TW201620269A - Communication apparatus, method for controlling communication between different types of devices, and method for eliminating specificity of operational management - Google Patents

Communication apparatus, method for controlling communication between different types of devices, and method for eliminating specificity of operational management Download PDF

Info

Publication number
TW201620269A
TW201620269A TW104123831A TW104123831A TW201620269A TW 201620269 A TW201620269 A TW 201620269A TW 104123831 A TW104123831 A TW 104123831A TW 104123831 A TW104123831 A TW 104123831A TW 201620269 A TW201620269 A TW 201620269A
Authority
TW
Taiwan
Prior art keywords
address
data
network
server
information
Prior art date
Application number
TW104123831A
Other languages
Chinese (zh)
Inventor
Seiichi Ito
Ryuji Ishida
Original Assignee
Amiya Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Amiya Co Ltd filed Critical Amiya Co Ltd
Publication of TW201620269A publication Critical patent/TW201620269A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2514Translation of Internet protocol [IP] addresses between local and global IP addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2539Hiding addresses; Keeping addresses anonymous
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden

Abstract

The objective of the invention is to achieve the maintenance, operation and monitoring of a network environment by: eliminating the specificity and complexity of operational management accompanying the connection of different networks; eliminating on-site installation/adjustment operations; and improving the security. It can be ensured that: addresses for use only within a system are used to perform communications without using any addresses for use in the Internet or the like; any person can easily configure a network space on a group-by-group basis, e.g., a company-by-company basis, a department-by-department basis and a project-by-project basis; path information or the like is registered with a center that manages a network; any connection between different types of devices can be implemented; relay apparatuses acquire path information and perform mutual verifications; and all pieces of information flowing through the paths are encrypted.

Description

通訊裝置與異機種間通訊控制方法以及運用管理之專門性的排除方法 Communication device and heterogeneous communication control method and application management special elimination method

本發明為有關一種通訊裝置與異機種間通訊控制方法以及運用管理之專門性的排除方法者。 The present invention relates to a communication device and a heterogeneous type of communication control method and a specialized method for eliminating the use of management.

直到1980年代中期左右,電腦是藉由萬用機與輸入終端的組合構成,全部的處理都是利用中央的萬用機進行處理之稱為在封閉空間之運用。 Until the mid-1980s, the computer was composed of a combination of a universal machine and an input terminal. All the processing was performed by a central universal machine, which was called the use in a closed space.

但是,之後導入利用LAN或WAN連繫之公司內部網路環境,從1995年左右利用網際網路連繫公司內外部的網路環境乙事對於電腦系統產生變化,最近開始所謂雲端的服務,對於該形態越發前進,與公司外部的資源之連接、更甚是商業全球化超越國界之網路連接已成為通常的連接。現在將資訊使用超越國界之安全的網路進行傳送乙事為重要的。 However, after importing the internal network environment of the company connected by LAN or WAN, the use of the Internet to connect the internal and external network environment of the company around 1995 has changed the computer system. Recently, the so-called cloud service has started. This form has become more and more advanced, and the connection with resources outside the company, and even the network of business globalization beyond national borders, has become a common connection. It is now important to transmit information using a secure network that transcends national borders.

雲端服務雖然是利用網際網路與配對,但是網際網路當從安全面考量時由於有相當大的危險性,因此必須架構安全的網路。但是,在進行安全的網路連接方面,有所謂要對應複雜且多種的連接形態之課題,為了解決該課題浮現出所謂昂貴的機器、高難度的網路設計、以及為此造成高難度之網路專門技術者的確保之新課題,而有所謂位址管理、位址拮据之 課題。 Although the cloud service utilizes the Internet and pairing, the Internet must be constructed with a secure network when it is considered to be quite dangerous from the perspective of security. However, in terms of secure network connection, there is a problem of responding to complex and multiple connection forms. In order to solve this problem, so-called expensive machines, difficult network designs, and difficult networks have emerged. Road specialists ensure the new topic, and there is so-called address management, location constraints Question.

雖然有如專利文獻1所示之先前技術,但是在該技術中雖然進行使代理器可以將利用網際網路、LAN、WAN等所規定的位址尺寸變更為獨特尺寸的位址乙事,但是在本發明中並不是變更這樣的位址尺寸,而是可以直接利用該網路上所規定的尺寸之位址,不需要代理器等的設置,使運用變得非常簡單化,即使由於企業間合併等藉由不同的LAN、WAN等之結合而發生所謂位址重複的問題時也可以解決各種問題。 Although there is a prior art as shown in Patent Document 1, in this technique, the agent can change the address size specified by the Internet, LAN, WAN, etc. to a unique size address, but In the present invention, the address size is not changed, but the address of the size specified on the network can be directly used, and the setting of the agent or the like is not required, so that the operation is very simplified, even due to the merger between enterprises, etc. Various problems can also be solved when a problem of so-called address repetition occurs by a combination of different LANs, WANs, and the like.

先前技術文獻 Prior technical literature

專利文獻 Patent literature

【專利文獻1】日本發明專利第4802295號公報 Patent Document 1 Japanese Patent No. 4802295

為了提升運用管理效率,必須形成自立分散型系統,使流量分散減輕中繼器的負荷,並根據自我學習機能,將運用維持管理機能自動化。換言之,必須可以在網際網路上獨立架構加密網的技術。 In order to improve the efficiency of application management, it is necessary to form a self-supporting and decentralized system, so that the traffic is dispersed to reduce the load of the repeater, and the maintenance management function is automated according to the self-learning function. In other words, it is necessary to be able to independently structure the technology of the encryption network on the Internet.

會發生位址衝突這樣的事之不同網路的統合必須進行位址管理。又,在現在的技術中,安全的網路設計並非容易,要達到如期待般迅速且不繁鎖地架構‧運用運轉中的網路,網路設計的手法本身就必須花費心力,在達到所謂對每個應用程式進行位址的再分配之網路設計中,使網路不再簡單,而有由於伴隨網路機器的設定變更必須有莫大的投資之課題。 The integration of different networks, such as address conflicts, must be addressed. Moreover, in the current technology, secure network design is not easy, to achieve as fast and unobtrusive as expected. ‧ In the operation of the network, the network design method itself must be spent, in the so-called In the network design of redistributing addresses for each application, the network is no longer simple, and there is a problem that a great investment must be made due to changes in the settings of the network device.

本發明為集中管理位址,達到對每個終端可以自動附加位址、或是藉由即使沒有根據利用中繼器的自身學習機能使運用維持管理機能自動化之使用者的專門知識,也可以提供自由架構安全的網路之能力,任何人都可以簡單架構安全的網路乙事為最主要特徵之技術的提供及運用方法。 The present invention provides a centralized management address, which can automatically provide an address for each terminal, or can be provided by the expertise of a user who can automate the operation and maintenance management function even if the self-learning machine using the repeater can be automated. The ability to freely and securely secure the network allows anyone to simply architect and secure the network as the most important feature of the technology.

本發明之網路環境維修系統具有不需要使用者的專門知識,就可以簡單架構自由且安全的網路之優點。 The network environment maintenance system of the present invention has the advantage of not requiring the user's expertise to simply construct a free and secure network.

100‧‧‧網路系統 100‧‧‧Network System

101‧‧‧操作中心 101‧‧‧Operation Center

102‧‧‧認證局 102‧‧‧Certification Bureau

103‧‧‧主控台 103‧‧‧Main console

104‧‧‧管理網路 104‧‧‧Management Network

105‧‧‧實際網路 105‧‧‧ Actual network

106‧‧‧網際網路 106‧‧‧Internet

107‧‧‧裝置 107‧‧‧ device

108‧‧‧終端軟體 108‧‧‧ Terminal software

109‧‧‧PC 109‧‧‧PC

111‧‧‧LAN 111‧‧‧LAN

112‧‧‧伺服器 112‧‧‧Server

圖1為顯示本發明之一例的整體構成圖;圖2為裝置的初始化方法圖;圖3為裝置的死活狀況確認方法圖;圖4為裝置的管理資訊更新方法圖;圖5為管理者通知方法圖;圖6為裝置連接認證方法圖;圖7為終端軟體登錄方法圖;圖8為終端軟體連接方法圖;圖9為終端軟體切斷方法圖1;圖10為終端軟體切斷方法圖2;圖11為終端軟體切斷方法圖3;圖12為位址的轉換方法圖;圖13為位址轉換例傳送圖;圖14為位址轉換例回傳圖。 1 is an overall configuration diagram showing an example of the present invention; FIG. 2 is a diagram showing an initialization method of the apparatus; FIG. 3 is a diagram showing a method for confirming the life and death of the apparatus; FIG. 4 is a diagram of a method for updating management information of the apparatus; FIG. 6 is a device connection authentication method diagram; FIG. 7 is a terminal software login method diagram; FIG. 8 is a terminal software connection method diagram; FIG. 9 is a terminal software body cutting method diagram 1; 2; FIG. 11 is a terminal software cutting method FIG. 3; FIG. 12 is a bit address conversion method diagram; FIG. 13 is a bit address conversion example transmission diagram; FIG. 14 is a bit address conversion example return diagram.

圖1為本發明實施形態的例示之網路系統的整體概要圖。 1 is a schematic overall view of an exemplary network system according to an embodiment of the present invention.

本發明為藉由一元化管理網路資訊,削減直至現今煩雜的網路設計、構成、管理作業量,為了效率化藉由定義在邏輯上與網際網路被隔離的網路,為了提供對於來自網際網路的威脅予以保護之機能,具有操作中心101、認證局102、主控台103,構成管理網路104。 The present invention manages network information by unifying, and reduces the complexity of network design, composition, and management workloads until now, in order to provide efficiency for the network from being isolated from the Internet by logic. The network threat is protected, and the operation center 101, the certification authority 102, and the main control station 103 constitute a management network 104.

終端軟體108為安裝在PC、包含平板型電腦或智慧型手機之攜帶型多機能資訊終端等的終端之本發明軟體,PC109為未安裝已與網路連接之本發明軟體之PC、包含平板型電腦或智慧型手機之攜帶型多機能資訊終端等。經由終端軟體108和PC109、LAN110或網際網路106與裝置107連接,當裝置107經由管理網路104與操作中心101連接,利用認證局103認證為正規使用者時,裝置107等架構出實際網路105,利用網狀的實際網路105與終端軟體108或PC109進行加密通訊,進行安全的資料交換。 The terminal software 108 is a software of the present invention installed in a terminal of a PC, a portable multi-function information terminal including a tablet computer or a smart phone, and the PC 109 is a PC in which the software of the present invention connected to the network is not installed, and includes a tablet type. Portable multi-function information terminal for computers or smart phones. The device 107 is connected to the device 107 via the terminal software 108 and the PC 109, the LAN 110 or the Internet 106. When the device 107 is connected to the operation center 101 via the management network 104 and authenticated as a regular user by the certification authority 103, the device 107 constructs an actual network. The path 105 uses the meshed actual network 105 to perform encrypted communication with the terminal software 108 or the PC 109 for secure data exchange.

由於藉由發明人及申請人獨立命名之各個軟體及裝置架構本發明的實際網路,其記載如下。 The actual network of the present invention is constructed as follows by the software and device architecture independently named by the inventor and the applicant.

‧操作中心101 ‧Operation Center 101

管理網路資訊,具有用以構成在邏輯上與既存的網際網路被隔離的網路所必要之只在本發明的實際網路內使用之實際位址管理機能,具有將在網路系統100內發生的事件記錄成日誌之機能或認證局102,具有對於管理者可進行根據GUI的操 作之主控台103。 Management network information, having the actual address management functions necessary to construct a network that is logically isolated from the existing Internet, is only used within the actual network of the present invention, and will be in the network system 100. The events occurring within the log are recorded as log function or certificate authority 102, which has operations for the administrator to perform according to the GUI. The main control station 103.

前述,所謂實際位址為本發明重新作成管理,在本發明內所運用的通訊機器等進行傳送資料時,用以特定傳送目的地之裝置、機器、服務、軟體等的辨識碼。 As described above, the actual address is the management code for re-establishing the present invention, and the identification code of the device, the device, the service, the software, and the like for specifying the transmission destination when the communication device or the like used in the present invention transmits the data.

‧認證局102 ‧ Certification Bureau 102

在裝置107、終端軟體108、PC109等利用實際網路105之際,具有管理判斷是否為正規使用者的證明書之公開鍵證明書發行管理機能之認證局。 When the device 107, the terminal software 108, the PC 109, and the like use the actual network 105, there is a certification authority that manages the public key certificate issuing management function of the certificate that determines whether it is a regular user.

‧主控台103 ‧Main console 103

其為對操作中心101之GUI客戶,進行對操作中心101之資料輸入、更新、刪除、參照處理及活用操作中心101資訊,作成必要的資訊。 It is a GUI client of the operation center 101, and performs information input, update, deletion, reference processing, and utilization of the operation center 101 information of the operation center 101 to create necessary information.

‧管理網路104 ‧Management network 104

為了營運管理本發明的實際網路,主控台103與操作中心101連接,使終端軟體108、PC109等經由操作中心101在認證局102得到認證所用之經加密的安全通訊路徑。 In order to operate and manage the actual network of the present invention, the console 103 is connected to the operation center 101, so that the terminal software 108, the PC 109, and the like obtain an encrypted secure communication path for authentication by the authentication center 102 via the operation center 101.

‧實際網路105 ‧ actual network 105

在裝置107或終端軟體108、PC109等之間進行加密通訊之本發明的安全通訊路徑。 The secure communication path of the present invention for encrypted communication between the device 107 or the terminal software 108, the PC 109, and the like.

‧網際網路106 ‧Internet 106

利用網際網路協定之電腦網路。 A computer network that utilizes Internet Protocol.

‧裝置107 ‧Device 107

具有與操作中心101進行通訊的機能,提供安全機能、實際網路105的控制機能,控制來自終端軟體108及PC109的通訊。 It has the function of communicating with the operation center 101, provides the security function, the control function of the actual network 105, and controls the communication from the terminal software 108 and the PC 109.

‧終端108 ‧ Terminal 108

安裝在PC、包含平板型電腦或智慧型手機之攜帶型多機能資訊終端等之本發明的客戶軟體。 A client software of the present invention installed in a PC, a portable multi-function information terminal including a tablet computer or a smart phone.

‧PC109 ‧PC109

PC、包含平板型電腦或智慧型手機之攜帶型多機能資訊終端等之萬用裝置。 A universal device such as a PC, a portable multi-function information terminal including a tablet computer or a smart phone.

‧LAN110 ‧LAN110

一般性的區域網路。 General regional network.

圖2為針對本發明的初始設定進行記載之圖面。初始設定的目的為在新架構安全的本發明實際網路時,在操作中心101設定安全的本發明實際網路之所有者資訊,構成所有者配置下的群組。配備在各設置目的地之裝置107的初始設定為藉由在各設置目的地將裝置107與網際網路連接,將初始化鍵讀入到裝置107進行自動設定,使裝置107與管理網路連接進行設定。 Fig. 2 is a view showing the initial setting of the present invention. The purpose of the initial setting is to set the safe owner information of the actual network of the present invention in the operation center 101 when the actual network of the present invention is secure in the new architecture, and constitute a group under the owner configuration. The initial setting of the device 107 provided at each setting destination is to automatically connect the device 107 to the device 107 by connecting the device 107 to the Internet at each setting destination, and to connect the device 107 to the management network. set up.

圖2之所有者資訊輸入201為輸入承辦人、部門名、郵件位址、FAX號碼、TEL號碼、一般的位地等資訊作為操作中心101的所有者資訊,接收到已輸入的所有者資訊之所有者資訊登錄202為使用雜湊函數將一般的位址轉換為在本發明實際網路使用的唯一實際位址,自動產生實際網路名稱等在實際網路內使用的實際網路資訊,將所有者資訊與實際網路資訊登錄在操作中心101的管理資訊。裝置資訊輸入203為輸入設置地點、序列號碼、對一般網路的連接條件等作為裝置107的裝置資訊,接收到已輸入的裝置資訊之裝置資訊登錄204將其作為裝置107對於操作中心101連接時的資訊,將協定、閘 道等作為連接資訊登錄在操作中心101的資料庫,將自動產生的暫時ID、密碼、證明書資訊等作為認證資訊登錄在認證局102的加密資料庫。連接資訊加密206為利用共通鍵加密方式將裝置107對於操作中心101連接時的連接資訊加密,將已加密的資訊寫入到媒體。藉此,若是主控台103的設置場所的話,因為在任何地方都可以進行裝置107對於操作中心101連接時的連接資訊作成作業,因此可以圖謀作業的效率化。再者,在本發明中,因為使用該連接資訊成為裝置107與操作中心101連接時的初始化鍵,因此該已加密的連接資訊可以稱為初始化鍵。郵件傳送初始化鍵207為利用郵件等將初始化鍵傳送到裝置設置目的地的管理者。利用加密連接資訊206用以將連接資訊進行加密所使用的加密鍵是利用獨立的演算法產生、共有。郵寄208為利用郵寄將裝置107郵寄到寫入到操作中心101的管理資訊之裝置107的設定場所管理者。資訊取得210為將寄送到裝置107的設置場所之裝置107與利用郵件等收到的初始化鍵寫入到外部記憶媒體,利用初始化鍵的解密211,使前述外部記憶媒體與裝置107連接,讀入記憶在外部記憶媒體之初始化鍵與共通加密鍵。初始化鍵的解密211為使用外部記憶媒體的共通加密鍵,將外部記憶媒體之已加密的初始化鍵進行解密,取出用以將裝置107連接到操作中心101的資訊。連接操作中心212為利用經解密的初始化鍵將裝置107與操作中心101利用加密通訊進行連接。認證213為利用從裝置107傳送的暫時ID、密碼、證明書確認裝置107。在無法認證為正規者時,執行錯誤處理214並將錯誤內容輸出到日誌。在能夠認證 的情況下,利用實際網路傳送215對於裝置107作成既存位址、本發明的實際位址等,將本發明實際網路資訊對於裝置107進行傳送。裝置107利用實際網路接收處理216接收實際網路資訊,利用裝置構成處理217使裝置本身能夠與實際網路連接進行初始設定。 The owner information input 201 of FIG. 2 is input operator, department name, mail address, FAX number, TEL number, general place and other information as the owner information of the operation center 101, and receives the input owner information. The owner information login 202 is to use the hash function to convert the general address to the only actual address used in the actual network of the present invention, and automatically generate the actual network information such as the actual network name and the actual network information used in the actual network. The information and the actual network information are registered in the management information of the operation center 101. The device information input 203 is device information of the input device, the serial number, the connection condition to the general network, and the like, and the device information registration 204 that has received the input device information is connected to the operation center 101 as the device 107. Information, agreement, gate The track or the like is registered as the connection information in the database of the operation center 101, and the automatically generated temporary ID, password, certificate information, and the like are registered as the authentication information in the encrypted database of the certification authority 102. The connection information encryption 206 encrypts the connection information when the device 107 is connected to the operation center 101 by using the common key encryption method, and writes the encrypted information to the medium. As a result, if the installation location of the main control station 103 is performed, the connection information creation operation when the device 107 is connected to the operation center 101 can be performed anywhere, so that the work efficiency can be optimized. Furthermore, in the present invention, since the connection information is used as an initialization key when the device 107 is connected to the operation center 101, the encrypted connection information may be referred to as an initialization key. The mail transfer initialization key 207 is a manager who transfers an initialization key to a device setting destination by mail or the like. The encryption keys used to encrypt the connection information using the encrypted connection information 206 are generated and shared using an independent algorithm. The mailing 208 is a setting place manager who mails the device 107 to the device 107 written to the management information of the operation center 101 by mail. The information acquisition 210 is to write the device 107 sent to the installation location of the device 107 to the external memory medium with an initialization key received by mail or the like, and the external memory medium is connected to the device 107 by the decryption 211 of the initialization key. Enter the memory in the external memory media initialization key and common encryption key. The decryption 211 of the initialization key is a common encryption key using an external memory medium, decrypts the encrypted initialization key of the external memory medium, and extracts information for connecting the device 107 to the operation center 101. The connection operation center 212 connects the device 107 and the operation center 101 by encrypted communication using the decrypted initialization key. The authentication 213 is a temporary ID, a password, and a certificate confirmation device 107 transmitted from the device 107. When it is not possible to authenticate as a regular, error handling 214 is performed and the error content is output to the log. Be able to authenticate In the case of the actual network transmission 215, the actual network information of the present invention is transmitted to the device 107 for the device 107 to create an existing address, the actual address of the present invention, and the like. The device 107 receives the actual network information using the actual network receiving process 216, and the device configuration process 217 enables the device itself to be initially connected to the actual network.

圖3為針對本發明之裝置的死活監視進行記載之圖面。 Fig. 3 is a view showing the life and death monitoring of the apparatus of the present invention.

操作中心101及其他裝置107辨識裝置107的死活狀況,當操作中心101及其他裝置107判斷不適合作為實際網路的成員之情況下,將成為對象的裝置107從實際網路刪除,利用剩餘的裝置107再架構本發明的實際網路,並將執行狀況記錄在日誌,達到將狀況通知給管理者為目的。 The operation center 101 and other devices 107 recognize the life and death of the device 107. When the operation center 101 and other devices 107 determine that it is not suitable as a member of the actual network, the target device 107 is deleted from the actual network, and the remaining devices are utilized. 107 re-architects the actual network of the present invention, and records the execution status in the log to achieve the purpose of notifying the administrator of the status.

圖3的狀況檢測301為裝置107定期進行裝置107本身的自我檢測,確認裝置107本身的狀況,與操作中心101預先決定的運轉狀況進行編碼化。狀況通知305為將已編碼化的運轉狀況定期傳送到操作中心101。通知檢測306為在預先決定的一定期間內等待來自裝置107的運轉狀況通知,在一定期間內沒有從裝置107得到運轉狀況通知的情況,即使對於裝置107進行運轉狀況通知要求仍然沒有從裝置得到運轉狀況通知的情況下,將該裝置107的設置場所或是利用本發明決定之裝置107的實際位址等之可以特定裝置107的資訊作為無運轉狀況通知資訊輸出到錯誤日誌。雖然有來自裝置107的運轉狀況通知但是運轉狀況通知內容為錯誤的情況下也是將可以特定出該裝置107的資訊作為錯誤資訊輸出到錯誤日誌。在來自 裝置107之運轉狀況通知資訊為致命性錯誤之情況下,將其作為裝置致命性錯誤記錄在管理資訊,對於有這樣通知的裝置107以外的其他裝置107,由於有這樣通知的裝置107為不可使用,作為從實際網路排除所用的資訊予以活用。對於通知檢測306,在一定期間內從裝置107有得到運轉狀況通知且該運轉狀況通知沒有錯誤,又在所謂裝置107的設定內容有所變化的資訊之情況下,操作中心101將其與本身保存的裝置107之資訊進行比較,將有變化的資訊作為新的裝置107資訊,利用資訊變更處理314更新操作中心101的管理資訊。 The situation detection 301 of FIG. 3 is that the device 107 periodically performs self-detection of the device 107 itself, and confirms the status of the device 107 itself, and encodes the operation state determined in advance by the operation center 101. The status notification 305 is to periodically transmit the encoded operational status to the operation center 101. The notification detection 306 waits for the operation status notification from the device 107 within a predetermined period of time, and does not receive the operation status notification from the device 107 for a certain period of time. Even if the operation status notification request is made to the device 107, the operation is not performed from the device. In the case of the status notification, the information of the specific device 107, which is the installation location of the device 107 or the actual address of the device 107 determined by the present invention, is output as the no-operation status notification information to the error log. When there is an operation status notification from the device 107 but the operation status notification content is an error, the information that can specify the device 107 is output as an error message to the error log. In from When the operation status notification information of the device 107 is a fatal error, it is recorded as a fatal error of the device in the management information, and the device 107 other than the device 107 having such notification is not available because the device 107 thus notified is not available. , used as information used to exclude from the actual network. In the notification detection 306, the operation center 101 receives the operation status notification and the operation status notification has no error within a certain period of time, and in the case where the setting content of the device 107 has changed, the operation center 101 saves it with itself. The information of the device 107 is compared, the changed information is used as the new device 107 information, and the information change processing 314 is used to update the management information of the operation center 101.

圖4為在更新操作中心101的管理資訊的情況下,同一群組的裝置107從操作中心101取得管理資訊,架構新的實際網路為目的。 FIG. 4 shows the case where the management information of the operation center 101 is updated, and the device 107 of the same group acquires management information from the operation center 101, and constructs a new actual network.

利用管理資訊判斷401判斷管理資訊是否更新,在判斷為有更新管理資訊的情況下,管理資訊轉換402將管理資訊作成為傳送資料。從裝置107的管理資訊傳送委託403對於操作中心101委託管理資訊的傳送,接收委託的操作中心101利用管理資訊傳送404對於裝置107傳送管理資訊。收到管理資訊的裝置107對於裝置107的OS執行通訊狀況的確認命令,取得裝置107本身的通訊狀況是如何構成的最新資訊,將已接收的管理資訊與裝置107本身的通訊狀況進行比較,辨識其他裝置107的增減,在有從管理資訊刪除的其他裝置107時,以無法與成為對象的裝置107進行一切通訊的方式加以處理,利用除外處理結束報告410對於操作中心101通知對象裝置除外報告。 The management information judgment 401 determines whether the management information is updated. When it is determined that the management information is updated, the management information conversion 402 makes the management information into the transmission data. The management information transfer request 403 of the slave device 107 requests the operation center 101 to transfer the management information, and the operation center 101 that receives the request transmits the management information to the device 107 by using the management information transfer 404. The device 107 that receives the management information executes the confirmation command of the communication status of the OS of the device 107, obtains the latest information on how the communication status of the device 107 itself is constructed, and compares the received management information with the communication status of the device 107 itself. When the other device 107 is added or removed from the management information, the device 107 is not able to perform all communication with the target device 107, and the exclusion process end report 410 is used to notify the operation center 101 of the target device exclusion report. .

此時,在有增加的裝置之情況下,進行裝置追加處理(參 照圖6)。 At this time, in the case where there is an added device, the device addition processing is performed (see See Figure 6).

利用來自主控台之強制切斷412進行裝置107的強制排除處理的情況下,對於經強制排除的裝置107所屬之群組的其他裝置107,同時通知強制排除裝置107乙事。收到該通知之主控台107立即以無法與經強制排除的裝置107進行一切通訊的方式加以處理,利用除外處理結束報告410對於操作中心101通知對象裝置除外報告。 When the forced removal processing of the device 107 is performed by the forcible disconnection 412 from the master station, the other device 107 of the group to which the forced exclusion device 107 belongs is simultaneously notified to the forced exclusion device 107. The main control station 107 that has received the notification immediately processes the communication with the device 107 that has been forcibly excluded, and uses the exclusion processing end report 410 to notify the operation center 101 of the target device exclusion report.

圖5為從操作中心101的最新日誌確認到緊急狀態時,對管理者報告具有緊急性的錯誤為目的。 FIG. 5 is for the purpose of reporting an urgency error to the manager when the emergency log is confirmed from the latest log of the operation center 101.

在操作中心101的日誌處理中,定期進行操作中心101的資料庫所確保的日誌之確認。當日誌在從上次確認後有新追加時,讀取新的日誌並利用緊急性判斷處理503判斷該日誌內容具有緊急性時,利用通知內容編輯處理504編輯該緊急內容,利用通知目的地確保處理505確保通知目的地,利用郵件等通知管理者。 In the log processing of the operation center 101, the confirmation of the log secured by the database of the operation center 101 is periodically performed. When the log is newly added after the last confirmation, when the new log is read and the urgency determination processing 503 determines that the log content is urgency, the emergency content is edited by the notification content editing processing 504, and the notification destination is secured. The process 505 ensures that the destination is notified, and the manager is notified by mail or the like.

圖6為在同一群組內追加新裝置107時,確認認證該裝置107與其他裝置107物理性連接,成為新實際網路的構成成員為目的。 FIG. 6 shows that when the new device 107 is added to the same group, it is confirmed that the device 107 is physically connected to the other device 107 and becomes a constituent member of the new actual network.

在利用死活確認等處理追加新的裝置107時,利用防火牆設定601、防火牆設定603,以能夠與對方裝置107進行通訊的方式變更防火牆的設定。連接要求602為對於對方裝置107進行通訊連接要求,通訊連接要求雖然是互相進行的,但是接收通訊連接要求側會立即切換為連接應答604。連接應答604為對於對方側裝置107通知連接準備結束。 接收連接準備結束的裝置107對於對方側裝置107,利用密碼認證605從由操作中心101所接收到的變更管理資訊,將ID、密碼、證明書等對於對方側裝置107進行傳送。接收到ID、密碼、證明書等之裝置107利用認證OK606從由操作中心101所接收到的變更管理資訊比對確認ID、密碼、證明書,在無法比對確認時,利用FW通訊不准607變更防火牆設定,強制切斷與對方側裝置107的通訊。在可以比對確認時,利用通訊允許608對於對方側裝置107給予通訊允許,利用加密連接609與加密連接610確立加密通訊,藉由裝置107利用加密連接完成報告611與加密連接完成報告612,將確立加密通訊乙事報告操作中心101,在操作中心101利用接收加密連接完成報告613進行接收,利用裝置追加處理結束記錄614將裝置追加結束記錄在操作中心101的管理資訊。 When the new device 107 is added by the process such as the death and death check, the firewall setting 601 and the firewall setting 603 are used to change the setting of the firewall so that the communication with the counterpart device 107 can be performed. The connection request 602 is a communication connection request to the counterpart device 107. Although the communication connection requirements are mutually performed, the receiving communication connection request side immediately switches to the connection response 604. The connection response 604 is to notify the counterpart device 107 of the completion of the connection preparation. The device 107 that has received the connection preparation completion transmits the ID, the password, the certificate, and the like to the counterpart device 107 from the change management information received by the operation center 101 by the password authentication 605. The device 107 that has received the ID, the password, the certificate, and the like uses the authentication OK 606 to compare the ID, the password, and the certificate from the change management information received by the operation center 101. When the comparison cannot be confirmed, the FW communication is not allowed to be used 607. The firewall setting is changed to forcibly cut off communication with the counterpart device 107. When the comparison can be confirmed, the communication permission 608 is used to give the communication permission to the counterpart device 107, the encrypted connection is established by the encrypted connection 609 and the encrypted connection 610 is established, and the device 107 uses the encrypted connection to complete the report 611 and the encrypted connection completion report 612. The encrypted communication B report operation center 101 is established, the operation center 101 receives the report by the reception encrypted connection completion report 613, and the device addition processing end record 614 is used to add the device to the management information recorded in the operation center 101.

圖7的目的為在新設置終端軟體108時,藉由從主控台103指示操作中心101,使操作中心101發行終端軟體108用的證明書,並將已發行的證明書加密。將經加密的證明書與連接資訊作為新終端軟體108傳給要追加的PC等之管理者。 The purpose of FIG. 7 is to cause the operation center 101 to issue a certificate for the terminal software 108 by instructing the operation center 101 from the main control station 103 when the terminal software 108 is newly installed, and to encrypt the issued certificate. The encrypted certificate and the connection information are transmitted as new terminal software 108 to the administrator of the PC or the like to be added.

客戶證明書發行指示701與客戶證明書發行指示702為在將新終端軟體安裝在PC、包含平板型電腦或智慧型手機之攜帶型多機能資訊終端等時,從主控台103對於操作中心101或認證局102啟動客戶證明書發行處理702,將證明書作成版本、由認證局102唯一分配的串行號進行編號、公開鍵證明書的簽名方式等作為終端軟體108用的證明書予以作成。設定資訊連接703連結前述處理、利用客戶證明書發行702所發 行的證明書與操作中心資訊、擴展設定資訊,作為終端軟體連接資訊,利用加密704將終端軟體連接資訊加密,利用終端軟體連接資訊705對於終端軟體103的管理者利用終端軟體連接資訊郵件等傳送705寄送終端軟體連接資訊等通訊手段、或是利用將已加密的終端軟體連接資訊寫入到外部記憶媒體利用郵寄等手段進行傳送,終端軟體103的管理者利用終端軟體連接資訊郵件等接收706藉由郵件等通訊手段或是郵寄等手段進行接收。終端軟體103的管理者進行終端軟體安裝707的處理,在符合之PC、包含平板型電腦或智慧型手機之攜帶型多機能資訊終端等安裝終端軟體。其次,終端軟體103的管理者利用連接資訊解密708將加密的終端軟體連接資訊讀入到符合之PC、包含平板型電腦或智慧型手機之攜帶型多機能資訊終端等進行解密,進行終端軟體103的設定,利用ID作成710作成終端軟體所設定之PC、包含平板型電腦或智慧型手機之攜帶型多機能資訊終端等的唯一ID等。使用終端軟體連接資訊,利用終端軟體控制中心認證711對於操作中心101進行連接,進行認證要求,利用認證OK712進行認證確認,在可認證確認時,利用終端軟體登錄713將終端軟體作為登錄資訊,將完成終端軟體設定之PC、包含平板型電腦或智慧型手機之攜帶型多機能資訊終端等的個別資訊等登錄到操作中心101的資料庫,對於終端軟體108通知登錄結束。利用認證OK712不能認證時,將無法認證乙事輸出到錯誤日誌,切斷與符合的終端軟體之通訊。 The customer certificate issuance instruction 701 and the customer certificate issuance instruction 702 are from the main control station 103 to the operation center 101 when the new terminal software is installed on a PC, a portable multi-function information terminal including a tablet computer or a smart phone. The certification authority 102 activates the client certificate issuance process 702, and creates a version of the certificate, a serial number uniquely assigned by the certification authority 102, a signature method of the public key certificate, and the like as a certificate for the terminal software 108. The setting information connection 703 links the foregoing processing and is issued by the customer certificate issuing 702. The certificate of the line and the operation center information, the extension setting information, as the terminal software connection information, the terminal software connection information is encrypted by the encryption 704, and the terminal software connection information 705 is transmitted to the administrator of the terminal software 103 by using the terminal software to connect the information mail or the like. 705 sends the terminal software connection information and other communication means, or writes the encrypted terminal software connection information to the external memory medium by mail or the like, and the administrator of the terminal software 103 receives the information mail or the like by using the terminal software to receive 706. Receive by means of mail or other means of communication or by mail. The administrator of the terminal software 103 performs the processing of the terminal software installation 707, and installs the terminal software in a PC, a portable multi-function information terminal including a tablet computer or a smart phone. Next, the administrator of the terminal software 103 decrypts the encrypted terminal software connection information by using the connection information decryption 708 to the PC, the portable multi-function information terminal including the tablet computer or the smart phone, and decrypts the terminal software 103. The ID is used to create a unique ID such as a PC set by the terminal software, a portable multi-function information terminal including a tablet computer or a smart phone, and the like. By using the terminal software connection information, the terminal software control center authentication 711 is connected to the operation center 101, and the authentication request is made, and the authentication OK 712 is used for the authentication confirmation. When the authentication is identifiable, the terminal software registration 713 is used as the login information. The PC that has completed the terminal software setting, the individual information such as the portable multi-function information terminal including the tablet computer or the smart phone, and the like are registered in the database of the operation center 101, and the terminal software 108 notifies the completion of the registration. When the authentication OK712 cannot be used for authentication, it will not be able to verify that the B event is output to the error log, and the communication with the matching terminal software is cut off.

圖8為在終端軟體108在經由裝置107與實際網 路切斷連接時之動作及從主控台103在裝置107的追加刪除或裝置107的不合宜等要素有所變化的情況下,對於受到該變化的影響之裝置107由操作中心101以下推式通知新的狀況之情況下的處理、或是由裝置107定期對於操作中心101的詢問,由操作中心101進行回答為目的。 Figure 8 is a diagram of the terminal software 108 passing through the device 107 and the actual network. When the operation at the time of disconnection of the road and the additional deletion of the device 107 from the main control unit 103 or the inconvenience of the device 107 are changed, the device 107 that is affected by the change is pushed by the operation center 101. The processing in the case of notifying the new situation or the periodic inquiry by the device 107 to the operation center 101 is performed by the operation center 101.

圖8的認證要求801為從終端軟體108與操作中心101連接進行認證要求,在可認證的情況下,操作中心101藉由連接目的地裝置確認803檢查有無連接著終端軟體108的裝置107,在沒有連接的裝置107時,將無連接目的地傳給終端軟體108切斷回線。在連接的裝置107為多個時,利用最佳裝置檢索804從現時點的最少連接數等決定最佳的裝置107,對於該裝置107藉由連接允許指示806將終端軟體108之全球IP位址等連接資訊傳給裝置107,藉由連接準備處理807以能夠接收來自終端軟體108的通訊之方式變更防火牆的設定,在設定完成的階段利用連接準備完成報告808對於操作中心101與終端軟體108報告連接準備完成。操作中心101利用連接目的地裝置通知809對於終端軟體108指示裝置107的一般性位址等連接方法,終端軟體108依據已收到的連接方法決定通訊協定,藉由連接認證資訊傳送810將ID、密碼、證明書等傳送到裝置107,操作中心101確認已收到的ID、密碼、證明書等,若是可承認則將可承認乙事傳給終端軟體108。終端軟體108藉由加密資料通訊812與裝置107的加密資料通訊813進行加密通訊,裝置107將已收到的資訊傳送到目的地。 The authentication request 801 of FIG. 8 is an authentication request for connection from the terminal software 108 to the operation center 101. When the authentication is possible, the operation center 101 checks the presence or absence of the device 107 to which the terminal software 108 is connected by the connection destination device confirmation 803. When there is no connected device 107, the connectionless destination is transmitted to the terminal software 108 to cut off the return line. When there are a plurality of connected devices 107, the optimal device 107 is determined by the optimal device search 804 from the minimum number of connections at the current point, and the global IP address of the terminal software 108 is connected to the device 107 by the connection permission indication 806. The connection information is transmitted to the device 107, and the setting of the firewall is changed by the connection preparation processing 807 so that the communication from the terminal software 108 can be received, and the connection preparation completion report 808 is reported to the operation center 101 and the terminal software 108 at the stage of setting completion. The connection is ready to be completed. The operation center 101 uses the connection destination device notification 809 to connect the terminal software 108 to the general address of the device 107, and the terminal software 108 determines the communication protocol according to the received connection method, and connects the authentication information transmission 810 to the ID, The password, the certificate, and the like are transmitted to the device 107, and the operation center 101 confirms the received ID, password, certificate, etc., and if it is acknowledgable, it can recognize the event B to the terminal software 108. The terminal software 108 performs encrypted communication with the encrypted data communication 813 of the device 107 by the encrypted data communication 812, and the device 107 transmits the received information to the destination.

圖9、圖10、圖11為根據任何的指示、或是回線 狀況的惡化而切斷回線為目的。 Figure 9, Figure 10, Figure 11 are based on any indication, or return line The situation is deteriorated and the return line is cut off.

圖9為利用終端軟體108之回線切斷指示901有回線切斷指示時,利用回線切斷訊息902對於裝置107傳送回線切斷訊息,收到回線切斷訊息之裝置107利用回線切斷處理903進行回線切斷,阻斷與終端軟體108之連接埠,利用切斷報告904對操作中心101報告已切斷與終端軟體108的回線。 In the case where the return line disconnection instruction 901 of the terminal software 108 has the return line disconnection instruction, the device 107 transmits the return line disconnection message by the return line disconnection message 902, and the device 107 that receives the return line disconnection message uses the return line cutting process 903. The loop is cut off, the connection with the terminal software 108 is blocked, and the disconnection report 904 is used to report to the operation center 101 that the loop with the terminal software 108 has been disconnected.

圖10為在終端軟體108與裝置107之間的通訊中,根據回線連接狀況的惡化等,發生裝置107無法與終端軟體108進行通訊的現象,利用無應答1001判斷為有回線不通可能性的情況下,利用確認1002由裝置107對端軟體108進行死活監視,在一定期間都無法進行通訊時裝置107利用切斷1004進行切斷處理,利用切斷報告1005對於操作中心101傳送切斷報告。 FIG. 10 shows a phenomenon in which the generation device 107 cannot communicate with the terminal software 108 in the communication between the terminal software 108 and the device 107, and the possibility that the generation device 107 cannot communicate with the terminal software 108 is determined by the non-response 1001. In the next step, the device 107 monitors the life of the client 108 by the device 100. When the communication is not possible for a certain period of time, the device 107 performs the disconnection process by the disconnection 1004, and the disconnection report 1005 transmits the disconnection report to the operation center 101.

圖11為從主控台103利用切斷指示1101進行終端軟體108與裝置107的切斷指示時,經由操作中心對連接著終端軟體108的裝置107進行指示,收到指示的裝置107利用終端軟體切斷1104進行切斷處理,對於操作中心101傳送切斷報告。 11 is an instruction to disconnect the device software 108 connected to the terminal software 108 via the operation center when the main control station 103 performs the disconnection instruction of the terminal software 108 and the device 107 by the disconnection instruction 1101, and the device 107 that receives the instruction uses the terminal software. The cutting 1104 is performed to perform the cutting process, and the cutting center report is transmitted to the operation center 101.

圖12為解決在將以不同的技術思想為基礎作成之多個不同網路統合為單一網路時所發生之所謂的網路位址重複的課題,同時藉由以達到利用單一之本發明實際位址存取具有不同位址的多個伺服器的位址,減少位址數量、削減成本、簡化運用管理為目的。 Figure 12 is a solution to the so-called network address repetition that occurs when a plurality of different networks based on different technical ideas are integrated into a single network, and at the same time, by using a single invention. The address addresses the addresses of multiple servers with different addresses, reducing the number of addresses, cutting costs, and simplifying application management.

構成從終端軟體108或PC109對於將資料傳送到將資料配置在不同網路上之伺服器112傳送資料時的說明圖。 利用終端軟體108或PC109的資料傳送1201被傳送到裝置107的資料,藉由資料格式分析1202分析傳送資料,判斷是對於設置在本發明內的伺服器等進行傳送、或是傳送到一般外部網路。判斷方法將傳送資料的傳送目的地位址與裝置107預先保持的轉換表比對,有登錄時就是對於本發明進行傳送,未登錄時就構成一般的外部傳送。利用資料格式分析1202判斷為一般的外部傳送時,進行一般的網路處理,將資料傳送到外部。 An explanatory diagram is constructed when the terminal software 108 or the PC 109 transmits data to the server 112 that configures the data on a different network. The data transmitted by the terminal software 108 or the PC 109 is transmitted to the data of the device 107, and the data is analyzed by the data format analysis 1202, and the data is transmitted to the server or the like provided in the present invention, or transmitted to the general external network. road. The judging method compares the transfer destination address of the transfer data with the conversion table held in advance by the device 107, and transfers the present invention when there is a login, and constitutes a general external transfer when not registered. When the data format analysis 1202 is judged to be a general external transmission, general network processing is performed to transfer the data to the outside.

在判斷為對於本發明內進行傳送的情況下,從終端軟體108或PC109到伺服器的通訊為在對向裝置107所具有的實際位址執行。該實際位址為不存在於成為傳送源之終端軟體108或PC109所屬的網路內之位址。藉由使用該方法,即使終端軟體108或PC109與伺服器所屬的網路重複而使位址重複的情況下,也可以進行通訊。 In the case where it is determined that the transmission is performed within the present invention, the communication from the terminal software 108 or the PC 109 to the server is performed at the actual address possessed by the opposite device 107. The actual address is an address that does not exist in the network to which the terminal software 108 or the PC 109 that is the transmission source belongs. By using this method, communication can be performed even if the terminal software 108 or the PC 109 overlaps with the network to which the server belongs and the address is repeated.

利用位址轉換A1205依據裝置107預先保持的轉換表將位址進行位址轉換,傳送到對向裝置107。轉換方法之例示記載於圖13。轉換理由是為了使傳送到對向裝置107的路徑為使用一般的網際網路等通訊路線,達到使一般的通訊機器可以將資料傳送到對向裝置107。接收到資料的裝置107在目的地為符合預先保持的轉換表之位址的情況下,利用位址轉換B1206依據轉換表轉換位址,將資料傳送到成為目的地的伺服器112。在本說明的案例之情況下必須使目的地符合轉換表,由於資料被分割為多個封包進行傳送/接收,進行狀態處理。接收到資料的伺服器112利用資料接收1207處理接收資料,利用資料回傳1208作成回傳資料。回傳資料的傳送目的地位址為接收資料的傳送 源,傳送源為伺服器本身的位址,將回傳資料傳送到裝置107。接收到回傳資料的裝置107利用位址轉換C1209進行狀態處理,轉換位址將資料傳送到對向裝置107。轉換方法之例示記載於圖14。接收到回傳資料的裝置107利用位址轉換D1210藉由狀態處理進行位址轉換,傳送到成為目的地之終端軟體108或PC109,終端軟體108或PC109利用資料接收1211接收資料。 The address is converted by the address conversion A1205 in accordance with the conversion table held in advance by the device 107, and transmitted to the opposite device 107. An example of the conversion method is shown in FIG. The reason for the conversion is to make the path to the opposite device 107 use a communication route such as a general Internet, so that the general communication device can transmit the data to the opposite device 107. The device 107 that receives the data transmits the data to the server 112 that is the destination by using the address conversion B1206 in accordance with the conversion table conversion address when the destination is in accordance with the address of the previously held conversion table. In the case of the case of the present description, it is necessary to make the destination conform to the conversion table, and the state processing is performed because the data is divided into a plurality of packets for transmission/reception. The server 112 that receives the data processes the received data by using the data receiving 1207, and uses the data backhaul 1208 to make the returned data. The transmission destination address of the returned data is the transmission of the received data. The source, the transmission source is the address of the server itself, and the returned data is transmitted to the device 107. The device 107 that received the return data performs state processing using the address translation C1209, and the conversion address transfers the data to the opposite device 107. An example of the conversion method is shown in FIG. The device 107 that has received the returned data is subjected to address conversion by the address processing using the address conversion D1210, and transmitted to the destination terminal software 108 or the PC 109, and the terminal software 108 or the PC 109 receives the data by using the material reception 1211.

產業上的可利用性 Industrial availability

今後,預測會越來越繁盛之雲端服務的安全機密通訊技術或是超越所謂日本國內外的空間,不需要特別的知識就可以簡單設置運用耗費在設置的勞力之設置運用技術。 In the future, it is predicted that the secure confidential communication technology of the cloud service that is becoming more and more prosperous will surpass the so-called space in Japan and abroad, and it is possible to simply set up the application technology that uses the labor that is set up without special knowledge.

100‧‧‧網路系統 100‧‧‧Network System

101‧‧‧操作中心 101‧‧‧Operation Center

102‧‧‧認證局 102‧‧‧Certification Bureau

103‧‧‧主控台 103‧‧‧Main console

104‧‧‧管理網路 104‧‧‧Management Network

105‧‧‧實際網路 105‧‧‧ Actual network

106‧‧‧網際網路 106‧‧‧Internet

107‧‧‧裝置 107‧‧‧ device

108‧‧‧終端軟體 108‧‧‧ Terminal software

109‧‧‧PC 109‧‧‧PC

111‧‧‧LAN 111‧‧‧LAN

112‧‧‧伺服器 112‧‧‧Server

Claims (4)

一種通訊技術,對於已經在各個PC或伺服器等設定位址之既存的網路,自動附予成為唯一的位址之系統,管理已經設定在PC或伺服器等之位址與利用本發明設定之位址的2個位址,不修正變更已經設定的位址,藉由已經設定的位址或是利用本發明設定的位址使其具有安全的機密性進行通訊。 A communication technology that automatically attaches a system that is already a unique address to an existing network that has been set to an address such as a PC or a server, and manages the address that has been set in the PC or the server, and uses the present invention. The two addresses of the address are not modified, and the address that has been set is not modified, and the address is set or the address set by the present invention is used to communicate with the security confidentiality. 一種位址管理技術,在配置裝置時,將設置有裝置之網路所具有的位址設定在裝置,利用控制中心保管設定在裝置的位址,以設定在裝置之位址為根基作成多個實際位址,保管在裝置、控制中心,將經保管的多個實際位址作為與裝置連接之PC、伺服器等用的實際位址,與前述PC、伺服器等從原本既存的網路分配到的位址一起進行雙重管理。 An address management technology, in the configuration of a device, the address of the network in which the device is installed is set in the device, and the address set in the device is stored in the control center, and the address is set to be based on the address of the device. The actual address is stored in the device and the control center, and the actual address stored in the storage is used as the actual address for the PC, the server, etc. connected to the device, and the PC, the server, etc. are allocated from the originally existing network. The addresses to be addressed are managed together. 一種自動位址產生技術,以分配在既存網路之位址為根基,自動調查分析使用中的位址與埠號碼或辨識碼,篩選出未使用的位址與埠號碼或辨識碼,利用位址與埠號碼或辨識碼成為新的位址。 An automatic address generation technology, which automatically allocates an address and a 埠 number or an identification code in an existing network based on an address assigned to an existing network, and filters out unused addresses and 埠 numbers or identification codes. The address and identification number or identification code becomes the new address. 一種通訊技術,將以不同的技術思想為根基作成的多個不同網路統合成單一網路,並且使資料具有安全的機密性進行通訊之技術,由裝置接收來自伺服器或PC、終端軟體等的傳送委託,前 述裝置分析已接收的資料,與前述裝置所保持的轉換表對照,在傳送目的地位址有登錄時,形成對於設置在本發明內之伺服器或PC等進行傳送,在傳送目的地位址沒有登錄時,形成傳送到一般的外部網路,在傳送到一般的外部網路時,進行與一般的通訊機器相同的動作,將資料傳送到一般網路,在對於設置在本發明內之伺服器或PC等進行傳送的情況下,通過一般網路上的資料為了避免與一般通訊機器具有的位址重複或是一般通訊機器的規定違反,將資料的傳送目的地位址、傳送源位址轉換為保存在前述裝置之唯一且使一般通訊機器可以對目標的對向裝置傳送資料之位址,傳送資料到對向裝置,前述對向裝置接收資料,分析已接收的資料之傳送目的地位址,使用前述裝置保存的表,將傳送源位址位址轉換為利用前述對向裝置所屬的網路可辨識之位址,傳送資料到目標的伺服器或PC等,前述伺服器或PC等接收資料,前述接收到資料的伺服器或PC等利用與一般網路通訊相同的方法作為回傳資料,此時將接收資料的傳送源為傳送目的地,將傳送目的地設定為前述伺服器或PC等具有的位址,因為傳送回傳資料到 前述對向裝置,因此前述對向裝置接收回傳資料進行狀態處理,轉換位址將回傳資料傳送到前述裝置,接收到前述回傳資料之前述裝置亦同,利用狀態處理進行位址轉換,將資料傳送到成為目的地之傳送源的伺服器或PC、終端軟體等,傳送源的伺服器或PC、終端軟體等接收資料。 A communication technology that combines multiple different networks based on different technical ideas into a single network, and enables data to have secure confidentiality for communication. The device receives information from a server or PC, terminal software, etc. Transfer request, before The device analyzes the received data, and compares with the conversion table held by the device, and when the transfer destination address is registered, it forms a transfer to the server or PC set in the present invention, and does not log in at the transfer destination address. When it is transmitted to a general external network, when it is transmitted to a general external network, the same operation as that of a general communication device is performed, and the data is transmitted to the general network, for the server set in the present invention or In the case of transmission by a PC or the like, the data on the general network is converted to be stored in the destination address and the transmission source address of the data in order to avoid the address duplication with the general communication device or the general communication device. The foregoing device is unique and enables the general communication device to transmit the address of the data to the target opposite device, transmit the data to the opposite device, receive the data from the opposite device, analyze the transmission destination address of the received data, and use the device The saved table converts the source address address to a address recognizable by the network to which the aforementioned opposite device belongs, The data is transmitted to the target server, PC, etc., and the server or the PC receives the data, and the server or the PC that receives the data uses the same method as the general network communication as the return data, and the data is received at this time. The transmission source is the transmission destination, and the transmission destination is set to the address of the aforementioned server or PC, etc., because the transmission data is transmitted to In the foregoing opposite device, the foregoing opposite device receives state processing of the return data, and the converted address transmits the returned data to the device, and the device that receives the back data is also used for address conversion by using state processing. The data is transmitted to a server, a PC, a terminal software, etc., which is the source of the destination, and the source server, PC, terminal software, etc. receive data.
TW104123831A 2014-10-17 2015-07-23 Communication apparatus, method for controlling communication between different types of devices, and method for eliminating specificity of operational management TW201620269A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2014224676A JP6150137B2 (en) 2014-10-17 2014-10-17 Communication device, heterogeneous communication control method, and operation management expertise exclusion method

Publications (1)

Publication Number Publication Date
TW201620269A true TW201620269A (en) 2016-06-01

Family

ID=55746389

Family Applications (1)

Application Number Title Priority Date Filing Date
TW104123831A TW201620269A (en) 2014-10-17 2015-07-23 Communication apparatus, method for controlling communication between different types of devices, and method for eliminating specificity of operational management

Country Status (5)

Country Link
JP (1) JP6150137B2 (en)
GB (1) GB2546464A (en)
SG (1) SG11201702716TA (en)
TW (1) TW201620269A (en)
WO (1) WO2016059840A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI822923B (en) * 2018-12-12 2023-11-21 日商關連風科技股份有限公司 Information communication methods, information communication systems, and methods of licensing services

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115174526A (en) * 2022-06-29 2022-10-11 京东方科技集团股份有限公司 Network adaptation method and device between devices, storage medium and electronic device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11112577A (en) * 1997-10-08 1999-04-23 Hitachi Ltd Interconnection system between lan systems and network service system
JP3566198B2 (en) * 2000-09-13 2004-09-15 日本電信電話株式会社 Connection management method and apparatus for communication between virtual private networks
JP5038887B2 (en) * 2004-04-15 2012-10-03 クリアパス・ネットワークス・インコーポレーテッド System and method for managing a network
JP4802263B2 (en) * 2009-07-17 2011-10-26 株式会社日立製作所 Encrypted communication system and gateway device
JP5552787B2 (en) * 2009-10-02 2014-07-16 村田機械株式会社 Relay server and relay communication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI822923B (en) * 2018-12-12 2023-11-21 日商關連風科技股份有限公司 Information communication methods, information communication systems, and methods of licensing services

Also Published As

Publication number Publication date
GB2546464A (en) 2017-07-19
GB201707772D0 (en) 2017-06-28
JP2016082555A (en) 2016-05-16
JP6150137B2 (en) 2017-06-21
WO2016059840A1 (en) 2016-04-21
SG11201702716TA (en) 2017-04-27

Similar Documents

Publication Publication Date Title
CN101809519B (en) Method for establishing a secure connection from a service technician to a component of an automation environment that can be remotely diagnosed and/or maintained and is experiencing failure
US20190037009A1 (en) System and method for providing data and application continuity in a computer system
US8762725B2 (en) Secure machine-to-machine communication protocol
US20170324566A1 (en) Unified encryption configuration management and setup system
JP4339234B2 (en) VPN connection construction system
CN105027493A (en) Secure mobile app connection bus
WO2003107156A2 (en) METHOD FOR CONFIGURING AND COMMISSIONING CSMs
JP2009277081A (en) Computer system for managing password for detecting information about component arranged on network, its method, and computer program
JP5041257B2 (en) Field communication system and field communication method
US20130081112A1 (en) Global Terminal Management Using 2-Factor Authentication
CN102857520A (en) Telnet protocol security access system and method for character terminal
CN102984045A (en) Access method of Virtual Private Network and Virtual Private Network client
EP2880832B1 (en) Method for configuring network nodes of a telecommunications network, telecommunications network, program and computer program product
JP2016535884A (en) Securing communications within network endpoints
TW201620269A (en) Communication apparatus, method for controlling communication between different types of devices, and method for eliminating specificity of operational management
KR101027725B1 (en) Security system
US9940116B2 (en) System for performing remote services for a technical installation
JP2024513674A (en) Use portable setup devices to authorize devices to process automation systems
CN110278127B (en) Agent deployment method and system based on secure transmission protocol
JP7225958B2 (en) Controllers and control systems
TW202147815A (en) Network connection management system for information device
US10742480B2 (en) Network management as a service (MaaS) using reverse session-origination (RSO) tunnel
WO2024057557A1 (en) Diagnostic device and diagnosis method
US9923868B2 (en) Working method for a system and system
JP2005130511A (en) Computer network management method and system