21B-1〜21B-3)而構成,惟採用至少一方之擬點 網絡只具備一台之具有密碼處理功能之終端機之構成亦可 〇 例如,在於擬點網絡30A中,連接一台個人電腦3 1 A 與一台密碼裝置21 A-1來構成亦可以。此時即與第6圖所示 之構成同樣在於不同之擬點網絡30 A,30B間可以利用密 碼。又’關於擬點網絡30A之內,係藉將密碼裝置21 A-1連 接於個人電腦31A之近傍,就可以使該擬點網絡30A之出 入口與密碼裝置2 1 A-1之間可以利用密碼。 又’上述第6圖之例子乃表示以網絡20連接二個擬點 網絡30A,30B,在於各擬點網絡30A,30B內,分別具備 了密碼裝置21A-1〜21A-3,21B-1〜21B-3及個人電腦 3 1八〜33八,3 18〜33 3之例子,惟並不侷限於本例。 例如’在於一個擬點網絡內,具備密碼裝置21八-1~21Α-3,21B-1〜21Β·3及個人電腦 31A〜33A,31B 〜33B, 而該未安裝密碼軟體之個人電腦31Α〜33Α,31Β~33Β之間 之資料之互相接·交即介著密碼裝置21Α-1〜21Α-3 , 21Β-1〜21 Β-3來實施也可以。此時在於—個擬點網絡內,至少 -22- (19) (19)200402010 在於密碼裝置2 1 A -1〜2 1 A · 3,2 1 B -1〜2 1 B - 3之間可以利用密 碼。 又除了上述之外,例如採用於第2圖之構成中,替代 安裝有密碼軟體之個人電腦7而使用未安裝密碼軟體之個 人電腦及密碼裝置1,而將密碼裝置i連接於集線器5之構 成亦可行。此時不能安裝密碼軟體之網絡印表機2、D B伺 服益3、網絡終u而機4等之裝置與沒有安裝有密碼軟體之個 人電腦之間乃介著連接於兩者臨近之密碼裝置1可以實施 密碼通訊。 (第3之實施例) 接著說明本發明之第3之實施形態。 第7圖表示適用了本實施形態之密碼裝置之第3之實施 形態之密碼系統之構成例之圖。在於第7圖中,對於具有 與第3圖及第5圖所示之構成要件相同之功之構成要件係標 上同一之符號。 第7圖所示之第3之實施形態係組合了第3圖所示之密 碼裝置與第5圖所示之密碼裝置21而構成了密碼系統者 〇 依此例時,在於無線LAN之內部可以確立保全網絡10 ,對於實質上不能安裝密碼軟體之裝置也使之可能利用密 碼0 (第4之實施形態) -23- (20) (20)200402010 接著說明本發明之第4之實施形態。 第8圖表示第4之實施形態之密碼裝置(載置了密碼處理 功能之中繼裝置)之構成例之圖,其中第8圖(a)係表示實裝 上述密碼裝置21之功能之ic晶片50之構成例’第8圖(b)表 示載置了該'1C晶片50之手提話機60之構成例。 如第8圖(a)所示,用於實現上述密碼裝置2 1之功能之 1C晶片50乃具備有,CPU50、ROM52、RAM53’存取控制 器54,及介面部55等之功能塊。 , 匸?1;51乃由存取控制器54而存取於11〇1^52及11六1^53, 並且依照收納於ROM52之程序而將RAM53做爲工作領域而 動作,實施資料之密碼化/解碼處理。介面部55乃將該供 CPU5 1處理之資料或已處理過之資料接·交於1C晶片50之 外部。 又,如第8圖(b)所不》上述之1C晶片50(密碼晶片)50 乃實裝於手提話機60之送受訊號與基頻帶處理器65之間。 送受訊部均包含習知之天線61,天線開關62,RF部( 高頻處理部)63,IF部(中頻處理部)64。此送受訊部乃例如 對應於無線LAN或Bluet tooth等等,在於與個人電腦或 PDA(Personal Digital Assistants)等之外部終端機之間竇 施資料之送受訊。 如上所構成之手提手機60係,例如可替代第5圖所示 之密碼裝置2 1地使用。在此時,例如從保全網絡1 〇內之桌 上型個人電腦7而介著網絡20對於其他擬點網絡內之裝置 送資料時,即首先使用安裝於桌上型個人電腦7之密碼軟 (21) (21)200402010 體將資料密碼化,而將該密碼資料送訊至手提手機60,接 著手提手機60乃在於密碼晶片50內而將接受之資料予以解 碼介著網絡20而送出於其他擬點網絡內之裝置。 又,例如欲將由其他之擬點網絡內之裝置所管理之資 料取入於保全網絡10內之膝上型個人電腦9時,該其他之擬 點網絡內之裝置係隨應於所賦予之要求,將該資料送出於 網絡20內。接受了該未密碼化之資料之手提手機60乃以密 碼晶片5 0而將該資料密碼化送訊至膝上型個人電腦9。膝 上型個人電腦9乃將接受之資料解碼利用於所欲之處理。 如上所述,將密碼裝置2 1之功能予以晶片化,將它組 入於手提手機60,由而在於使用該手提手機60之無線LAN 環境內可以實現由密碼化之保全(保密)。 又,本例係說明使用手提手機6 0來替代第5圖之密碼 裝置2 1之例子。惟亦可替代第3圖之密碼裝置1 /地使用。 此時連接網絡印表機2,D B伺服器3、網絡終端機4之間之 線將用無線。惟這些部份係如上所述不能利用密碼。所以 需要這些裝置2〜4與手提手機60之物理的距離之短的狀態 來使用爲其必要條件。 又,本例係說明了對於手提(電話)手機6 0實裝IC晶片 5 〇之例子,惟其他只要是具備通訊介面之電子機器就可適 用。 以上係對於第1〜第4之實施形態做了說明,惟對於在 這些實施形態所使用之密碼化之算法(a 1 g 〇 r i t h m )係本發明 乃不做限定,換言之習知之任何密碼算法均可能適用。 -25- (22) (22)200402010 又在於上述之各實施形態中,該網絡係說明了使用假 想專用線之例子,惟本實施形態之密碼裝置之可連接之電 路並不侷限於假想專用線。 其他’上述之各實施形態均不過是爲實施本發明時之 具體化之一例而已,並非由該實施形態而限定的解釋本發 明之技術範圍。換言之本發明乃仍不逸脫其精神或主要特 徵地可以種種形態來實施者。 如上所述本發明乃,在於介著網絡實施資料通訊之終 端機之間,連接專用之密碼裝置等等,而在該密碼裝置等 ,將由某一擬點網絡之內部或外部之一方之終端機所受訊 之資料予以密碼化而送訊至某一擬點網絡之內部之某一其 他之終端:機,同時將由另一方終端機所受訊之資料之密碼 予以解碼後送至一方之終端機地構成,所以在於具有不能 安裝密碼軟體之終端機之企業內LAN之中也成爲可以利用 密碼’由而可以減低由外部之不正當侵入或攻擊而LAN內 部之機密資訊之被盗取·塗改等之危險性。 又’本發明係,例如只在於以假想專用線所連接之複 數之擬點網絡之中之一個擬點網絡之封閉之世界中也可以 利用密碼。 例如,在於其他之擬點網絡內,存在了無法安裝密碼 軟體之終端機之情形,其他之擬點網絡內設有龐大數目之 終端機,而對於其全部之終端機安裝密碼軟體係屬非現實 的做法之情形等等也可以在至少一個擬點網絡內而可以利 用密碼。 -26· (23) 200402010 例如只構成一個擬點網絡之無線LAN也可以達成藉密 碼之保護者。 產業上之利用可能性014P -14- (11) (11) 200402010 The possibility of being stolen or altered by the attack of the Ministry is very small, so there is no special or problem in the security. Fig. 3 is a diagram showing another configuration example of the cryptographic system of the first embodiment. Also on this third figure, the same reference numerals are given to the constituent elements having the same functions as the constituent elements of the second figure. The cryptographic device 1 shown in FIG. 2 is provided with a wired communication interface, and is connected to the hub 5 by a wire. The corresponding cryptographic device 1 shown in FIG. 3 is provided with a wireless communication interface, and is wirelessly connected to the access point 6. The desktop personal computer 7 is also connected to the access point 6 wirelessly. Therefore, a hub is not required in the example in FIG. 3. In the case of Fig. 3, a cryptographic device 1, an access point 6, and personal computers 7 to 9 constitute a pseudo-point network. The other points are the same as those in Figure 2. Furthermore, in the example of the second figure, the function of the cryptographic device 1 is integrated into a small 1C, and the 1C may be mounted on the hub 5. In the example of FIG. 3, it is also possible to integrate the function of the cryptographic device 1 / into a small Ic and install the 1C in the access point 6. (Second Embodiment) Next, a second embodiment of the present invention will be described. The fourth diagram does not apply to the configuration example of the cryptographic system of the second embodiment of the cryptographic device of this embodiment. In the fourth figure, elements having the same function as the constituent elements shown in FIG. 2 are marked with the same ~ symbol. As shown in FIG. 4, the cryptographic device 21 of this embodiment is a port connected to one side of the network 2 using an imaginary dedicated line such as a network. The other side is -15- (12) (12) 200402010. The port 5 is connected to a hub 5 ° The situation in FIG. 4 is composed of a cryptographic device 21, a hub 5, an access point 6, and a personal computer 7 to 9 to form a pseudo-point network. In addition, there are other pseudo-point networks (not shown) in front of the network 20, which are connected to a plurality of devices, such as a network printer 2, a DB server 3, and a network terminal 4 as shown in FIG. 2 Etc. 'Terminals where password software cannot be installed, or terminals with password software such as personal computers 7-9. In the first embodiment shown in Fig. 2, one device is connected to one cryptographic device 1. Encryption / decoding processing is performed exclusively for one device with one encryption device 1. In detail, the cryptographic device 1 shown in FIG. 2 is connected between the personal computers 7 to 9 on which the cryptographic software is installed, and a device on which one of the cryptographic software is not installed. Protection of transformation. In contrast, in the second embodiment shown in FIG. 4, the cryptographic device 21 is connected between the personal computers 7 to 9 on which the cryptographic software is installed, and a plurality of devices connected via a network (not shown). . The above-mentioned multiple devices are network printer 2, DB server 3, network terminal 4, etc. as shown in FIG. 2. Those without password software can also be installed, or if personal computers 7-9 have passwords installed Software users can also. The cryptographic device 21 of the present embodiment is a device (network 20) for plural devices, and the terminal secures by means of cryptography. At this time, the cryptographic device 21 is a database having the number of connected devices, and the cryptographic / decoding processing is performed for each device with a different cryptographic key. For example, when the personal computer 7 in the security network 10 is sent through the network 20 to an external device that does not have password software installed in another intended network, the password software installed in the personal computer 7 will be used first. Document-16- (13) (13) 200402010 Encryption is supplied to the encryption device 21 via the hub 5. Then the cryptographic device 2 1 'is' decodes the received data and sends it out to other devices in the intended network via the network 20. Furthermore, for example, when the data managed by an external device without password software in another intended network is taken into the laptop personal computer 9 in the security network 10, the external device in the other intended network is The corresponding information is sent to the network 20 in response to the given request. At this time, the cryptographic device 21 that has received (received) the unencrypted data is cryptographically transmitted to the laptop personal computer 9 via the hub 5 and the access point 6. The laptop personal computer 9 decodes the received data and uses it for the desired processing. As mentioned above, when there is a device without password software installed in the other intended network connected to the network 20, the previous End-To- End type password system. Therefore, the network of each point where data communication is implemented is completely unguarded. In contrast, according to this embodiment, at least one of the quasi-point networks (the security network 10 in FIG. 4) can use the protection by cryptography. In this example, the password system 21 is also provided in other pseudo-point networks, so that the password protection can also be used in the other pseudo-point networks. In other words, a security network can be built in the proposed points of both parties, and the entrances and exits of each proposed point are set up. The gate way shown in Figure 1 is thus that the password can also be used on the network 20. Instead of setting the gates shown in Figure 1 at the entrances and exits of each proposed point, set the password device 21 to "is the password device 21 available (required or not required)? -17-(14) (14) 200402010 encoding / decoding "Processing" may make it possible to use passwords on the network 20> For example, it is set on the cryptographic device 21: "When the terminals installed with cryptographic software communicate with each other, the cryptographic device 2i does not perform decoding processing ". And "When implementing communication with a terminal that does not have password software installed," that is to say that the implementation of decoding is performed by the code device 21. At this time, 'for example, when sending data from the desktop personal computer 7 in the security network 10 to the external device with password software in the other target network via the network 20', that is, first use the desktop personal computer 7 installed The cryptographic software encrypts the data and supplies it to the cryptographic device 21 via the hub 5. Then the cryptographic device 21 sends the received data to the external device via the network 20 without decoding. The external device will accept it. The data is decoded and used for the desired processing. On the contrary, when the encrypted data of the external device in the intended network before the network 20 is sent to the desktop personal computer 7 in the security network 10, the password device 21 is connected to the external device via the network 20 The received data is supplied to the desktop personal computer 7 via the hub 5 while maintaining the encrypted state without being decoded. Further, the plurality of devices connected to the cryptographic device 21 does not necessarily need to be connected via a network, and may be connected to the cryptographic device 21 directly or via a hub. When connected directly, the cryptographic device 21 must have two ports. Fig. 5 is a diagram showing another configuration example of the cryptographic system of the second embodiment. In Fig. 5, components having the same functions as those shown in Fig. 4 are denoted by the same symbols. The example shown in Fig. 5 -18-(15) (15) 200402010 The example is similar to the example shown in Fig. 4, in which one cryptographic device 21 is used to secure a plurality of device terminals by cryptography. The example shown in FIG. 5 is the internal system of the security network 10. The three personal computers 7 to 9 are all connected to the access point 6 by wireless LAN, and the access point 6 is connected to the access point 6 via a cryptographic device 21. Network 20. Generally speaking, wireless LANs are vulnerable to security (confidentiality) when compared to wired networks. Very vulnerable to external attacks. As a standard security function of wireless LAN, it is possible to use SSID (Service Set Identifier) and WEP (Wired Equivalent Privacy). However, only using these standard wireless LAN environments is that the possibility of data being stolen and altered is very high. Furthermore, it is not easy to detect when the theft or leakage was committed. In contrast, according to this embodiment, as long as a password device 21 is provided at the entrance and exit of the intended network, the security of borrowing and encryption within the wireless LAN can be ensured, so the theft, alteration, etc. of the data can be effectively prevented. In the example shown in Fig. 5, the encryption device 21 and the access point 6 can be connected wirelessly. In the example of FIG. 4 described above, the function of the cryptographic device 21 is integrated into a small 1C, and the 1C may be installed in the access point 6. Fig. 6 is a diagram showing an example of still another configuration of the cryptographic system of the second embodiment. Figures 2 to 5 described above describe the "the other party's terminal inside a given point network" or "the first terminal with a password processing function inside a given point network" as the present invention. The "terminal" is an example of a personal computer 7 ~ 9 installed with cryptographic software, and the cryptographic device 1, 1 > • 19- (16) (16) 200402010, 2 1 and personal computer 7-9 An example of the security of the terminal by cryptography, but the above-mentioned terminal system of the present invention is not limited to this example, and will include other cryptographic devices having the same functions as the cryptographic devices 1, 1 /, 21, FIG. 6 A configuration example at this time is shown. The example shown in FIG. 6 is that the two quasi-point networks 30A and 30B of the quasi-point A and B are connected through the routers 40A and 40B and the network 20 such as the network. Within the quasi-dot network 30, a personal computer 31-8 to 33-8 and a cryptographic device 21-8-1 to 21-8-3 constitute 1 ^ 1 ^ within the enterprise. The personal computers 31 to 33 are terminals with no password software installed. Each of the cryptographic devices 21A_1 to 21A-3 has the same function as the cryptographic device 21 of FIG. 4. One port is connected to a personal computer 3 1A to 33A, and the other port is connected to a router 40A. In the virtual point B network 30B, personal computers 31 B to 3 3B and password devices 21B0 and 21B-3 are also used to form an intra-company LAN. None of the personal computers 31B to 33B has a terminal with password software installed. Each of the cryptographic devices 21 B-1 to 21 B-3 has the same function as the cryptographic device 21 of Fig. 4. A personal computer 31B to 33B is connected to one port, and a router 40B is connected to the other port. According to the above-mentioned structure, data communication is performed between personal computers belonging to different pseudo-point networks 30A and 30B through cryptographic devices 21A-1 to 21A-3 and 21B-1 to 21B-3. For example, if you want to send information from the personal computer 31A in the quasi-point A network 30A to the personal computer 33B in the quasi-point B network 30B, the cryptographic device 21 A-1 passwords the information provided by the personal computer 31A It transmits information to the cryptographic device 21B-3 via the router 40A, the network 20, and the router 40B. The cryptographic device 21B-3 decodes the data received and supplies it to the personal computer. -20- (17) (17) 200402010 Brain 3 3 B. Therefore, the passwords can be used between different pseudo-point networks 3 A and 3 B. Also, for example, it is inside the point A network 3 0 A, and each personal computer 3 1 A ~ 3 3 A without password software is interposed with the password device 2 1 A -1 ~ 2 1 A-3 implementation data communication. For example, when sending data from a personal computer 3 i a to another personal computer 33 A, the cryptographic device 21 a-χ is encrypted and transmitted from the personal computer 3 1 A to the cryptographic device 2 i a-3. The encryption device 21A-3 is about to receive (receive) the data and decode it and supply it to the personal computer 33A. 〇It is the same inside the point B network 3 0 B. The personal computers 31B ~ 33B without password software are connected to each other. The cryptographic devices 21B-1 to 21B-3 implement data communication. For example, when sending data from a personal computer 31] 8 to other personal computers 3SB, the cryptographic device encrypts the data given by the personal computer 31B and sends the information to the cryptographic device 21B-3. The cryptographic device 21B-3 decodes the received data and supplies it to the personal computer 33B. As mentioned above, the cryptographic devices 21A-1 ~ 21A-3, 21B-1 ~ 21B-3 are all used to communicate with personal computers 31A ~ 33A, 31B ~ 33B without password software. At the same time, Between the cryptographic devices 21A-1 ~ 21A-3, 21B-1 ~ 21B-3 of the terminal with the cryptographic processing function, the cryptographic processing and the cryptographic decoding processing are implemented in order to implement the communication of the encrypted data. As described above, the cryptographic devices 21A-1 to 21A-3, 21B-1 to 21B-3 are connected to the personal computers 31 A to 33 A, 31 B to 3 3B, respectively, of course, because of different pseudo-point networks Between 30A and 30B, passwords may be used in corporate LANs that do not have password software • 21-(18) (18) 200402010. As a result, each of the proposed networks 30A and 30B can be a security (confidentiality) network with less danger of stealing or altering confidential information inside the corporate LAN from unauthorized intrusion or attack from the outside. Furthermore, in the example of the above-mentioned FIG. 6, each of the pseudo-point networks 30 A and 30B has a plurality of terminals with a password processing function (cryptographic devices 21 A-1 to 21 A-3, 21B-1 to 21B -3), but it is also possible to use a configuration in which at least one of the pseudo-point networks has only one terminal with a password processing function. For example, in the pseudo-point network 30A, a personal computer 3 1 A and a The encryption device 21 A-1 may be configured. In this case, the configuration shown in Fig. 6 is the same as that in the different pseudo-point networks 30 A and 30B, a password can be used. Also, regarding the pseudo-point network 30A, by connecting the cryptographic device 21 A-1 to the vicinity of the personal computer 31A, a password can be used between the entrance and exit of the pseudo-point network 30A and the cryptographic device 2 1 A-1. . The example of the above-mentioned FIG. 6 shows that two pseudo-point networks 30A and 30B are connected by the network 20. In each of the pseudo-point networks 30A and 30B, cryptographic devices 21A-1 to 21A-3 and 21B-1 to Examples of 21B-3 and personal computer 3 18 to 33 8 and 3 18 to 33 3 are not limited to this example. For example, 'In a pseudo-point network, there are encryption devices 21A-1 to 21A-3, 21B-1 to 21B · 3, and personal computers 31A to 33A, 31B to 33B, and the personal computer 31A to which the password software is not installed. The data exchange between 33A, 31B, and 33B can be implemented through the encryption devices 21A-1 to 21A-3, 21B-1 to 21B-3. At this time lies in a pseudo-point network, at least -22- (19) (19) 200402010 lies in the cryptographic device 2 1 A -1 ~ 2 1 A · 3, 2 1 B -1 ~ 2 1 B-3 Use password. In addition to the above, for example, the configuration shown in FIG. 2 is used in place of the personal computer 7 installed with the cryptographic software and using the personal computer and the cryptographic device 1 without the cryptographic software installed, and the cryptographic device i is connected to the hub 5 Also works. At this time, the devices such as the network printer 2, DB server 3, and network terminal 4 where the password software cannot be installed, and the personal computer without the password software installed are connected to the nearby password device 1 Implement password communication. (Third Embodiment) Next, a third embodiment of the present invention will be described. Fig. 7 is a diagram showing a configuration example of a cryptographic system to which the third embodiment of the cryptographic device of the embodiment is applied. In FIG. 7, components having the same functions as those shown in FIGS. 3 and 5 are marked with the same symbols. The third embodiment shown in FIG. 7 is a combination of the cryptographic device shown in FIG. 3 and the cryptographic device 21 shown in FIG. 5 to form a cryptographic system. In this example, the wireless LAN can be used internally. The security network 10 is established, and it is possible to use the password 0 even for devices that cannot substantially install password software (fourth embodiment) -23- (20) (20) 200402010 Next, a fourth embodiment of the present invention will be described. FIG. 8 is a diagram showing a configuration example of a cryptographic device (a relay device provided with a cryptographic processing function) according to the fourth embodiment, and FIG. 8 (a) is an IC chip showing the function of the cryptographic device 21 described above. Configuration Example of 50 'FIG. 8 (b) shows a configuration example of the mobile phone 60 on which the 1C chip 50 is mounted. As shown in Fig. 8 (a), the 1C chip 50 for realizing the functions of the above-mentioned cryptographic device 21 is provided with functional blocks such as a CPU 50, a ROM 52, a RAM 53 'access controller 54, and an interface 55. Huh? 1; 51 are accessed by the access controller 54 at 1101 ^ 52 and 1116 1 ^ 53, and the RAM53 is operated as a work area according to the program stored in the ROM52, and the data is encrypted / decoded. deal with. The interface part 55 receives and delivers the data for processing by the CPU 5 1 or the processed data to the outside of the 1C chip 50. In addition, as shown in FIG. 8 (b), the 1C chip 50 (cipher chip) 50 described above is installed between the transmitting and receiving signals of the mobile phone 60 and the baseband processor 65. The transmitting and receiving sections all include a conventional antenna 61, an antenna switch 62, an RF section (high-frequency processing section) 63, and an IF section (intermediate-frequency processing section) 64. This transmitting and receiving unit corresponds to wireless LAN, Blue tooth, etc., and transmits and receives data to and from an external terminal such as a personal computer or PDA (Personal Digital Assistants). The mobile phone 60 configured as described above can be used instead of the cryptographic device 21 shown in FIG. 5, for example. At this time, for example, when sending data from the desktop personal computer 7 in the security network 10 to the devices in the other intended network via the network 20, the password software installed on the desktop personal computer 7 is first used ( 21) (21) 200402010 The body encrypts the data, and sends the encrypted data to the mobile phone 60, and then the mobile phone 60 is in the crypto chip 50 and the received data is decoded through the network 20 and sent for other purposes. Click the device in the network. In addition, for example, if it is desired to take in the data managed by the devices in the other intended network into the laptop personal computer 9 in the security network 10, the devices in the other intended network will respond to the given requirements. To send the information out of the network 20. The mobile phone 60 that has received the unencrypted data is encrypted and transmitted to the laptop personal computer 9 with a password chip 50. The laptop personal computer 9 decodes the received data and uses it for desired processing. As described above, the function of the cryptographic device 21 is chipped and incorporated into the mobile phone 60, so that security (encryption) by encryption can be realized in the wireless LAN environment in which the mobile phone 60 is used. In addition, this example is an example in which a portable phone 60 is used in place of the cryptographic device 21 in Fig. 5. However, it can also be used instead of the cryptographic device 1 / ground of Fig. 3. At this time, the line connecting the network printer 2, the DB server 3, and the network terminal 4 will be wireless. However, these parts cannot use passwords as described above. Therefore, it is necessary to use these devices 2 to 4 with a short physical distance from the mobile phone 60. In this example, an example is shown in which an IC chip 50 is mounted on a portable (telephone) mobile phone 60, but other electronic devices can be applied as long as they have a communication interface. The above is the description of the first to fourth embodiments, but the cryptographic algorithm (a 1 g rithm) used in these embodiments is not a limitation of the present invention. In other words, any known cryptographic algorithm is May apply. -25- (22) (22) 200402010 In the above-mentioned embodiments, the network has explained an example of using a virtual dedicated line, but the connectable circuit of the cryptographic device of this embodiment is not limited to the virtual dedicated line . Each of the other embodiments described above is merely an example of a specific embodiment for carrying out the present invention, and the technical scope of the present invention is not limited by the embodiments. In other words, the present invention can still be implemented in various forms without departing from its spirit or main characteristics. As described above, the present invention is to connect a dedicated cryptographic device and the like between terminals that implement data communication through a network, and the cryptographic device and the like will be a terminal of one of the internal or external parties of a pseudo-network The received information is encrypted and sent to some other terminal: machine in a certain point network. At the same time, the password of the information received by the terminal of the other party is decoded and sent to the terminal of one party. Because of its local structure, passwords can also be used in corporate LANs with terminals that cannot install password software. This can reduce the theft and alteration of confidential information inside the LAN due to unauthorized intrusion or attack from the outside. Danger. The present invention is also applicable to a closed world where only one pseudo-point network among a plurality of pseudo-point networks connected by an imaginary private line is used. For example, in other pseudo-point networks, there are cases where terminals cannot be installed with password software. There are a large number of terminals in other pseudo-point networks, and it is unrealistic to install a password soft system for all the terminals. In the case of the method, etc., the password can also be used in at least one pseudo-point network. -26 · (23) 200402010 For example, a wireless LAN that only constitutes a pseudo-point network can also be used to protect the borrower's password. Industrial availability

本發明係做爲:在於具有,無法安裝專用之密碼軟體 之終端機之企業內LAN之中也可以利用密碼,由而減低來 自外部之不正當侵入或攻擊,由而LAN內部之機密資訊所 盗取或塗改之危險性上很有用。 又,本發明乃利用爲在於複數之擬點間實施資訊通訊 時,只在於一個封閉之擬點網絡內也可以利用密碼之用途 上很有用。 【圖式簡單說明】 第1圖表示先前之密碼系統之構成圖。 第2圖表示適用本實施形態之密碼裝置之第1實施形態 之密碼系統之構成例之圖。 第3圖表示依第1實施形態之密碼系統之其他構成例之 第4圖表示適用本實施形態之密碼裝置之第2實施形態 之密碼系統之構成例之圖。 第5圖表示依第2實施形態之密碼系統之其他構成例之 圖。 第6圖表示依第2實施形態之密碼系統之再一其他構成 例之圖。 -27- (24) 200402010 第7圖表示適用本實施形態之密碼裝置之第3實施形態 之密碼系統之構成例之圖。 第8圖表示第4實施形態之密碼裝置(中繼裝置)之構成之 圖。第8圖(a)表示密碼晶片之構成例。第8圖(b)表示載置該 密碼晶片之手提話機之構成例之圖。 [符號說明]The present invention is designed as follows: a password can also be used in an enterprise LAN with a terminal that cannot install dedicated password software, thereby reducing unauthorized intrusions or attacks from the outside and stealing confidential information inside the LAN It is useful to take or alter the dangers. In addition, the present invention is useful for implementing information communication between plural pseudo-nodes, and it is useful only for the purpose of using a password in a closed pseudo-node network. [Schematic description] Figure 1 shows the structure of the previous cryptographic system. Fig. 2 is a diagram showing a configuration example of a cryptographic system according to the first embodiment of the cryptographic device according to this embodiment. Fig. 3 is a diagram showing another configuration example of a cryptographic system according to the first embodiment. Fig. 4 is a diagram showing a configuration example of a cryptographic system according to the second embodiment of the cryptographic device to which this embodiment is applied. Fig. 5 is a diagram showing another configuration example of the cryptographic system according to the second embodiment. Fig. 6 is a diagram showing still another configuration example of the cryptographic system according to the second embodiment. -27- (24) 200402010 Fig. 7 is a diagram showing a configuration example of a cryptographic system to which a third embodiment of the cryptographic device of this embodiment is applied. Fig. 8 is a diagram showing the configuration of a cryptographic device (relay device) according to the fourth embodiment. Fig. 8 (a) shows a configuration example of a cryptographic chip. Fig. 8 (b) is a diagram showing a configuration example of a mobile phone on which the cipher chip is mounted. [Symbol Description]

1,1 / :密碼裝置 2 :網絡印表機 3 : DB伺月艮器 4 :網絡終端機 5 :集線器 6 :存取點 7 :桌上型個人電腦 8 :桌上型個人電腦1.1,: Password device 2: Network printer 3: DB server 4: Network terminal 5: Hub 6: Access point 7: Desktop personal computer 8: Desktop personal computer

9 :膝上型個人電腦 1 0 :安全網路 1 1 :電纜 20 :網路 21 :密碼裝置 21 A-1〜3 :密碼裝置 21B-1〜3 :密碼裝置 3 1 A〜B個人電腦 32A〜B :個人電腦9: Laptop personal computer 1 0: Secure network 1 1: Cable 20: Network 21: Password device 21 A-1 ~ 3: Password device 21B-1 ~ 3: Password device 3 1 A ~ B Personal computer 32A ~ B: Personal computer

-28· (25) (25)200402010 33A〜B:個人電腦 30A〜B :擬點()網絡 40A〜B :路由器 100A〜B :擬點()網絡 101A〜B:桌上型個人電腦 102A〜B :閘路 103 :遙控終端機 104 :遙控終端機 200 :網絡 5 0 : IC晶片-28 · (25) (25) 200402010 33A ~ B: Personal computer 30A ~ B: Pseudopoint () network 40A ~ B: Router 100A ~ B: Pseudopoint () network 101A ~ B: Desktop personal computer 102A ~ B: Gate 103: Remote terminal 104: Remote terminal 200: Network 5 0: IC chip

51 : CPU51: CPU

52 : ROM52: ROM

53 : RAM 54 :存取控制器 55 :介面部 60 :攜帶式電話機 61 :天線 62 :天線開關 63 : RF部(高頻處理部) 64 : IF部(中頻處理部) 65 :基頻帶處理器 -29 -53: RAM 54: access controller 55: interface 60: portable telephone 61: antenna 62: antenna switch 63: RF section (high frequency processing section) 64: IF section (intermediate frequency processing section) 65: baseband processing -29-

Claims (1)

(2) (2)200402010 處理之密碼裝置或中繼裝置而成之密碼系統,其特徵爲: 上述密碼裝置或中繼裝置乃,具備有:爲了終端與上 述第1之終端機之間而藉密碼化之保全而實施資料之密碼化 處理及解碼處理之密碼化/解碼手段,及 將由一端口所輸入,藉上述密碼化/解碼手段施予密 碼化處理或解碼處理之資料輸出於其他端口之資料轉送手 段。 4.如申請專利範圍第3項所述之密碼系統,其中 上述密碼化/解碼手段乃,在於與上述第1之終端機之 間實施被密碼化之資料通訊,同時在於與上述第2之終端 機之終端機乃爲了實施沒有密碼化之資料之通訊而實施上 述密碼化處理及上述解碼處理。 5 ·如申請專利範圍第3項所述之密碼系統,其中 上述中繼裝置係具備有,將上述密碼化/解碼手段之 功能予以積體化之半導體晶片。 6 .如申請專利範圍第5項所述之密碼系統,其中 上述半導體晶片係具設於訊號之送受訊部與基頻帶處 理器之間。 7·—種密碼裝置,其特徵爲: 直接或間接的連接於介著網絡實施資料通訊之複數之 終端機之間, 將由在於某一擬點網絡之內部或外部之一方之終端機 所受訊之資料予以密碼化而送訊至在於上述或某擬點網絡 之另一方之終端機’同時’將由上述另一方之終端機所受 -31 - (3) (3)200402010 訊之密碼予以解碼’送訊至上述一方之終端機。 8·—種密碼裝置,其特徵爲: 在於介著網絡實施資料通訊之終端機與該網絡之間, 直接或間接的連接於上述終端機, 將由在於某擬點網絡之外部之上述網絡所受訊之資料 予以密碼化而送訊至在於上述或某一擬點網絡內部之上述 終端機,同時’將由上述終端機所受訊之資料之密碼予以 解碼送訊至上述網絡。 9. 一種密碼裝置,其特徵爲: 在於介著網絡實施資料通訊之複數之終端機之間,直 接或間接的連接於在於某一擬點網絡之內部之一方之終端 機近傍, 將由在於上述某一擬點網絡之內部或外部之另一方之 終端機所受訊之資料之密碼予以解碼,送至上述一方之終 端機,同時將由上述一方之終端機所受訊之資料予以密碼 化送訊至上述另一方之終端機。 10. —種密碼裝置,其特徵爲: 介著有線或無線之網絡連接於,在於某一擬點網絡之 內部之具有密碼處理功能之第1之終端機,與在於上述或 某一擬點網絡之內部或外部之不具備密碼處理功能之第2 之終端機之間, 具備:在於與上述第1之終端機之間,爲了終端藉密 碼化之保全起見,實施資料之密碼化處理及解碼處理之密 碼化/解碼手段,及 -32- (4) (4)200402010 將由一方之端口所輸入之藉上述密碼化/解碼處理手 段而被密碼化處理或解碼處理之資料輸出於其他端口之資 料轉送手段。 11 ·如申請專利範圍第1 〇項所述之密碼裝置,其中 上述密碼化/解碼手段乃,在於與上述第1之終端機之 間係實施密碼化之資料之通訊,在於與上述第2之終端機 之間係爲了實施沒有密碼化之資料之通訊起見,實施上述 密碼化處理及上述解碼處理。 12.如申請專利範圍第10項所述之密碼裝置,其中 將上述密碼化/解碼手段以及上述資料傳送之功能藉 積體化於半導體晶片而構成。 1 3 . —種密碼裝置,其特徵爲: 在於某一擬點網絡之內部之不具有密碼處理功能之第 1之終端機,與在於上述某一擬點網絡內部或外部之具有 密碼處理功能之第2之終端機之間,介著有線或無線之網 絡連接於上述第1之終端機之近傍,具備: 爲了終端,在於與上述第1之終端機之間之藉密碼化 之保全而實施資料之密碼化處理及解碼處理之密碼化/解 碼手段,及 將由一端口所輸入之由上述密碼化/解碼手段而施予 密碼化處理或解碼處理之資料輸出於其他端口之資料轉送 手段。 -33-(2) (2) A cryptographic system composed of a cryptographic device or a relay device processed in 200402010, characterized in that the cryptographic device or the relay device is provided with: borrowing between the terminal and the first terminal described above Cryptographic preservation and implementation of cryptographic / decoding methods for data encryption and decoding, and inputting data from one port and applying cryptographic or decoding processing through the above-mentioned cryptographic / decoding methods to output to other ports Means of data transfer. 4. The cryptographic system according to item 3 of the scope of patent application, wherein the above-mentioned encryption / decoding means is to implement encrypted data communication with the first terminal described above, and at the same time with the second terminal described above The terminal of the machine implements the above-mentioned encryption processing and the above-mentioned decoding processing in order to implement communication without encrypted data. 5. The cryptographic system according to item 3 of the scope of patent application, wherein the relay device is provided with a semiconductor chip that integrates the functions of the cryptographic / decoding means described above. 6. The cryptographic system according to item 5 of the scope of patent application, wherein the above-mentioned semiconductor chip is provided between a signal transmitting and receiving unit and a baseband processor. 7 · —A cryptographic device, characterized in that: it is directly or indirectly connected between a plurality of terminals that implement data communication through a network, and will be received by a terminal that is one of the internal or external parties of a pseudo-point network The information is encrypted and sent to the terminal of the other party in the above or a certain point network 'at the same time' will be decoded by the other party's terminal -31-(3) (3) 200402010 The password is decoded ' Send the message to the terminal of the above party. 8 · —A cryptographic device, which is characterized in that: a terminal that implements data communication through a network and the network are directly or indirectly connected to the above terminal, and will be received by the above-mentioned network that is external to a certain point network The information of the message is encrypted and sent to the above-mentioned terminal within the above-mentioned or a certain intended network, and the password of the information received by the above-mentioned terminal is decoded and sent to the above-mentioned network. 9. A cryptographic device, characterized in that: between a plurality of terminals implementing data communication via a network, directly or indirectly connected to a terminal near one of the parties in a pseudo-point network, it will be caused by some of the above The password of the data received by the terminal of the other party inside or outside the network of a quasi-point network is decoded and sent to the terminal of the above party, and the data received by the terminal of the above party is encrypted and transmitted to The terminal of the other party. 10. A cryptographic device, characterized by being connected via a wired or wireless network to a first terminal having a cryptographic processing function within a pseudo-point network, and the aforementioned or a pseudo-point network Between the internal or external terminal 2 that does not have the password processing function, it is provided with: between the terminal 1 and the terminal 1 mentioned above, for the purpose of the terminal's cryptographic security, the data is encrypted and decoded. Cryptographic / decoding means for processing, and -32- (4) (4) 200402010 Data that is input from one port and encrypted or decoded by the above-mentioned ciphering / decoding processing means is output to other port data Means of transfer. 11 · The cryptographic device as described in Item 10 of the scope of patent application, wherein the above-mentioned encryption / decoding means is to communicate with the first terminal to implement encrypted data, and is to communicate with the second terminal. The terminals perform the above-mentioned encryption process and the above-mentioned decoding process in order to implement communication without encrypted data. 12. The cryptographic device according to item 10 of the scope of patent application, wherein the above-mentioned encryption / decoding means and the above-mentioned data transmission function are integrated into a semiconductor chip and constituted. 1 3. A cryptographic device, characterized in that it is the first terminal that does not have a cryptographic processing function inside a certain intended network, and the first terminal with a cryptographic processing function that is inside or outside a certain intended network. The second terminal is connected to the first terminal via a wired or wireless network, and includes: To implement a terminal for the purpose of securing the borrowed password between the first terminal and the first terminal Cryptographic / decoding means for cryptographic processing and decoding processing, and data transfer means for outputting data that was subjected to cryptographic processing or decoding processing by the aforementioned cryptographic / decoding method input from one port to other ports. -33-
TW92112603A 2002-07-26 2003-05-08 Encryption system and encryption device TWI276018B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2002218590 2002-07-26

Publications (2)

Publication Number Publication Date
TW200402010A true TW200402010A (en) 2004-02-01
TWI276018B TWI276018B (en) 2007-03-11

Family

ID=31184685

Family Applications (1)

Application Number Title Priority Date Filing Date
TW92112603A TWI276018B (en) 2002-07-26 2003-05-08 Encryption system and encryption device

Country Status (2)

Country Link
TW (1) TWI276018B (en)
WO (1) WO2004012386A1 (en)

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3263878B2 (en) * 1993-10-06 2002-03-11 日本電信電話株式会社 Cryptographic communication system

Also Published As

Publication number Publication date
TWI276018B (en) 2007-03-11
WO2004012386A1 (en) 2004-02-05

Similar Documents

Publication Publication Date Title
Potter Wireless security's future
Housley et al. Security problems in 802.11-based networks
US20050193199A1 (en) Accessing protected data on network storage from multiple devices
TW200307423A (en) Password device and method, password system
US7480939B1 (en) Enhancement to authentication protocol that uses a key lease
Kumar et al. A literature review of security threats to wireless networks
WO2006118603A2 (en) Systems and methods for the application of cryptosystems to the data link layer of wireless packet networks
US20020106085A1 (en) Security breach management
JP4752064B2 (en) Communication system on public line for restricting access, terminal connection device and server connection restriction device
US8707390B2 (en) System and method for secure access control in a wireless network
Singh et al. Analysis of security issues and their solutions in wireless LAN
Ajah Evaluation of enhanced security solutions in 802.11-based networks
US20070232316A1 (en) System and method for secure network browsing
US6975729B1 (en) Method and apparatus for facilitating use of a pre-shared secret key with identity hiding
KR101784240B1 (en) Communication security method and system using a non-address network equipment
Li et al. Encryption as an effective tool in reducing wireless LAN vulnerabilities
TW200402010A (en) Encryption system and encryption device
Cisco Introduction to IPSec
US20080059788A1 (en) Secure electronic communications pathway
Maple et al. Choosing the right wireless LAN security protocol for the home and business user
Nguyen Wireless Network Security: A Guide for Small and Medium Premises
JP4752062B2 (en) Terminal connection device and server connection restriction device on public line for performing access restriction
Pervaiz et al. Security in wireless local area networks
Sharma et al. Wireless Network Security: Requirements, Attacks, Vulnerabilities, Security Solutions
Mahammad et al. Key distribution scheme for preventing key reinstallation attack in wireless networks

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees