WO2007094036A1 - Information processing system - Google Patents

Information processing system Download PDF

Info

Publication number
WO2007094036A1
WO2007094036A1 PCT/JP2006/302466 JP2006302466W WO2007094036A1 WO 2007094036 A1 WO2007094036 A1 WO 2007094036A1 JP 2006302466 W JP2006302466 W JP 2006302466W WO 2007094036 A1 WO2007094036 A1 WO 2007094036A1
Authority
WO
WIPO (PCT)
Prior art keywords
public key
server
handset
encrypted
slave
Prior art date
Application number
PCT/JP2006/302466
Other languages
French (fr)
Japanese (ja)
Inventor
Masakazu Uehata
Satoshi Kawatani
Noriaki Uchino
Original Assignee
Seiko Instruments Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Seiko Instruments Inc. filed Critical Seiko Instruments Inc.
Priority to PCT/JP2006/302466 priority Critical patent/WO2007094036A1/en
Priority to JP2008500353A priority patent/JP4868322B2/en
Publication of WO2007094036A1 publication Critical patent/WO2007094036A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • the present invention relates to a terminal device, a slave terminal, an information processing server, and an information processing method, and for example, relates to a device for establishing a parent-child relationship between measurement devices.
  • the meter reader it has become possible for the meter reader to collect the measured values manually by turning each measuring device (for example, a gas meter) and collect them on the server via the power network.
  • the measurement position is constant, but the measurement time is different each time, so the measured value is also sent to the time stamp server, and the time stamp Sano I was asked to issue.
  • the time stamp is obtained by adding the received time information to the measured value received from the device and performing a digital signature with the private key of the time stamp server.
  • Patent Document 1 Special Table 2003—519417
  • This technology provides an audit server that audits the clock of a time stamp server, This prevents time tampering at the stamp server.
  • an object of the present invention is to provide a mechanism for setting an appropriate parent-child relationship between a parent device and a child device.
  • the present invention provides a verification server connected to a network and storing a verification server private key and a verification server public key paired with the verification server private key. Connects to the network and communicates with the slave unit terminal, and stores the slave unit secret key encrypted with the key and the slave unit secret key paired with the slave unit public key.
  • a terminal device for use in an information processing system configured using the terminal device, and an encrypted slave device public key receiving means for receiving the encrypted slave device public key from the slave device terminal; An encrypted child device public key transmitting means for transmitting the received encrypted child device public key to a predetermined destination, and the verification server decrypts the transmitted encrypted child device public key with the verification server private key.
  • a slave unit public key receiving means for receiving the slave unit public key Provide a terminal device characterized by having (first configuration).
  • a common key may be generated, and the generated common key may be encrypted using the received handset public key and transmitted to the handset terminal (second handset). Configuration).
  • the encrypted slave unit public key transmission means transmits the encrypted slave unit public key to the verification server via the information processing server, and the slave unit public key
  • the receiving means may be configured to receive the slave unit public key from the verification server via the information processing server (third configuration).
  • the present invention also provides a verification server that is connected to a network and stores a verification server private key, and an encryption device that encrypts a slave unit public key with a verification server public key that is paired with the verification server private key.
  • an encrypted common key encrypted by using the slave unit public key obtained by decrypting the transmitted encrypted slave unit public key is received from the terminal device.
  • the stored secret key can also be used to decrypt the common key from the received encrypted common key (fifth configuration).
  • the present invention also provides a verification server that is connected to a network and stores a verification server private key, and an encryption device that encrypts a slave unit public key with a verification server public key that is paired with the verification server private key.
  • a mobile device terminal that stores a mobile device public key and a mobile device private key that is paired with the mobile device public key; a terminal device that is connected to the network and communicates with the mobile device terminal; and
  • An information processing server used in an information processing system configured using an information processing server that communicates with a terminal device, a correspondence storage unit that stores correspondence between the terminal device and a slave terminal, and a terminal
  • the encrypted slave device public key receiving means for receiving the encrypted slave device public key stored in the slave device terminal from the device, and the terminal device and the slave device terminal force are associated with each other by the correspondence storage means.
  • an information processing server comprising: an encryption device public key transmission means for transmitting to a server (sixth configuration).
  • the present invention also provides a verification server that is connected to a network and stores a verification server private key, and an encryption device that encrypts a slave unit public key with a verification server public key that is paired with the verification server private key.
  • the handset terminal storing the handset public key and the handset secret key paired with the handset public key Information processing method performed by a terminal device used in an information processing system configured using a terminal device and a terminal device connected to the network and communicating with the child device terminal, wherein the terminal device A device public key receiving means, an encrypted child device public key transmitting means, and a child device public key receiving means,
  • An encryption slave unit public key receiving step for receiving the encrypted slave unit public key from the slave unit terminal by the encrypted slave unit public key receiving means, and an encryption slave unit public key transmitting step, The encrypted slave unit public key transmitting step for transmitting the received encrypted slave unit public key to a predetermined destination, and the slave unit public key receiving unit transmits the encrypted slave unit public key previously transmitted by the verification server.
  • a slave unit public key receiving step for receiving a slave unit public key obtained by decrypting a key with the verification server private key is provided (seventh configuration).
  • the present invention also provides a verification server that is connected to a network and stores a verification server private key, and an encryption device that encrypts a slave unit public key with a verification server public key that is paired with the verification server private key.
  • Information configured using a device public key, a child device terminal that stores a child device secret key that is paired with the child device public key, and a terminal device that is connected to the network and communicates with the child device terminal
  • An information processing method performed by a handset terminal used in a processing system, wherein the handset terminal includes an encrypted handset public key storage means, a handset secret key storage means, and an encryption handset public key transmission means
  • An encrypted slave device public key storage step for storing an encrypted slave device public key obtained by encrypting the slave device public key with the verification server public key by the encrypted slave device public key storage means;
  • the child device secret key storage means provides the child device.
  • a slave unit private key storage step for storing a slave unit private key that is paired with a public key; and the encrypted slave unit public key transmission unit transmits the stored encrypted slave unit public key to the terminal device.
  • An information processing method characterized by comprising: a public key machine public key transmission step (eighth configuration).
  • the present invention also provides a verification server that is connected to a network and stores a verification server private key, and an encryption device that encrypts a slave unit public key with a verification server public key that is paired with the verification server private key.
  • a mobile device terminal that stores a mobile device public key and a mobile device private key that is paired with the mobile device public key; a terminal device that is connected to the network and communicates with the mobile device terminal;
  • the device public key receiving means receives the encrypted slave device public key stored in the slave device from the terminal device from the terminal device, and the corresponding confirmation means means In the correspondence confirmation step for confirming whether or not the device and the child device terminal are associated with each other in the correspondence storage means, and in the correspondence confirmation step, the terminal device and the child device terminal are associated with each other.
  • the encryption handset public Provided is an information processing method characterized by comprising an encryption slave unit public key transmission step of transmitting the received encrypted slave unit public key to the verification server by an open key transmission means. Ninth configuration).
  • an appropriate parent-child relationship between the parent device and the child device can be set through the verification by the verification server.
  • a pair of handset private key and handset public key is generated inside handset 9 (Fig. 18), and the handset public key is sent to CA3.
  • CA 3 creates a slave unit public key certificate of the slave unit public key, encrypts it with the public key of the verification server 5, and transmits it to the slave unit 9.
  • the handset 9 stores the encryption device public key certificate and is shipped to the customer.
  • the device 7 (already connected to the information processing system 1) has a function of setting the slave unit 9 as a slave unit.
  • the following procedure is performed. After that, the parent-child relationship is set.
  • the slave unit 9 transmits the encrypted slave unit public key to the device 7.
  • the device 7 transmits this to the customer server 4.
  • the customer server 4 has a slave unit master in which the device 7 and the slave unit 9 are associated in advance, and the correspondence between the device 7 and the slave unit 9 is confirmed using this. After confirming the correspondence, the customer server 4 sends the encryption client public key certificate to the verification server 5.
  • the verification server 5 decrypts the encryption slave unit public key certificate using the verification server private key, extracts the slave unit public key, and transmits it to the customer server 4.
  • the customer server 4 receives the slave unit public key from the verification server 5 and transfers it to the device 7.
  • the device 7 When the device 7 receives the child device public key, the device 7 generates a common key, encrypts it using the child device public key, and transmits it to the child device 9.
  • the slave unit 9 decrypts this using the slave unit private key and extracts the common key. Thereafter, the device 7 and the slave device 9 perform communication by performing encryption / decryption using the common key.
  • FIG. 1 is a block diagram showing an example of a network configuration of the information processing system according to the present embodiment.
  • CA3, 3, verification server 5, customer server 4, 4, device registration server 6, device 7, 7, 7, ..., base station 8, etc. can be connected via network 10.
  • the parent CA2 is provided above CA3,3.
  • Both the parent CA2 and CA3 are certificate authority authentication servers that create public key certificates, and a certificate that proves the legitimacy of CA3's CA public key by the root certificate issued by the parent CA2. Make up the screen.
  • the authenticity of the CA public key certificate that certifies the public key of CA3 is confirmed by the root certificate issued by the parent CA2. More specifically, the CA public key of CA3 is digitally signed by the parent CA private key of the parent CA2, and the authenticity of the CA public key is verified by verifying the authenticity of this digital signature with the parent CA public key. Can be confirmed.
  • the CA public key certificate and root certificate are provided to the customer server 4, the verification server 5, and the device 7 in advance by a secure method.
  • the customer server 4 is an information processing server operated by a customer who performs measurement using the device 7. Note that the user of the device 7 is called the customer because the user of the device 7 is the customer of the seller when viewed from the seller side of the device 7.
  • Customer servers 4 are operated by customers, such as those operated by Company A and those operated by Company B, respectively.
  • the device 7 is a measuring device such as a gas meter, for example, and the customer server 4 collects measurement values from these devices 7 via the network 10. Gas charges etc. are calculated based on the collected measurements.
  • the device 7 is a measuring device or the like installed so as to be connectable to the network 10, and may be a mobile device in addition to a fixed device such as a gas meter.
  • the customer server 4 corresponding to the owner 4 Connect to and send information such as measurement values to the customer server 4.
  • the device 7 can be connected to the network 10 by wire as well as wirelessly. In this case, the device 7 is connected to the network 10 via the base station 8.
  • the verification server 5 is a server for verifying the legitimacy of the device 7 when the device 7 is installed in the network 10 and connected to the customer server 4 and preventing unauthorized use of the device 7 such as impersonation. .
  • the verification server 5 After the verification server 5 verifies that the device 7 is authentic, the customer server 4 connects to the device 7.
  • the device registration server 6 mediates between the device 7 and the CA3 when the device 7 issues a device public key certificate or the like to the CA3, and registers the device 7 in the verification server 5. It is.
  • the device registration server 6 stores a device registration server secret key
  • the verification server 5 stores a device registration server public key corresponding to the secret key.
  • the device registration server 6 encrypts the registration request information for registering the device 7 with the verification server public key and transmits it to the verification server 5, which verifies the verification server private key. I started to decrypt!
  • the verification server 5 can confirm that this information is surely transmitted from the device registration server 6 by digitally signing the registration request information with the registration server private key.
  • the parent CA2, CA3, the verification server 5, and the device registration system are the sales side operators such as the manufacturer 7 and the sales operator of the device 7.
  • the customer server 4 is operated by the customer who purchased the device 7.
  • the sales company Since the sales company has information on the serial number of device 7 and the customer to whom the device 7 is delivered, etc., operate the parent CA2, CA3, verification server 5, and device registration server 6 to provide the device verification service to the customer. Is in a good position to provide.
  • the communication path formed by the device 7, the verification server 5, the device registration server 6, the customer server 4 and the like via the network 10 is encrypted using a technology such as SSL (Secure Sockets Layer). Therefore, the security of the information processing system 1 is enhanced.
  • SSL Secure Sockets Layer
  • the device 7 is roughly divided into a tamper-resistant part 20 and a measuring part 35 connected by a bus line.
  • the tamper resistant part 20 is a functional part that performs information processing related to security such as device authentication.
  • the tamper resistant part 20 is a tamper resistant module constituted by an IC chip containing a tamper resistant integrated circuit.
  • the tamper-proof specification is a sufficient protection measure against fraudulent acts such as tampering and duplication, and decoding of the internal logical structure, such as automatically destroying the internal structure when trying to analyze the internal structure. It is a specification to take.
  • the tamper resistant part 20 is a kind of black box that is extremely difficult to analyze from the outside. For example, secret information such as a device secret key can be safely held. Note that tamper means that the device is tampered with, and that information is illegally changed.Tamper resistance means that it is resistant to these operations. Means.
  • the tamper resistant unit 20 includes a CPU (Central Processing Unit) 21, an internal clock 22, a ROM (Read Only Memory) 23, a RAM (Random Access Memory) 24, an EEPROM OM (Electrically Erasable and Programmable ROM) 25, and the like. It is configured to be connected by a bus line (not shown).
  • CPU Central Processing Unit
  • ROM Read Only Memory
  • RAM Random Access Memory
  • EEPROM OM Electrically Erasable and Programmable ROM
  • the CPU 21 is a central processing unit that performs various types of information processing according to programs stored in the EEPROM 25, the ROM 23, the RAM 24, and the like.
  • a pair of a device public key and a device private key is generated, device authentication of device 7 is performed by communicating with verification server 5, and information is encrypted when communicating with customer Sano. I do habit.
  • the internal clock 22 generates a clock for driving the tamper resistant part 20, and for example, the tamper resistant part 20 relates to a device 7 of a type that gives time information to the measurement value of the measuring part 35. Can be used as a clock for giving time information.
  • the internal clock 22 is synchronized with the external clock 28 of the measurement unit 35, and the CPU 21 and the CPU 29 can operate in synchronism with each other.
  • the ROM 23 is a read-only storage device (memory) and stores basic programs and parameters for driving the tamper resistant unit 20.
  • the RAM 24 is a readable / writable storage device, and provides a working area when the CPU 21 performs various types of information processing.
  • the EEPROM 25 is a readable / writable nonvolatile storage device, and stores program data and the like.
  • an asymmetric encryption key generation program device private key, device public key certificate, verification server public key certificate, verification server connection information, verification request program, CA public key certificate, Communication program, OS (Operating System), etc. are stored.
  • the asymmetric encryption key generation program is a program executed by the administrator of the device 7 (usually the manufacturer of the device 7) before the device 7 is delivered to the customer. When this program is executed by the CPU 21, An asymmetric encryption key pair (pair) of a device private key and a device public key is generated inside the tamper resistant unit 20.
  • the device 7 stores the generated device secret key in the EEPROM 25 and cannot know the device secret key from outside!
  • the device public key certificate is generated by the device 7 via the device registration server ⁇ .
  • a public key certificate sent to CA3 and digitally signed by CA3 with the CA private key was
  • Those who have received the device public key certificate can verify that the device public key described in the device public key certificate is authentic by verifying the digital signature with the CA public key.
  • the verification server public key certificate is a public key certificate in which CA 3 digitally signs the verification server public key, which is the public key of verification server 5, with the CA private key.
  • the device 7 encrypts information using the verification server public key recorded in the verification server public key, and transmits the encrypted information to the verification server 5. Since this encrypted information is a verification server private key possessed by the verification server 5 and cannot be decrypted, it cannot be decrypted even if a non-verification server 5 receives this encryption information. Can increase security.
  • the legitimacy of the verification server public key can be confirmed by verifying the digital signature of the verification server public key certificate with the CA public key.
  • the CA public key certificate is a public key certificate obtained by digitally signing the CA public key, which is the public key of CA3, with the parent CA2 using the parent CA private key.
  • the device 7 uses the CA public key described in the CA public key certificate to verify the verification server public key certificate of the verification server 5 and the customer server public key certificate of the customer server 4 (both are CA public keys of CA3). The legitimacy of the digital signature can be verified.
  • the verification server connection information is address information for connecting to the verification server 5 when the device 7 is connected to the network 10, and includes, for example, a URL (Uniform Resource Locators) of the verification server 5. Yes.
  • the device 7 When the device 7 is installed in the network 10, it connects to the verification server 5 using the verification server connection information and receives device verification.
  • the verification server connection information is embedded in the device 7 in advance, the device 7 can access the verification server 5 regardless of the network environment. Can do.
  • the verification request program is a program for requesting the verification server 5 to verify the device.
  • the CPU 21 After the device 7 is connected to the network 10 (for example, immediately after the power is turned on), when the CPU 21 executes the verification request program, the CPU 21 generates verification information described later. Then, the CPU 21 connects the device 7 to the verification server 5 using the verification server connection information, and transmits the verification information to the verification server 5.
  • the EEPROM 25 stores a program for performing information processing related to security, such as encrypting the measured value measured by the measuring unit 35.
  • a communication control part for controlling communication between the tamper resistant part 20 and the measuring part 35 is also configured.
  • the measurement unit 35 is a functional unit that performs measurement, and includes a CPU 29, a ROM 27, a RAM 30, an external clock 28, a display unit 31, an input unit 32, a storage unit 33, a measurement device unit 34, and the like.
  • the measurement device unit 34 is a device that performs measurement, and outputs a measurement value to the CPU 29 as digital information when requested by the CPU 29.
  • the measuring device unit 34 performs temperature measurement, humidity measurement, water quality measurement, air pollution measurement, and is installed in a vending machine for inventory and sales. Various things, such as what measures a situation etc., are employable.
  • the CPU 29 is a central processing unit that performs various types of information processing according to programs stored in the storage unit 33, the ROM 27, the RAM 30, and the like.
  • the CPU 29 operates in cooperation with the CPU 21.For example, when installing the device 7, the tamper resistant part The verification information output from 20 is transmitted to the verification server 5, and after installation, the measurement device section 34 also acquires the measured value, digitally signs it with the tamper resistant section 20, and transmits it to the customer server 4. To do.
  • the external clock 28 generates a clock for driving the measuring unit 35. Also, since the external clock 28 is generally more accurate than the internal clock 22, it is configured to correct the external clock 28 using an external signal, etc., and to correct the internal clock 22 using the corrected external clock 28. Yes.
  • the ROM 27 is a read-only storage device, and stores basic programs, parameters, and the like for driving the CPU 29.
  • the RAM 30 is a readable / writable storage device, and provides a working area when the CPU 29 performs various types of information processing.
  • the storage unit 33 is corrected by, for example, EEPROM, and stores various programs and data.
  • the measuring device unit 3 By executing the program stored in the storage unit 33 on the CPU 29, the measuring device unit 3
  • the storage unit 33 is used for temporarily storing the measurement value measured by the measurement device unit 34.
  • the display unit 31 includes, for example, a display device such as a liquid crystal display panel, and an operation instruction when the person in charge of installation installs the device 7 on the network 10 or a measurement value of the measurement device unit 34. Various types of information can be displayed.
  • the input unit 32 includes operation buttons and the like, and is used, for example, when the person in charge of installation installs the device 7 on the network 10 to operate the device 7.
  • the communication unit 26 constitutes an interface for connecting the device 7 to the network 10.
  • the CPU 21 and the CPU 29 communicate with the device registration server 6, the verification server 5, the customer server 4, and the like via the communication unit 26. can do.
  • the communication unit 26 includes an RF circuit and the like.
  • the verification server 5 includes a CPU 41, a ROM 42, a RAM 43, a storage unit 46, a communication unit 45, and the like.
  • the CPU 41 operates in accordance with programs stored in the ROM 42, RAM 43, storage unit 46, and the like, and performs various types of information processing for verifying the device 7.
  • the ROM 42 is a read-only storage device, and stores basic programs, parameters, and the like for driving the CPU 41.
  • the RAM 43 is a readable / writable storage device, and provides a working area when the CPU 41 performs various types of information processing.
  • the communication unit 45 is an interface that connects the verification server 5 to the network 10.
  • the storage unit 46 is configured using a large-capacity storage medium such as a hard disk, for example, and stores various programs and data as illustrated.
  • the verification program is a program for verifying the device 7.
  • the CPU 41 executes the device verification program, verifies the verification information transmitted from the device 7, and transmits the verification result to the customer server 4. Can do.
  • the CA public key certificate is a public key certificate of the CA public key of CA3.
  • the root certificate of force parent CA2 (not shown) is also stored. These certificates are provided in a secure manner, for example, handed over between personnel.
  • the verification server private key is a private key corresponding to the verification server public key, and is used for information encryption, digital signature, and the like.
  • the customer server connection information is information for connecting to the customer server 4 via the network 10, and is configured by, for example, the URL or IP address of the customer sano.
  • the customer server connection information is stored in the storage unit 46 in advance by the customer.
  • the verification server 5 When transmitting the verification result to the customer server 4, the verification server 5 connects to the customer server 4 using the customer server connection information and transmits it.
  • the device registration database is a database in which devices 7 that require verification are registered in advance.
  • An example of the logical configuration is shown in FIG.
  • the device registration database includes items such as “customer”, “customer server connection information”, “device ID”, “device public key”, and so on.
  • Customer ID is an I blueprint that identifies each customer who operates customer servers 4, 4,.
  • the customer is registered in the verification server 5 in advance, and HD information is given.
  • Customer server connection information is connection information for connecting to the customer server 4, and is stored in association with the customer ID.
  • one customer server connection information is described for each customer. However, when a customer uses multiple customer servers, the multiple customer server connection information is associated with a customer ID.
  • Equipment is information assigned to each of the devices 7, 7,..., And for example, a production serial number can be used.
  • the “device public key” is a device public key corresponding to the device private key stored for each device 7.
  • the device public key is obtained by the device public key certificate that CA3 sent to the verification server 5.
  • Which customer server connection information the device 7 is registered to correspond to for example, receives the designation of the customer server 4 to which the device 7 is connected from the customer when the device 7 is sold, The administrator has made it compatible.
  • the hardware configuration of the verification server 5 has the same hardware configuration as the verification server 5 such as the customer server 4, the device registration server 6, and the CA 3.
  • CA3 and parent CA2 perform various information processing functions such as creating a public key certificate by the CPU executing a predetermined program stored in advance.
  • the revocation list storing the revocation information of the device 7 that issued the device public key certificate is stored in the storage unit 46.
  • the revocation list is a data list that stores whether the device 7 to which CA3 issued the device public key certificate is currently revoked or not, corresponding to the presence or absence of the device ID. Immediately after the device public key certificate is issued, No information about the device is registered. And revocation is the customer It is set by registering the device ID in the revocation list by powerful declaration.
  • the verification server 5 verifies the validity by referring to the revocation list of CA 3 when there is an inquiry about validity such as customer sano.
  • the verification server 5 verifies the validity of the device 7 by using the revocation status storage means (revocation list of CA3) that stores whether the device is in a revocation status or not when verifying the legitimacy of the device 7. There should be a means of verifying the effectiveness.
  • the revocation status storage means revocation list of CA3
  • the storage unit 46 stores a device master, a measured value database, and the like.
  • the device master is master information of the device 7 to which the customer server 4 is connected.
  • basic information such as the device ID of the device 7, the device connection information for connecting to the device 7, the device public key, and the device 7 Attached information power, such as the installation location and date of installation.
  • the customer server 4 manages each device 7 by the device master.
  • the administrator of the customer server 4 inputs the revocation of the device 7 to the customer server 4 and deletes it from the device master. At this time, the customer server 4 sends a revocation request to CA3 and is revoked when CA3 is registered in the revocation list.
  • the measured value database is a database that stores and accumulates measured values transmitted from the device 7 via the network 10.
  • each measurement value is associated with the device ID of the device 7 that measured it, and the measurement date and time are also stored.
  • the device registration server 6 generates a function for mediating between the device 7 and CA3 when the device 7 obtains a device public key certificate, and generates registration request information and transmits it to the verification server 5 to transmit the verification server.
  • a program for causing the CPU to perform functions such as registering the device 7 is stored in the storage unit 46, and these functions are exhibited by executing this program.
  • the device registration server 6 also stores verification server connection information for input to the device 7.
  • Steps (1) to (4) are performed before installation of the device 7 (preferably before shipment to the customer).
  • the operator When the hardware of device 7 is completed, the operator operates device 7 to execute the asymmetric encryption key generation program, and causes CPU 21 to generate a device private key / device public key pair within tamper resistant unit 20 (asymmetric Encryption key generation means).
  • the device 7 stores the generated device secret key in a predetermined area of the EEPROM 25 (secret key storage means).
  • the device 7 is connected by a worker in charge to the device registration server in charge of the device 7, and transmits the generated device public key, device unique information, and the like to the device registration server (public key providing means).
  • the device-specific information includes information unique to the device 7 such as the device and the MAC address of the tamper-proof part.
  • the device registration server 6 receives these pieces of information from the device 7 (public key acquisition means). Then, the device registration server 6 sends the device public key, device ID, etc. to CA3 and requests CA3 to issue a device public key certificate (public key certificate issue request means).
  • CA3 creates a device certificate from the device public key from the device registration server 6.
  • CA 3 adds the verification server public key certificate of the verification server 5 to the device certificate to create a device certificate, and transmits the device certificate to the device registration server 6.
  • the device registration server 6 When the device registration server 6 receives the device certificate from CA3, it adds the verification server connection information to the device certificate and transmits it to the device 7 .
  • the device 7 receives the device certificate from the device registration server 6 and stores it in the tamper resistant unit 20.
  • the device certificate includes the device public key certificate, the verification server connection information, and the verification server public key certificate.
  • the book is included.
  • the device public key certificate is a public key certificate obtained by digitally signing the device public key of device 7 with the CA3 CA private key (certificate server private key). Means).
  • CA3 has a secret key storage means.
  • the device public key certificate includes, for example, a message having a content such as “Public key [abl2,... 01] is a device public key of device ID [12. It is composed of a digital signature that is obtained by encrypting the digest (for example, using the hash value of the message) generated from CA with the CA3 private key.
  • the digital signature is decrypted using the CA public key (certification server public key) of CA3, and a message digest is created to confirm the match between the two. It can be confirmed that the message has not been modified.
  • the verification server connection information is information for connecting to the verification server 5 on the network 10.
  • the verification server connection information includes a URL (Uniform Resource Locators) and an IP address of the verification server 5 (validation server Connection information storage means).
  • the verification server public key certificate is a public key certificate obtained by digitally signing the verification server public key with the CA3 private key.
  • the device 7 acquires the verification server public key using this.
  • the device 7 can verify the legitimacy of the device public key certificate and the verification server public key certificate by using a pre-installed CA public key.
  • the device registration server 6 includes the verification server public key certificate in the device certificate received from CA3 and transmits it to the device 7.
  • the present invention is not limited to this, and the device certificate received from CA3. And the configuration to send the verification server connection information to the device 7 separately.
  • the device registration system can obtain a device public key certificate when CA3 issues a device certificate to device 7.
  • the device registration Sano 6 creates registration request information including the device public key certificate obtained in this way, device unique information (device ID), etc., and sends it to the verification server 5 for verification. Request the certificate server 5 to register the device 7 (public key certificate transmission means).
  • the verification server 5 receives the registration request information from the device registration server 6 and updates the device registration database using this information.
  • the seller of the device 7 receives the customer server connection information of the customer server 4 from the customer 7 The data is input to the verification server 5 in correspondence with.
  • the verification server stores the device public key included in the registration request information in the device registration database in association with the device 7 (public key storage means), and further associates the device 7 with the customer server 4 in the device registration database.
  • (Information processing server device compatible storage means
  • the device 7 is shipped to the customer after being registered in the verification server 5.
  • Equipment 7 is under customer control after it is shipped.
  • the equipment 7 After the equipment 7 is shipped, it is connected to the network 10 by the installer, and the verification request program is executed.
  • the device 7 When the verification request program is executed, the device 7 generates verification request information. Then, the device 7 connects to the verification server 5 using the verification server connection information stored in the EEPROM 25 (verification server connection means), and transmits the verification request information.
  • the verification request information is obtained by digitally signing the device connection information for connecting the device from the customer server 4 to the device 7 and the environment information (information on the network connection environment) with the device secret key. It is encrypted with the public key.
  • the device 7 when the device 7 is connected to the network 10, it acquires its device connection information (connection information acquisition means) and transmits it to the verification server 5 (connection information transmission means).
  • the verification server 5 is provided with connection information receiving means for receiving it.
  • the verification request information includes a digital signature obtained by encrypting a digest (predetermined information) with a device private key, and functions as signature information. In this way, the device 7 has a signature information transmission means. [0067] (7) (Refer to revocation list)
  • the verification server 5 When the verification server 5 receives the verification information from the device 7 (signature information receiving means), it decrypts it with the verification server private key. Then, the verification server 5 acquires the device public key of the device 7 from the device registration database (public key acquisition means), and uses this to confirm the authenticity of the digital signature, so that the device 7 is an authentic product. (Verification means) Further, although not shown in the figure, the verification server 5 confirms with CA3 whether or not the device 7 is invalid (validity verification means).
  • the verification sano 5 sends the verification result to the customer server 4 using the customer server connection information associated with the device 7 in the device registration database (send verification result). means).
  • the verification result is, for example, the device public key certificate of the device 7, the device connection information to the device 7, the verification result, etc. encrypted with the verification server private key.
  • the verification server 5 includes connection information transmitting means for transmitting connection information to the device 7 to the customer server 4.
  • the customer server 4 can confirm the legitimacy of the verification result by decrypting the verification result with the verification server public key stored in advance. Alternatively, legitimacy may be guaranteed by digitally signing the verification result with the verification server private key of verification server 5.
  • an error message is sent to the device 7, and the verification result is not notified to the customer server 4.
  • it may be configured to notify the customer server 4 that there has been a verification request from the device 7 for which the verification server 5 has expired.
  • the customer server 4 receives the verification result from the verification server 5 (verification result receiving means), confirms that the device 7 is verified as a legitimate product, and then connects to the device 7 (connection means). ) Send customer server information to customer server 4.
  • the customer server information includes customer server public key certificate, customer server connection information for the device 7 to connect to the customer server 4 via the network 10, and the like. It should be noted that the connection between the customer sano and the device 7 may be connected from the customer sano to the device 7, or alternatively, the device 7 may be connected to the customer server 4.
  • the customer server 4 connects to the device 7 using the connection information of the device 7, and in the latter case, the device 7 receives the customer server connection information from the verification server 5 at the time of the verification request. Use this to connect to the customer server 4.
  • the device 7 verifies the customer server 4's legitimacy by verifying the customer server public key certificate (digitally signed with the CA private key) transmitted from the customer server 4 with the pre-stored CA public key. be able to.
  • the device 7 and the customer server 4 become communicable, and the device 7 encrypts the measurement data with the customer server public key and transmits it to the customer server 4.
  • the measurement data cannot be decrypted by the customer server having the customer server private key, it is possible to prevent leakage of the measurement data during transmission.
  • the customer invalidates the device 7 in the device master and requests the CA 3 to revoke the device 7.
  • FIG. 6 is a flowchart for explaining the procedure until the device 7 is shipped to the customer.
  • the device 7 is assembled on the assembly line and then sent to the device registration department.
  • the device registration department the customer who purchases the device 7, the customer server 4 to which the device 7 is connected, the CA 3 to which the device 7 is assigned, and the like are known in advance.
  • the worker in charge connects the device 7 to CA3 and operates the input unit 32 to cause the CPU 21 to execute the asymmetric encryption key generation program. Then, the CPU 21 generates a device secret key and a device public key, which is an asymmetric encryption key pair unique to the device 7, using, for example, a random number (step 5).
  • connection to CA3 may be made after the device private key and device public key are generated.
  • the CPU 21 stores the generated device secret key in a predetermined area in the EEPROM 25. Then, the CPU 21 reads the device ID stored in the EEPROM 25 in advance and the device unique information unique to the device 7 such as the MAC address of the tamper resistant unit 20 and sends them to the device registration server 6 together with the device public key. Send (step 10).
  • Verification sano 5 receives the device public key, device unique information, etc. from device 7 and sends it to CA3 (step 13).
  • CA3 receives the device public key and device specific information of device 7 from device registration server 6 (step 15).
  • CA3 then extracts the device ID from the device-specific information. For example, “Device public key 00 is the device public key with device ID 00.
  • the certifier is CA3.” Generate a device ID, certifier, and other messages that also have proof date power, for example. Furthermore, CA3 generates a digest from the message card and digitally signs it by encrypting it with the CA private key.
  • CA3 creates a device public key certificate from the message and digital signature (step 20), and then generates a device certificate using the device public key certificate and the verification server public key certificate ( Step 25).
  • CA3 transmits the generated device certificate to the device registration server 6 (step 30).
  • the device registration server 6 receives the device certificate from CA3, and sends it to the device 7 with the verification server connection information attached thereto (step 33).
  • the verification server connection information may be transmitted separately from the device certificate.
  • the device 7 receives the device certificate and stores it in the EEPROM 25 in the tamper resistant unit 20 (step 35).
  • the EEPROM 25 stores the CA public key certificate of CA3 and the root certificate of the parent CA2 in advance, and the device 7 can check the legitimacy of the device certificate using these. wear.
  • the device registration server 6 transmits the registration request information such as the device ID and the device public key certificate to the verification server 5, and transmits the device certificate.
  • a registration request to the device registration database in step 7 is made (step 40).
  • the device registration server 6 digitally signs the registration request information with the device registration server private key and transmits it to the verification server 5, and the verification server 5 can confirm the legitimacy of the verification request information with the device registration server public key. Like that.
  • the device registration server 6 digitally signs the registration request information, and the verification server 5 confirms this to confirm the legitimacy of the registration request information.
  • the verification server 5 checks the legitimacy of the device public key certificate using the device registration server public key, and stores the correspondence relationship between the customer server connection information, the device, and the device public key included in the registration request information in the device registration database. Register (step 45).
  • the pre-shipment processing of the device 7 is completed, and the device 7 in which the device secret key and the verification server connection information are embedded in the tamper resistant unit 20 is shipped to the customer.
  • the verification server 5 stores information related to the device 7 in preparation for the verification of the device 7.
  • the customer server connection information of customer sano to be connected to the device 7 to which the device 7 is not connected is input separately into the device registration database of the verification server 5.
  • equipment 7 When equipment 7 is shipped to the customer, it is transported to the installation site based on the customer's business plan.
  • the person in charge of the installation goes to the site, connects the device 7 to the network 10 and starts the verification request program.
  • the device 7 collects device connection information such as its own IP address on the network 10 and environmental information such as being connected via a router (step 50).
  • the device 7 reads its own device ID from the EEPROM 25, and digitally signs it with the device private key together with the device connection information and environment information collected earlier, and creates verification request information. To do.
  • the device 7 creates the verification request information encrypted by encrypting the verification request information with the verification server public key.
  • the device 7 connects to the verification server 5 using the verification server connection information, transmits the encrypted verification request information to the verification server 5, and requests its verification from the verification server 5 (step 55). .
  • the verification server 5 receives the verification information encrypted from the device 7 and decrypts it with the verification server private key stored in advance.
  • the verification server private key has only the verification server 5, the encrypted verification information cannot be decrypted even if it is transmitted to another party during transmission.
  • the verification server 5 searches the device registration database for the device ID included in the verification request information, and obtains the device public key associated with the device ID.
  • the verification server 5 confirms the digital signature using the device public key and confirms the authenticity of the verification information (step 60).
  • the verification server 5 generates a verification request information power digest, decrypts the digital signature with the device public key, restores the digest, and the verification request information is legitimate because both match. Confirm that there is.
  • the verification server 5 If they do not match, the verification server 5, device 7 transmits an error message one di to the device 7 as unorthodox.
  • the verification server 5 After confirming the legitimacy of the device 7, the verification server 5 sends the device ID of the device 7 to the CA3, not shown, and asks whether the device 7 has expired or not.
  • the verification server 5 receives from the CA 3 whether or not the device 7 has expired, and confirms the validity of the device 7 based on this (step 65).
  • the verification Sano 5 digitally signs the device ID, connection information, verification result of authenticity of the device 7, the connection environment, etc. with the verification server private key, and creates a verification result. (Step 70).
  • the verification server 5 searches the device registration database for the device ID of the device 7, and acquires the customer server connection information of the customer server 4 associated with the device 7. Then, the verification server 5 uses this to connect to the customer server 4 and transmits the verification result (step 75).
  • the verification server 5 transmits an error message to the device 7 and does not transmit the verification result to the customer server 4. It can be configured to send a notification to the customer server 4 that the verification has been made.
  • the customer server 4 receives the verification result from the verification server 5, and verifies the legitimacy of the verification server 5 by decrypting it with the verification server public key stored in advance (step 85). .
  • the verification server 5 since only the verification server 5 can digitally sign the verification result with the verification server private key, the authenticity of the verification server 5 can be verified by decrypting the verification result with the verification server public key.
  • the verification result should be configured to be digitally signed with the server private key and verified on the customer server 4.
  • the customer server 4 After confirming the authenticity of the verification server 5, the customer server 4 stores the device ID, device public key, device connection information, etc. included in the verification result in the device master, and stores the device 7 in the authenticity of the customer server 4. To register as a measuring instrument.
  • the customer server 4 transmits an error message to the verification server 5 when the legitimacy cannot be confirmed.
  • the customer server 4 connects to the device 7 using the device connection information registered in the device master, and transmits the customer server information (step 90).
  • the customer server information includes public key certificates (customer server public key certificates digitally signed with a CA public key) and connection information to the powerful customer server 4 such as URL and IP address.
  • the device 7 Upon receiving the customer server information from the customer server 4, the device 7 verifies the digital signature of the customer server public key certificate using the CA public key and confirms the legitimacy of the customer server 4.
  • the device 7 stores the customer server connection information in the EEPROM 25 and stores it in the customer server 4. Used when connecting.
  • the customer Sano and the device 7 can communicate with each other (step 95), and the device 7 can transmit the measurement value to the customer server 4.
  • the device 7 prevents leakage of the measured value by encrypting the measured value with the customer server public key and transmitting it to the customer server 4.
  • the customer server 4 is connected to the device 7, but the device 7 can be configured to connect to the customer server 4.
  • the verification server 5 transmits a verification result to the customer server 4 (step 75), and then receives a notification that the device 7 has been registered from the customer server 4.
  • the verification server 5 After verifying that the device 7 has been registered in this way, the verification server 5 transmits the customer server connection information to the device 7 (step 80).
  • the device 7 receives the customer server connection information from the verification server 5 and uses this information to connect to the customer server 4.
  • the customer server 4 and the device 7 can communicate (step 95).
  • the validity of the device 7 is managed by the revocation list of the CA3, but a copy of the revocation list can be managed by the verification server 5.
  • the device registration database of the verification server 5 is synchronized with the revocation list of CA3 by notch processing once a day.
  • the verification server 5 will change to CA3 (since the invalidated item will not be valid). Even without making an inquiry, it can be confirmed that the device 7 has expired.
  • the verification server 5 may inquire CA3 about whether or not it has expired when the device 7 is valid in its device registration database. In this case, after the previous batch processing, the device 7 that has become invalid is notified from the CA 3 to the verification server 5 as invalid.
  • CA3, device registration server 6 and verification server 5 are configured as separate servos ⁇ , but a single server can be configured to exhibit both functions.
  • a server and CA3 that have the functions of the verification server 5 and the device registration Sano 6, a Sano and verification server 5 that has the functions of the device registration server 6 and CA3, and a server that has the functions of the verification server 5 and CA3.
  • a device registration server 6 or a server having the functions of CA3, verification server 5, and device registration server 6 can be configured. In these cases, server maintenance work can be reduced.
  • the device secret key can be stored in the device 7 while keeping it secret.
  • the verification of the authenticity of the device 7 by the verification server 5 ensures that the device 7 is a legitimate device to the customer server 4. Is possible.
  • the device 7 can be connected to the verification server 5 regardless of the connection environment of the device 7.
  • FIG. 8 is a block diagram showing information processing system 1 related to the operation of device 7.
  • the verification server 5, CA3, and parent CA2 shown in Fig. 1 are shown in Fig. 8 because they finish their functions when installation of the device 7 is completed.
  • the audit server and the standard radio wave transmitter are related when the operation of the device 7 is started, the audit server 12 and the standard radio wave transmitter 11 are shown in FIG.
  • Device 7 issues a time stamp to the measured value according to the time measured by internal clock 22 I have a time stamp machine to do.
  • the device 7 includes a device for receiving the standard radio wave transmitted by the standard radio wave transmitter 11.
  • the external clock 28 (FIG. 2) is corrected with the standard radio wave, and the external clock 28 is further corrected. Use to correct internal clock 22.
  • the internal clock 22 is corrected by the standard radio wave, but the present invention is not limited to this.
  • the audit server 12 is a server operated by the audit bureau and audits the internal clock 22 of the device 7.
  • the audit bureau is operated by an entity that is a third party with the customer who operates the equipment7. This makes it virtually impossible for customers to collaborate with the operator of the audit server 12 and perform time stamp backdates, thus achieving an extremely high level of security.
  • the audit server 12 includes an atomic clock and an audit private key, and creates a time certificate by digitally signing the reference time of the atomic clock with the audit private key, and transmits the time certificate to the device 7.
  • the device 7 uses this time certificate to check whether or not the internal clock 22 is outputting the correct time. If the correct time is not output, the device 7 stops issuing the time stamp. Yes. In this way, the audit server 12 can perform time auditing by transmitting the reference time to the device 7.
  • the standard radio wave transmitter 11 is a transmitter that is operated by a standard radio station and transmits standard radio waves including time information to an unspecified number of receivers.
  • the device 7 receives the standard radio wave transmitted by the standard radio wave transmitter 11, and uses this to correct the internal clock 22 (via the external clock 28).
  • the customer server 4 receives the measurement data with the time stamp from the device 7 and stores it in the measurement value database.
  • FIG. 9 is a diagram for explaining the relationship among the device 7, the audit server 12, and the customer server 4.
  • the audit server 12 includes an atomic clock for measuring the time described in the time certificate, and further stores an audit secret key.
  • the time certificate transmitted from the audit server 12 to the device 7 includes a reference time, a time limit, a serial number, unique information, a digital signature, and the like.
  • the reference time is the time constructed using the time measured by the atomic clock, and the current time of the atomic clock may be used as it is, or if communication delay is a problem, the time of alive is the delay time. Use a value that has been corrected in some way, such as using a corrected value.
  • the time limit is the expiration date of the reference time recorded in the time certificate. That is, the accuracy of the output time of the internal clock 22 audited at the reference time indicated on the time certificate is guaranteed by the auditing bureau during this time limit.
  • the device 7 can issue a time stamp within this time limit, and the time during which this time stamp can be issued is called the active time.
  • the serial number is the number of the time certificate assigned by the audit server 12 in the order of issue. However, if the serial number is issued, it may be easy to guess from the outside. The serial number was composed of random numbers.
  • the unique information is information unique to the hardware of the device 7, such as HD information of the tamper resistant unit 20, for example. If the unique information does not match, the tamper resistant part 20 issues an error.
  • the expiration date of the time certificate and the common key for communication between the device 7 and the audit server 12 after the validity of the time certificate is confirmed are also included in the time certificate. Can be included.
  • the digital signature is a message digest encrypted with a private key for audit.
  • the message is information that prevents tampering, such as the current time, time limit, serial number, and unique information.
  • a digest is a hash value obtained by computing a message using a hash function.
  • the recipient of the time certificate creates a digest from the message catalog, and then the digital signature The digest is restored with the audit public key. Then, it is possible to confirm that the contents of the time certificate have been tampered with by agreement between the two.
  • the device 7 stores the audit public key paired with the audit secret key in the EEPROM 25 and the mode switching unit. 51.
  • the mode switching unit 51 is configured by causing the CPU 21 to execute a time stamp program stored in advance in the EEPROM 25 at the time of shipment.
  • the EEPROM 25 stores the previous certificate that is the time certificate received from the audit server 12 in the last past.
  • FIG. 2 the force shown by including the communication unit 26 in the measurement unit 35.
  • the communication unit 26 is illustrated outside the measurement unit 35 for easy understanding.
  • the audit public key is public key information for decrypting the digital signature attached to the time certificate transmitted from the audit server 12.
  • the tamper resistant part 20 can confirm the legitimacy of the time certificate using the audit public key and confirm the validity of the reference time.
  • the device private key is used to digitally sign measurement data to be transmitted to the customer server 4.
  • information used as a message is a measurement value, device, measurement time, and the like, and a time stamp is formed by digitally signing these digests with a device private key.
  • the message may be digitally signed as it is without generating a digest.
  • the internal clock 22 gives a measurement time to the measurement value. That is, the time when the tamper resistant unit 20 acquires the measurement value from the measuring unit 35 is measured by the internal clock 22, and the internal clock 22 having this time as the measurement time is configured inside the tamper resistant unit 20. Therefore, it is difficult to configure with a highly accurate clock device.
  • the external clock 28 is constantly corrected by a standard radio wave with high accuracy. Therefore, the tamper resistant unit 20 corrects the internal clock 22 with reference to the external clock 28 (FIG. 2) as appropriate.
  • the correction of the internal clock 22 will be described in more detail with reference to FIG.
  • Fig. 10 shows an example of the time measured by the internal clock 22.
  • the tamper resistant part 20 is a part of the time of the internal clock 22 or more (hereinafter referred to as a time label).
  • the accuracy of the internal clock 22 can be maintained within 1 minute for several months without correction, so the customer should install the device 7 in the meantime and perform the correction of the internal clock 22 in seconds.
  • the internal clock 22 can be corrected by this.
  • the time is divided into a part related to security and a part related to quality assurance with a second unit as a boundary.
  • the time is not limited to this. It is also possible to classify by larger units or smaller units.
  • the audit server 12 audits the part longer than 1 second and corrects the time less than 999 milliseconds with the standard radio wave.
  • the last certificate is the one in which the time certificate sent from the audit server 12 and used in the previous time audit is stored in the EEPROM 25.
  • the tamper resistant part 20 checks the reference time of the time certificate transmitted from the audit server 12, it confirms that this reference time is later than the reference time received from the audit server 12 last time. .
  • time stamp the most important thing to prevent is to issue a time stamp at the time of back date (to output the past time) due to tampering, etc.
  • the reference time sent from the audit server 12 Confirm that it is later than the time when the audit was performed (the time indicated in the previous certificate)
  • the reference time transmitted from the audit server 12 is earlier than the time described in the previous certificate, it stops in the audit mode (described later) by issuing an error message, etc. Do not issue time stamps.
  • the mode switching unit 51 is a functional unit that sequentially switches operation modes related to the time stamp function of the tamper resistant unit 20.
  • the operation mode performed by the tamper resistant unit 20 includes an audit mode, a synchronization mode, and a stamp mode.
  • Each of these modes of operation is performed by independent modules so that no interference occurs between the modules.
  • the audit mode is an operation mode for auditing that the time label of the internal clock 22 is correct using the reference time transmitted from the audit server 12.
  • the synchronization mode is an operation mode that synchronizes (that is, corrects) the second clock portion of the internal clock 22 with an accurate time using the time distributed from the standard radio wave transmitter 11 by the standard radio wave.
  • the stamp mode is an operation mode in which a time stamp is issued for the measurement value measured by the measurement unit 35.
  • the mode switching unit 51 sets the operation mode of the tamper resistant unit 20 to a predetermined value such as audit mode-> synchronous mode-> stamp mode-> audit mode -... Switch sequentially in order.
  • audit mode and stamp mode are operation modes that require high security because they handle time labels (security mode). On the other hand, synchronization mode handles seconds, so high security is always necessary.
  • the operation mode (general mode). [0120] The mode switching unit 51 does not switch the tamper resistant unit 20 to the next operation mode until the currently operating mode is completed.
  • the audit mode and the synchronization mode must be completed, and the tamper resistant unit 20 can issue a time stamp at the audited and synchronized time.
  • the tamper resistant unit 20 can stop issuing the time stamp when an error occurs in at least one of the audit mode and the synchronous mode.
  • the tamper resistant unit 20 operates by switching between the security mode and the general mode, thereby preventing high-security processing and high-security processing from being performed simultaneously. And then.
  • the tamper resistant part 20 can prevent the processing in the security mode and the general mode from interfering with each other in the tamper resistant part 20.
  • High resistance to unauthorized access such as
  • the tamper resistance unit 20 has the ability to switch the security mode into an audit mode and a stamp mode, both of which are security modes, so that the audit and stamp issuance is performed in the same mode.
  • audit mode ⁇ synchronous mode ⁇ stamp mode ⁇ audit mode
  • the order of mode switching is not limited to this.
  • the device 7 acquires the measurement value from the measurement unit 35 and issues a time stamp according to the time of the internal clock 22, and the customer server 4 as measurement data. Send to.
  • the device 7 since the device 7 has a built-in time stamp function and issues a time stamp together with the measurement, it can be ensured that the measurement value is surely measured at the measurement time.
  • the time measured by the internal clock 22 is used as the measurement time.
  • the measurement unit 35 outputs the measurement time together with the measurement value to the tamper resistant unit 20, and includes this measurement time.
  • the tamper resistant part 20 can be configured to issue a time stamp.
  • the customer server 4 (FIG. 9) includes a device master that has registered the device 7 and a measurement value database that stores the measurement data transmitted from the device 7.
  • FIG. 12 (a) is a diagram showing an example of the logical configuration of the device master.
  • the device master is composed of items such as “device”, “connection information”, “device public key”, “model number”, “installation location”, “installation date”, and so on.
  • the device ID is used to identify the device 7, and the connection information is used to connect to the device 7.
  • the device public key is used to confirm the time stamp (digital signature) of the measurement data.
  • FIG. 12B is a diagram showing an example of the logical configuration of the measurement value database.
  • the measurement value database consists of items such as “device ID”, “reception time”, “measurement value”, “measurement time”, and so on.
  • the device ID is the device ID of the device 7 that is the transmission source of the measurement data
  • the reception time is the time when the customer Sano received the measurement data.
  • the measurement value is the measurement value included in the measurement data.
  • the customer server 4 verifies the time stamp of the measurement data with the device public key of the device 7, confirms that the measurement data, the measurement time, etc. have been tampered with, and registers them in the measurement value database. .
  • the device 7 connects to the audit server 12 and requests transmission of a time certificate (step 25).
  • the audit server 12 When the audit server 12 receives a time certificate transmission request from the device 7, it creates a time certificate using the time output by the atomic clock and transmits it to the device 7 (step 30).
  • the device 7 When the device 7 receives the time certificate from the audit server 12, it checks the digital signature of the time certificate using the audit public key, and then measures the reference time of the time certificate and the internal clock 22. Check that the time label of the time (Fig. 10) matches (step 35). [0128] If the time label does not match the reference time label, in the tamper resistant unit 20, the mode switching unit 51 stops the mode switching, and the device 7 transmits an error message to the customer server 4. As a result, the customer server 4 can detect an abnormality of the device 7.
  • the mode switching unit 51 switches the operation mode of the tamper resistant unit 20 to the synchronous mode.
  • the device 7 receives the standard radio wave (step 40) broadcasted by the base station 8 and uses the time sent by the standard radio wave. Correct the clock 22 seconds (step 45).
  • the mode switching unit 51 switches the operation mode of the tamper resistant unit 20 to the stamp mode.
  • the CPU 29 of the measuring unit 35 transmits the measurement value measured by the measuring device unit 34 to the tamper resistant unit 20. Then, the tamper resistant part 20 generates measurement data using this and transmits it to the customer server 4 (step 50).
  • the customer server 4 receives the measurement data from the device 7 and stores the measurement value and the like in the measurement value data base (step 60).
  • the tamper resistance unit 20 monitors whether the time of the time auditing ability has exceeded the activation time, and if the activation time has not elapsed (step 55; N ), Device 7 returns to Step 50 and continues measurement.
  • step 65 the device 7 determines whether or not to continue the infinite loop (step 65).
  • step 65; Y When the infinite loop is continued (step 65; Y), the mode switching unit 51 switches the operation mode of the tamper resistant unit 20 to the audit mode, and the device 7 returns to step 25. If the infinite loop is not continued (step 65; ⁇ ), device 7 ends its operation.
  • Device 7 normally operates continuously in an infinite loop, but automatically stops if the infinite loop is not continued, for example when the usage period is limited and the expiration date has expired.
  • step 25 requests a time certificate
  • step 30 transmits the time certificate in response
  • the device 7 receives the time certificate transmitted from the audit server 12 and inputs it to the tamper resistant unit 20.
  • the device 7 compares the reference time described in the time certificate with the time measured by the internal clock 22 (step 110).
  • This comparison is a time label, ie, line by minute, not by second.
  • the time stated in the time certificate is “March 20, 2005, 12:30, 3 seconds, 2 hundred milliseconds”
  • the internal clock 22 time is “March 20, 2005, 12:30. If it is “0 seconds, 5 hundred milliseconds”, both units are equal in minutes or more, so device 7 determines that they match.
  • step 115; N If the time described in the time certificate does not match the time of the internal clock 22 (step 115; N), the device 7 returns to step 25 and again returns the time certificate to the audit server 12. Request transmission of.
  • step 120 the device 7 checks the validity of the time certificate (step 120).
  • This validity is obtained by decrypting the digital signature attached to the time certificate with the public key for audit, restoring the digest, and further using the same function as the audit server 12 from the time certificate (for example, a hash function). The digest is obtained using and the agreement between the two is confirmed.
  • time certificate has an expiration date attached to it, check that it is within the expiration date.
  • the reason for comparing the time certificate and the time of the internal clock 22 before confirming the validity of the time certificate is that the time comparison should be performed as quickly as possible.
  • the time of the internal clock 22 is advanced by the time required for the validity confirmation, and the difference from the time described in the time certificate becomes large. Because.
  • step 125; ⁇ If the time certificate is valid (step 125; ⁇ ), device 7 returns to step 25. If the time certificate is valid (step 125; ⁇ ), device 7 is the previous certificate. ( Figure 9) The reference time described in the above and the reference time described in the time certificate are compared (step 130).
  • step 135; N the device 7 returns to step 25.
  • step 135 when the reference time described in the time certificate is later than the reference time described in the previous certificate (step 135; Y), the time when the previous certificate was received this time Replace by overwriting with a certificate.
  • step 25 the process returns to step 25 to request the audit server 12 to issue a time certificate.
  • the audit server 12 transmits a command for stopping the device 7 to the device 7.
  • the audit server 12 can stop the device 7.
  • Steps 200 to 220 in FIG. 15 correspond to step 50 in FIG. 13, and steps 225 and 230 in FIG. 15 correspond to step 60 in FIG.
  • the measurement unit 35 (Fig. 2) of the device 7 monitors the external clock 28, and when the preset measurement time is reached, the measurement unit 34 is instructed to perform measurement and thereby performs measurement ( Step 200).
  • timing at which the measurement unit 35 acquires the measurement value from the measurement device unit 34 can be variously set depending on the type and application of the device 7.
  • the device 7 provides the measurement value acquired by the measurement unit 35 to the tamper resistant unit 20 via the bus line (step 205).
  • the tamper resistant unit 20 acquires the time when the measurement value is provided from the internal clock 22, and uses this time as the measurement time of the measurement value (step 210).
  • device 7 creates a digest of the device ID, measurement value, measurement time, and other messages in tamper resistant unit 20, and encrypts this with the device private key to generate a time stamp. Issue (Step 215).
  • the device 7 creates measurement data such as the device, measurement value, measurement time and time stamp, and transmits it to the customer server 4 (step 220).
  • the customer server 4 When the customer server 4 receives the measurement data from the device 7, the customer server 4 searches the device master for the device ID described in the measurement data, and acquires the device public key of the device 7.
  • the customer server 4 confirms the time stamp using the device public key (step 225).
  • the customer server 4 stores the measurement value and measurement time described in the measurement data in the measurement value database and updates it (step 230).
  • the measurement unit 35 of the device 7 functions as a measurement unit that measures a measurement target
  • the internal clock 22 functions as a clock device that measures time.
  • the tamper resistant unit 20 acquires the time when the measurement unit 35 performs measurement from the internal clock 22, and provides the time certification information (time stamp) based on the acquired time for the measurement value. It functions as a means for generating time certification information.
  • the EEPROM 25 functions as a secret key storage unit that stores a device secret key out of a device public key and a device secret key paired as an asymmetric encryption key, and the tamper resistant unit 20 stores the device secret key.
  • the time certification information is generated by encrypting the correspondence information (message is digest) that associates the measured value with the time using a predetermined encryption method.
  • the communication unit 26 functions as a transmission means for transmitting the generated time certification information to a predetermined transmission destination.
  • the device 7 uses the reference time information receiving means for receiving the reference time (standard radio wave etc.) transmitted by the reference time transmitting device (standard radio wave transmitter 11 etc.) and the internal time using the reference time.
  • Time correction means for correcting a time in units of seconds (time in seconds) smaller than a predetermined unit among the times measured by the clock 22 is provided.
  • the device 7 includes reference time receiving means for receiving a reference time from a predetermined audit server, and the mode switching unit 51 includes the time measured by the internal clock 22 at the time (time label) equal to or more than the predetermined unit. If the received reference time matches, the time certificate If the information generating means is operated and does not match, it functions as an audit result executing means for stopping the time certification information generating means.
  • the device 7 Since the device 7 has a built-in time stamp function, it can be assured that the measured value is measured at the time proven by the time stamp.
  • the time measured by the internal clock 22 is divided into a time label and a second unit, the time audit is performed on the time label, and the time correction is performed in seconds using the standard radio wave.
  • the time distribution server is provided as in the prior art, the time distribution is performed by this, and the time of the internal clock 22 corrected by this is audited. Good.
  • equipment 7 can be used for thermometers for house cultivation, radioactive leak measurement devices at nuclear power plants, and seismometers.
  • the device 7 has the following function as a time certification server! /
  • a clock device that outputs time
  • first time acquisition means that acquires a time (time label) of a predetermined unit or more among the times output by the clock device
  • a reference time distribution that distributes a reference time
  • the reference time receiving means for receiving the reference time from the server (audit server 12) and the time acquired by the first time acquisition means at the time equal to or greater than the predetermined unit and the received reference time match.
  • a client device for measuring the proof object information as the time proof object, and the time proof information of the received proof object information using the time output by the timepiece device that has verified the accuracy
  • a time proof server comprising: time proof information generating means for generating (time stamp); and time proof information transmitting means for transmitting the generated time proof information to a predetermined transmission destination.
  • the verification unit when the reference time used for the verification is confirmed to be a time later than the reference time used in the previous verification, the verification unit has a predetermined range. It can also be configured to verify that it operates with accuracy (second configuration).
  • the clock device measures using the correction time acquisition means for acquiring the correction time from the correction time generator (standard radio wave transmitter 11) and the acquired correction time.
  • Time correction means for correcting a time in units of seconds (seconds) smaller than the predetermined unit of the time, and the time certification information generation means uses the configured time to It can also be configured to generate proof information (third configuration).
  • the second configuration may be configured to include predetermined unit changing means for changing the predetermined unit (fourth configuration).
  • an operation mode switching unit that switches between a first operation mode in which the verification unit and the time certification information generation unit operate and a second operation mode in which the time correction unit operates.
  • the operation mode switching means may be configured to switch the operation mode after the operation is completed in each operation mode (fifth configuration).
  • the first operation mode includes a verification mode in which the verification unit verifies the timepiece device, a time certification information generation mode in which the time certification information generation unit generates the time certification information
  • the operation mode switching means may be configured to switch the operation mode to the mode switching destination after the operation of the mode switching source is completed in the switching between the verification mode and the time certification information generation mode.
  • FIG. 16 is a block diagram showing the information processing system 1 in which the slave unit 9 is connected using the device 7 as a master unit.
  • FIG. 16 is a block diagram showing the information processing system 1 in which the slave unit 9 is connected using the device 7 as a master unit.
  • the device 7 can be directly connected to a plurality of slave units 9 and can be connected to more slave units 9 via the slave units 9.
  • connection between the device 7 and the slave unit 9 and the connection between the slave unit 9 and the slave unit 9 are wireless, but they may be wired.
  • the slave unit 9 transmits the measurement value to the device 7, and the device 7 adds a time stamp thereto and transmits it to the customer server 4.
  • the customer server 4 can collect the measurement values to which the time stamp is given from the device 7 or the slave unit 9.
  • FIG. 17 is a block diagram showing an example of a hardware configuration of slave unit 9.
  • the configuration of the slave unit 9 is substantially the same as that of the device 7 shown in FIG. For this reason, the corresponding components are denoted by the same reference numerals as those of the device 7, and overlapping descriptions are simplified or omitted.
  • the EEPROM 25 stores an asymmetric encryption key generation program, a slave device private key, a slave device certificate, a connection request program, a common key, a CA public key certificate, and the like.
  • the asymmetric encryption key generation program is a program for generating a pair of the slave unit private key and the slave unit public key.
  • the CPU 21 executes this program, the pair of the slave unit private key and the slave unit public key is protected. It is generated in the tamper section 20.
  • the EE PROM 25 constitutes a handset secret key storage means.
  • the slave unit certificate is an encrypted slave unit public key certificate obtained by encrypting the slave unit public key certificate of the slave unit public key with the verification server public key, or a child unit ID such as the slave unit ID.
  • the machine-specific information is digitally signed by CA3 with the CA private key.
  • the EEPROM 25 constitutes an encrypted slave public key storage means.
  • connection request program is a program used when connecting the slave unit 9 to the device 7.
  • Machine The device 7 also stores a child device connection program that accepts a connection request from the child device 9, and the device 7 and the child device 9 are connected when these programs function in cooperation.
  • the common key is a common key transmitted from the device 7 when connecting to the device 7, and the slave unit 9 encrypts the measured value with the common key when transmitting the measured value to the device 7. Sent and transmit, and also decrypt the information sent from device 7 (encrypted with the common key! /) With the common key.
  • the CA public key certificate is a CA3 public key certificate. Although not shown, a root certificate is also stored in the EEPROM 25.
  • Steps (1) to (4) are operations performed before installation of the slave unit 9 (preferably before shipment to the customer).
  • the worker in charge operates the slave unit 9 to execute the asymmetric encryption key generation program, and in the tamper resistant unit 20, sets a pair of the slave unit private key and the slave unit public key to the CPU 21. Generate.
  • the handset 9 stores the generated handset private key in a predetermined area of the EEPROM 25.
  • the slave unit 9 is connected to the CA 3 in charge of the slave unit 9 by the person in charge of work, and transmits the generated slave unit public key and slave unit specific information (slave unit ID, etc.) to the CA 3.
  • CA3 When CA3 receives the handset public key from handset 9, CA3 digitally signs it with the CA private key and creates a handset public key certificate.
  • CA3 stores the verification server public key, and encrypts the slave unit public key certificate by using a predetermined encryption method to create a cryptographic slave unit public key certificate.
  • CA3 creates a slave unit certificate by digitally signing the encryption slave unit public key certificate and other information (slave unit specific information, etc.), and transmits it to slave unit 9.
  • the slave unit 9 receives the slave unit certificate from the CA 3 and stores it in the EEPROM 25.
  • the slave unit 9 stores the slave unit certificate, and is shipped to the customer. Thereafter, the slave unit 9 is managed by the customer.
  • the child machine 9 After the child machine 9 is shipped, it is installed at the installation site by the person in charge of installation. Since the range in which the device 7 and the child device 9 can perform wireless communication is limited, the child device 9 is installed within the communication range of the parent device 7 (for example, a radius of 100 meters from the device 7). .
  • the connection request program is started by the person in charge of installation.
  • the slave unit 9 detects the device 7 within the communication range.
  • the slave unit 9 sends a connection request to the detected device 7 and transmits a slave unit certificate to the device 7.
  • the slave unit 9 includes an encryption slave unit public key (included in the slave unit certificate) transmission means.
  • the slave unit 9 acquires, for example, the device ID of each device 7 and displays it on the display device, and allows the installation person to select the device 7 to be connected.
  • the device 7 receives the handset certificate from the handset 9 (encrypted handset public key receiving means) and confirms the digital signature with the CA public key. Then, the device 7 connects to the customer server 4 and transmits the slave unit certificate to the customer server 4.
  • the device 7 includes the encryption slave unit public key transmission unit that transmits the encryption slave unit public key to a predetermined transmission destination.
  • the predetermined transmission destination is the customer server 4, but various modified examples such as direct transmission to the verification server 5 are conceivable.
  • Customer server 4 receives the slave certificate from device 7.
  • the device 7 is provided with the encryption slave device public key receiving means!
  • the customer server 4 can obtain the device ID from the device 7 and obtain the child device ID from the child device certificate. The customer server 4 confirms the legitimacy by the digital signature when receiving the slave unit certificate. Then, the customer server 4 confirms whether the combination of the device 7 and the slave unit 9 is registered in advance using the slave unit master.
  • the slave device master predefines the slave device 9 connected to the device 7 by a combination of the device ID and the slave device ID, and constitutes a correspondence storage means.
  • the validity of the slave unit 9 is also registered, and those that can be used are set to valid, and those that are not used are set to invalid.
  • Customer server 4 determines that the combination of the device ID and the child device ID received from device 7 matches the one specified in the child device master, and the validity of the child device is valid. Continue processing. On the other hand, if at least one of these conditions is not satisfied, an error message is transmitted to the device 7.
  • the device 7 is provided with correspondence confirmation means for confirming whether or not the device 7 and the child device 9 are associated with each other by the child device master.
  • the customer server 4 transmits the slave unit certificate to the verification server 5 after confirming by the slave unit master.
  • the device 7 includes an encryption slave unit public key transmission unit.
  • the verification server 5 When the verification server 5 receives the slave certificate from the customer server 4, it verifies the legitimacy by the digital signature.
  • the verification server decrypts the encryption slave unit public key certificate included in the slave unit certificate with the verification server private key and transmits it to the customer server 4.
  • the verification server 5 sends an error message to the customer server 4 when it is impossible to decrypt the encryption device public key certificate or when the authenticity of the device certificate or the like cannot be confirmed.
  • the device 7 receives the slave unit public key from the customer server 4 (slave unit public key receiving means) and temporarily stores it in the RAM 24.
  • the device 7 generates a common key by generating a random number, temporarily stores it, encrypts it with the handset public key, and transmits it to the handset 9.
  • the slave unit 9 receives the encryption key common key from the device 7, decrypts it with the slave key and restores the common key.
  • the device 7 and the slave unit 9 encrypt information using this common key and communicate. That is, of the device 7 and the slave device 9, the information transmitting side encrypts and transmits information with the common key, and the information receiving side decrypts the information with the common key.
  • the device 7 transmits the encryption slave unit public key certificate to the verification server 5 via the customer server 4, and further receives the slave unit public key via the customer server 4.
  • this is not limited.
  • device 7 connects to verification server 5, and device 7 directly transmits the encryption slave unit public key certificate to verification server 5.
  • the key can also be received directly from the verification servo 5.
  • the customer server 4 is configured to sequentially transmit the encrypted slave unit public key to the verification server 5 when it receives the encrypted slave unit public key from the device 7. It can be configured by receiving and storing the keys and sending them to the verification server 5 in a batch by a notch process.
  • the processing before shipping of the slave unit such as generating a pair of the slave unit public key and the slave unit private key in the slave unit 9, is the same as that of the device 7, and the description thereof is omitted.
  • the slave unit 9 When the slave unit 9 is installed at the installation location, the person in charge of the operation operates the input unit 32 (Fig. 17) to start the connection request program. Then, the slave unit 9 searches for a device 7 existing in the vicinity and makes a connection request to the searched device 7.
  • the device 7 records in advance in the tamper resistant part 20 (Fig. 2). Start up the memorized slave unit connection program and perform the following series of information processing in cooperation with the slave unit 9. First, when the slave unit connection program is started on the device 7, the slave unit 9 uses the EEPROM 25 to verify the slave unit. The document is read and transmitted to the device 7 (step 305).
  • device 7 Upon receiving the handset certificate from handset 9, device 7 verifies the digital signature using the CA public key and confirms the legitimacy of the handset certificate.
  • the device 7 sends an error message to the slave unit 9.
  • the customer server 4 is connected using the customer server connection information.
  • the device ID of the device 7 is notified to the customer server 4. If the device 7 and the customer server 4 are always connected, there is no need to newly connect! /.
  • the device 7 After connecting to the customer sano, the device 7 transmits the handset certificate received from the handset 9 to the customer sano (step 310).
  • customer server 4 When customer server 4 receives the slave certificate from device 7, customer server 4 verifies the digital signature using the CA public key.
  • step 315) the combination of the device ID of device 7 and the slave device ID described in the slave device certificate of slave device 9 is searched in the slave device master (Fig. 19), and is this combination defined in advance in the slave device master? Confirm whether or not (step 315).
  • the customer server 4 transmits an error message to the device 7, and this error message is further transmitted from the device 7 to the slave unit 9.
  • the customer server 4 connects to the verification server 5 and transmits the slave unit certificate (step 320).
  • the verification server 5 receives the client certificate from the customer server 4, it verifies the digital signature with the CA public key.
  • the encryption device public key certificate included in the child device certificate is decrypted with the verification server private key stored in advance, and the child device public key certificate is restored (step 325).
  • the verification server 5 verifies the digital signature of the slave unit public key certificate using the CA public key, and confirms the legitimacy of the slave unit public key certificate.
  • the verification server 5 An error message is transmitted to the customer server 4, and this error message is further transmitted to the slave unit 9 via the device 7.
  • the verification server 5 transmits the slave unit public key to the customer server 4 (step 330).
  • Customer server 4 receives the slave public key from verification server 5 and transmits it to device 7 (step 335).
  • the device 7 When the device 7 receives the child device public key from the customer server 4, the device 7 generates a common key and encrypts it with the child device public key to generate an encryption common key (step 340). Then, the device 7 transmits the encryption key common key to the child device 9 (step 345).
  • handset 9 Upon receiving the encryption key common key from device 7, handset 9 decrypts it using the handset private key stored in EEPROM 25 and restores the common key (step 350).
  • the device 7 and the child device 9 can share the common key, and thereafter, the device 7 and the child device 9 communicate by encrypting / decrypting information to be transmitted / received with the common key.
  • the device 7 After confirming that the device 7 and the child device 9 share the common key, the device 7 stores the child device specific information and address of the child device 9 in the EEPROM 25 (FIG. 2), and the child device. 9 is officially registered as its own handset. In this way, the device 7 and the slave unit 9 are connected (step 355).
  • the combination of the device 7 and the child device 9 is defined in advance in the child device master.
  • an arbitrary child device 9 is connected to the device 7 and the device 7 and the child device 9 are combined.
  • the slave unit master is dynamically updated according to the combination of slave units 9.
  • Steps common to those in FIG. 20 are denoted by the same step numbers, and description thereof will be simplified or omitted.
  • Steps 305 and 310 are the same as in FIG.
  • step 360 when the customer sano receives the handset certificate from the device 7, the customer Sano temporarily associates the handset ID of the handset 9 with the device ID of the device 7 (step 360).
  • the device ID and the slave unit ID are not associated at first.
  • step 360 the correspondence between the device ID and the slave unit ID is stored.
  • Steps 320 to 355 are the same as those in FIG.
  • the device 7 When the device 7 establishes a connection with the child device 9, the device 7 transmits a connection notification indicating that the child device 9 is connected to the customer server 4 (step 365).
  • the customer server 4 determines the combination of the device ID of the device 7 and the child device ID of the child device 9 that are temporarily registered in the slave device master, (Step 370).
  • the combination of the device 7 and the child device 9 is not defined in advance by the device master.
  • the combination of the device 7 and the child device 9 cannot be confirmed, since any child device 9 can be connected to the device 7, the operation flexibility of the child device 9 is increased.
  • the device 7 can authenticate the slave unit by requesting the verification server 5 to verify the slave unit certificate.
  • a plurality of slave units 9 can be installed in the device 7, and the flexibility of installation of measuring devices by the device 7 and the slave units 9 can be increased.
  • FIG. 1 is a block diagram showing an example of a network configuration of an information processing system according to the present embodiment.
  • FIG. 2 is a block diagram showing an example of the hardware configuration of the device.
  • FIG. 3 is a block diagram showing an example of a hardware configuration of a verification server.
  • FIG. 4 is a diagram showing an example of a logical configuration of a device registration database.
  • FIG. 5 is a diagram for explaining the overall procedure from installing the device to connecting to the customer server.
  • FIG. 6 is a flowchart for explaining a procedure of processing performed before shipping the device.
  • FIG. 7 is a flowchart for explaining the procedure from installing the device at the installation site to connecting to the customer server.
  • FIG. 8 is a block diagram showing a part related to the operation of the information processing system.
  • FIG. 9 is a block diagram showing the relationship among devices, audit servers, and customer servers.
  • FIG. 10 is a diagram for explaining internal clock correction.
  • FIG. 11 is a diagram for explaining a mode switching operation of a mode switching unit.
  • FIG. 12 is a diagram showing a logical configuration of a device master and a measurement value database.
  • FIG. 13 is a flowchart for explaining the procedure for customer Sano to collect measurement data from device 7.
  • FIG. 14 is a flowchart for explaining a time audit procedure.
  • FIG. 15 is a flowchart for explaining a measurement processing procedure.
  • FIG. 16 is a diagram showing a place where devices and slave units are connected in the information processing system.
  • FIG. 17 is a block diagram showing an example of a hardware configuration of a slave unit.
  • FIG. 18 is a diagram for explaining a procedure until a slave unit is installed.
  • FIG. 19 is a diagram showing an example of a logical configuration of a slave unit master.
  • FIG. 20 is a flowchart for explaining a procedure for connecting a slave unit to a device.
  • FIG. 21 is a flowchart for explaining a modification of a procedure for connecting a slave unit to a device. Explanation of symbols

Abstract

A relation between a terminal device (7) and its sub-terminal device (9) is set. The sub-terminal device (9) encrypts its public key with a verifying server public key and transmits the encrypted sub-terminal device public key to a verifying server (5) through the terminal device (7). The verifying server (5) receives and decodes the encrypted sub-terminal device public key by its stored server secret key, transmits the decoded sub-terminal device public key to the terminal device (7), encrypts a common key generated by the terminal device (7) by using the sub-terminal device public key, and transmits the encrypted common key to the terminal device (9).

Description

情報処理システム  Information processing system
技術分野  Technical field
[0001] 本発明は、端末機器、子機端末、情報処理サーバ、及び情報処理方法に関し、例 えば、計測機器の親子関係を構築するものに関する。  The present invention relates to a terminal device, a slave terminal, an information processing server, and an information processing method, and for example, relates to a device for establishing a parent-child relationship between measurement devices.
背景技術  Background art
[0002] 近年のネットワーク技術の急激な進歩に伴って、各種の電子化情報がネットワーク を介して流通している。  [0002] With the rapid advancement of network technology in recent years, various types of computerized information have been distributed over networks.
このようなネットワーク技術を用いて遠隔地に設置した計測機器をネットワークに接 続する試みも行われて!/、る。  Attempts have also been made to connect measuring equipment installed remotely using such network technology to the network!
これによつて、従来は検針員が各計測機器 (例えば、ガスメータ)を回って計測値を 手作業で収集していたもの力 ネットワークを介してサーバで収集することができるよ うになる。  As a result, it has become possible for the meter reader to collect the measured values manually by turning each measuring device (for example, a gas meter) and collect them on the server via the power network.
[0003] このように、遠隔地での計測値をサーバで収集する場合、計測値か計測された場 所の位置一証明と計測値が計測された時刻の時刻証明が重要となる。  [0003] As described above, when collecting measurement values at a remote place with a server, it is important to prove the position of the measured value or the location where the measurement value was measured and the time proof of the time when the measurement value was measured.
例えば、ガスメータのような定位置に固定された機器の場合、計測位置は一定であ るが、計測時刻は毎回異なるため、計測値を機器力もタイムスタンプサーバに送信し 、タイムスタンプサーノ でタイムスタンプを発行してもらって ヽた。  For example, in the case of a device fixed at a fixed position such as a gas meter, the measurement position is constant, but the measurement time is different each time, so the measured value is also sent to the time stamp server, and the time stamp Sano I was asked to issue.
タイムスタンプは、機器カゝら受信した計測値に受信した時刻情報を付加して、タイム スタンプサーバの秘密鍵でデジタル署名を行ったものである。  The time stamp is obtained by adding the received time information to the measured value received from the device and performing a digital signature with the private key of the time stamp server.
この秘密鍵に対応する公開鍵でデジタル署名を確認することにより、タイムスタンプ サーバが当該時刻に、当該計測値を受信したことを証明することができる。  By confirming the digital signature with the public key corresponding to the secret key, it is possible to prove that the time stamp server has received the measurement value at the time.
[0004] このようなタイムスタンプシステムを構成する技術として、次の信頼されるサードパー テイクロックおよび信頼されるローカルクロックを提供するためのシステムおよび方法 がある。  [0004] As a technology for constructing such a time stamp system, there are a system and a method for providing the following trusted third-party clock and trusted local clock.
特許文献 1:特表 2003— 519417公報  Patent Document 1: Special Table 2003—519417
[0005] この技術は、タイムスタンプサーバのクロックを監査する監査サーバを設け、タイム スタンプサーバでの時刻改竄を防止するものである。 [0005] This technology provides an audit server that audits the clock of a time stamp server, This prevents time tampering at the stamp server.
発明の開示  Disclosure of the invention
発明が解決しょうとする課題  Problems to be solved by the invention
[0006] 例えば、温室内の温度分布の計測など、大量の計測機器を設置してデータの収集 を行いたいとの要望がある。この場合、計測機器に親子関係を設定することにより、 1 台の親機で多数の子機からの計測値を収集する形態が適している。  [0006] For example, there is a demand for collecting data by installing a large amount of measuring devices such as measuring the temperature distribution in a greenhouse. In this case, it is suitable to collect measurement values from a large number of slave units with a single master unit by setting the parent-child relationship in the measurement device.
そのため、例えば、子機のなりすましなど、不正な親子関係の設定を防止するシス テムが必要とされている。  Therefore, there is a need for a system that prevents the setting of an illegal parent-child relationship, for example, impersonation of a slave unit.
[0007] そこで、本発明の目的は、親機と子機の適切な親子関係を設定する仕組みを提供 することである。  Accordingly, an object of the present invention is to provide a mechanism for setting an appropriate parent-child relationship between a parent device and a child device.
課題を解決するための手段  Means for solving the problem
[0008] 本発明は、前記目的を達成するために、ネットワークに接続し、検証サーバ秘密鍵 を記憶した検証サーバと、子機公開鍵を前記検証サーバ秘密鍵と対をなす検証サ ーバ公開鍵で暗号ィ匕した暗号ィ匕子機公開鍵と、前記子機公開鍵と対をなす子機秘 密鍵を記憶した子機端末と、前記ネットワークと接続すると共に前記子機端末と通信 する端末機器とを用いて構成された情報処理システムにお!ヽて使用する端末機器で あって、前記子機端末から前記暗号化子機公開鍵を受信する暗号化子機公開鍵受 信手段と、前記受信した暗号化子機公開鍵を所定の送信先に送信する暗号化子機 公開鍵送信手段と、前記検証サーバが前記送信した暗号化子機公開鍵を前記検証 サーバ秘密鍵で復号化した子機公開鍵を受信する子機公開鍵受信手段と、を具備 したことを特徴とする端末機器を提供する (第 1の構成)。 In order to achieve the above object, the present invention provides a verification server connected to a network and storing a verification server private key and a verification server public key paired with the verification server private key. Connects to the network and communicates with the slave unit terminal, and stores the slave unit secret key encrypted with the key and the slave unit secret key paired with the slave unit public key. A terminal device for use in an information processing system configured using the terminal device, and an encrypted slave device public key receiving means for receiving the encrypted slave device public key from the slave device terminal; An encrypted child device public key transmitting means for transmitting the received encrypted child device public key to a predetermined destination, and the verification server decrypts the transmitted encrypted child device public key with the verification server private key. A slave unit public key receiving means for receiving the slave unit public key Provide a terminal device characterized by having (first configuration).
第 1の構成において、共通鍵を生成し、当該生成した共通鍵を前記受信した子機 公開鍵を用いて暗号ィ匕して前記子機端末に送信するように構成することもできる (第 2の構成)。  In the first configuration, a common key may be generated, and the generated common key may be encrypted using the received handset public key and transmitted to the handset terminal (second handset). Configuration).
第 1の構成、又は第 2の構成において、前記暗号化子機公開鍵送信手段は、前記 情報処理サーバを介して前記暗号化子機公開鍵を前記検証サーバに送信し、前記 子機公開鍵受信手段は、前記情報処理サーバを介して前記子機公開鍵を前記検証 サーバから受信するように構成することもできる (第 3の構成)。 また、本発明は、ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバ と、子機公開鍵を前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号ィ匕し た暗号ィヒ子機公開鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端 末と、前記ネットワークと接続すると共に前記子機端末と通信する端末機器とを用い て構成された情報処理システムにお 、て使用する子機端末であって、子機公開鍵を 検証サーバ公開鍵で暗号ィ匕した暗号ィ匕子機公開鍵を記憶する暗号ィ匕子機公開鍵 記憶手段と、前記子機公開鍵と対をなす子機秘密鍵を記憶する子機秘密鍵記憶手 段と、前記記憶した暗号化子機公開鍵を前記端末機器に送信する暗号化子機公開 鍵送信手段と、を具備したことを特徴とする子機端末を提供する (第 4の構成)。 第 4の構成にぉ 、て、前記送信した暗号ィ匕子機公開鍵を復号ィ匕して得られた子機 公開鍵を用いて暗号化された暗号化共通鍵を前記端末機器から受信し、前記記憶 した子機秘密鍵を用いて、前記受信した暗号化共通鍵から共通鍵を復号化するよう に構成することもできる (第 5の構成)。 In the first configuration or the second configuration, the encrypted slave unit public key transmission means transmits the encrypted slave unit public key to the verification server via the information processing server, and the slave unit public key The receiving means may be configured to receive the slave unit public key from the verification server via the information processing server (third configuration). The present invention also provides a verification server that is connected to a network and stores a verification server private key, and an encryption device that encrypts a slave unit public key with a verification server public key that is paired with the verification server private key. Information configured using a device public key, a child device terminal that stores a child device secret key that is paired with the child device public key, and a terminal device that is connected to the network and communicates with the child device terminal An encryption device public key storage means for storing an encryption slave device public key, which is a slave device terminal used in the processing system and encrypts the slave device public key with the verification server public key; A slave unit secret key storage unit that stores a slave unit secret key that is paired with the slave unit public key, and an encrypted slave unit public key transmission unit that transmits the stored encrypted slave unit public key to the terminal device; (4th configuration) ). In the fourth configuration, an encrypted common key encrypted by using the slave unit public key obtained by decrypting the transmitted encrypted slave unit public key is received from the terminal device. The stored secret key can also be used to decrypt the common key from the received encrypted common key (fifth configuration).
また、本発明は、ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバ と、子機公開鍵を前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号ィ匕し た暗号ィヒ子機公開鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端 末と、前記ネットワークと接続すると共に前記子機端末と通信する端末機器と、ネット ワークを介して前記端末機器と通信する情報処理サーバと、を用いて構成された情 報処理システムにお 、て使用する情報処理サーバであって、端末機器と子機端末の 対応を記憶する対応記憶手段と、端末機器から、子機端末に記憶されていた暗号ィ匕 子機公開鍵を受信する暗号化子機公開鍵受信手段と、当該端末機器と当該子機端 末力 前記対応記憶手段で対応づけられて!ヽるか否かを確認する対応確認手段と、 前記対応確認手段で、当該端末機器と当該子機端末が対応づけられて ヽる場合に 、前記受信した暗号ィヒ子機公開鍵を前記検証サーバに送信する暗号ィヒ子機公開鍵 送信手段と、を具備したことを特徴とする情報処理サーバを提供する (第 6の構成)。 また、本発明は、ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバ と、子機公開鍵を前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号ィ匕し た暗号ィヒ子機公開鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端 末と、前記ネットワークと接続すると共に前記子機端末と通信する端末機器とを用い て構成された情報処理システムにおいて使用する端末機器で行う情報処理方法で あって、前記端末機器は、暗号化子機公開鍵受信手段と、暗号化子機公開鍵送信 手段と、子機公開鍵受信手段と、を備え、 The present invention also provides a verification server that is connected to a network and stores a verification server private key, and an encryption device that encrypts a slave unit public key with a verification server public key that is paired with the verification server private key. A mobile device terminal that stores a mobile device public key and a mobile device private key that is paired with the mobile device public key; a terminal device that is connected to the network and communicates with the mobile device terminal; and An information processing server used in an information processing system configured using an information processing server that communicates with a terminal device, a correspondence storage unit that stores correspondence between the terminal device and a slave terminal, and a terminal The encrypted slave device public key receiving means for receiving the encrypted slave device public key stored in the slave device terminal from the device, and the terminal device and the slave device terminal force are associated with each other by the correspondence storage means. ! A confirmation unit for confirming whether or not the terminal device is associated, and when the terminal unit and the slave unit terminal are associated with each other by the correspondence confirmation unit, the received cipher slave public key is verified. There is provided an information processing server comprising: an encryption device public key transmission means for transmitting to a server (sixth configuration). The present invention also provides a verification server that is connected to a network and stores a verification server private key, and an encryption device that encrypts a slave unit public key with a verification server public key that is paired with the verification server private key. The handset terminal storing the handset public key and the handset secret key paired with the handset public key Information processing method performed by a terminal device used in an information processing system configured using a terminal device and a terminal device connected to the network and communicating with the child device terminal, wherein the terminal device A device public key receiving means, an encrypted child device public key transmitting means, and a child device public key receiving means,
前記暗号化子機公開鍵受信手段によって、前記子機端末から前記暗号化子機公 開鍵を受信する暗号ィ匕子機公開鍵受信ステップと、前記暗号化子機公開鍵送信手 段によって、前記受信した暗号化子機公開鍵を所定の送信先に送信する暗号化子 機公開鍵送信ステップと、前記子機公開鍵受信手段によって、前記検証サーバが前 記送信した暗号ィ匕子機公開鍵を前記検証サーバ秘密鍵で復号ィ匕した子機公開鍵を 受信する子機公開鍵受信ステップと、から構成されたことを特徴とする情報処理方法 を提供する (第 7の構成)。  An encryption slave unit public key receiving step for receiving the encrypted slave unit public key from the slave unit terminal by the encrypted slave unit public key receiving means, and an encryption slave unit public key transmitting step, The encrypted slave unit public key transmitting step for transmitting the received encrypted slave unit public key to a predetermined destination, and the slave unit public key receiving unit transmits the encrypted slave unit public key previously transmitted by the verification server. A slave unit public key receiving step for receiving a slave unit public key obtained by decrypting a key with the verification server private key is provided (seventh configuration).
また、本発明は、ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバ と、子機公開鍵を前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号ィ匕し た暗号ィヒ子機公開鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端 末と、前記ネットワークと接続すると共に前記子機端末と通信する端末機器とを用い て構成された情報処理システムにおいて使用する子機端末で行う情報処理方法で あって、前記子機端末は、暗号化子機公開鍵記憶手段と、子機秘密鍵記憶手段と、 暗号ィ匕子機公開鍵送信手段と、を備え、前記暗号化子機公開鍵記憶手段によって、 子機公開鍵を検証サーバ公開鍵で暗号ィ匕した暗号ィ匕子機公開鍵を記憶する暗号 化子機公開鍵記憶ステップと、前記子機秘密鍵記憶手段によって、前記子機公開鍵 と対をなす子機秘密鍵を記憶する子機秘密鍵記憶ステップと、前記暗号化子機公開 鍵送信手段によって、前記記憶した暗号ィ匕子機公開鍵を前記端末機器に送信する 暗号化子機公開鍵送信ステップと、から構成されたことを特徴とする情報処理方法を 提供する (第 8の構成)。  The present invention also provides a verification server that is connected to a network and stores a verification server private key, and an encryption device that encrypts a slave unit public key with a verification server public key that is paired with the verification server private key. Information configured using a device public key, a child device terminal that stores a child device secret key that is paired with the child device public key, and a terminal device that is connected to the network and communicates with the child device terminal An information processing method performed by a handset terminal used in a processing system, wherein the handset terminal includes an encrypted handset public key storage means, a handset secret key storage means, and an encryption handset public key transmission means An encrypted slave device public key storage step for storing an encrypted slave device public key obtained by encrypting the slave device public key with the verification server public key by the encrypted slave device public key storage means; The child device secret key storage means provides the child device. A slave unit private key storage step for storing a slave unit private key that is paired with a public key; and the encrypted slave unit public key transmission unit transmits the stored encrypted slave unit public key to the terminal device. An information processing method characterized by comprising: a public key machine public key transmission step (eighth configuration).
また、本発明は、ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバ と、子機公開鍵を前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号ィ匕し た暗号ィヒ子機公開鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端 末と、前記ネットワークと接続すると共に前記子機端末と通信する端末機器と、ネット ワークを介して前記端末機器と通信する情報処理サーバと、を用いて構成された情 報処理システムにお 、て使用する情報処理サーバで行う情報処理方法であって、前 記情報処理サーバは、端末機器と子機端末の対応を記憶する対応記憶手段と、暗 号化子機公開鍵受信手段と、対応確認手段と、暗号化子機公開鍵送信手段と、を備 え、前記暗号化子機公開鍵受信手段によって、端末機器から、子機端末に記憶され て!ヽた暗号ィ匕子機公開鍵を受信する暗号ィ匕子機公開鍵受信ステップと、前記対応 確認手段によって、当該端末機器と当該子機端末が、前記対応記憶手段で対応づ けられているカゝ否かを確認する対応確認ステップと、前記対応確認ステップで、当該 端末機器と当該子機端末が対応づけられている場合に、前記暗号化子機公開鍵送 信手段によって、前記受信した暗号化子機公開鍵を前記検証サーバに送信する暗 号化子機公開鍵送信ステップと、から構成されたことを特徴とする情報処理方法を提 供する (第 9の構成)。 The present invention also provides a verification server that is connected to a network and stores a verification server private key, and an encryption device that encrypts a slave unit public key with a verification server public key that is paired with the verification server private key. A mobile device terminal that stores a mobile device public key and a mobile device private key that is paired with the mobile device public key; a terminal device that is connected to the network and communicates with the mobile device terminal; An information processing method performed by an information processing server used in an information processing system configured using an information processing server that communicates with the terminal device via a work, wherein the information processing server includes: A correspondence storage means for storing the correspondence between the terminal device and the slave terminal; an encrypted slave public key reception means; a correspondence confirmation means; and an encrypted slave public key transmission means. The device public key receiving means receives the encrypted slave device public key stored in the slave device from the terminal device from the terminal device, and the corresponding confirmation means means In the correspondence confirmation step for confirming whether or not the device and the child device terminal are associated with each other in the correspondence storage means, and in the correspondence confirmation step, the terminal device and the child device terminal are associated with each other. The encryption handset public Provided is an information processing method characterized by comprising an encryption slave unit public key transmission step of transmitting the received encrypted slave unit public key to the verification server by an open key transmission means. Ninth configuration).
発明の効果  The invention's effect
[0009] 本発明によれば、検証サーバでの検証を経ることにより、親機と子機の適切な親子 関係を設定することができる。  According to the present invention, an appropriate parent-child relationship between the parent device and the child device can be set through the verification by the verification server.
発明を実施するための最良の形態  BEST MODE FOR CARRYING OUT THE INVENTION
[0010] (1)実施の形態の概要  [0010] (1) Outline of Embodiment
子機 9 (図 18)の内部で子機秘密鍵と子機公開鍵のペアを生成し、このうち子機公 開鍵を CA3に送信する。 CA3は、子機公開鍵の子機公開鍵証明書を作成した後、 これを検証サーバ 5の公開鍵で暗号ィ匕して子機 9に送信する。子機 9は、この暗号ィ匕 機器公開鍵証明書を記憶し、顧客に出荷される。  A pair of handset private key and handset public key is generated inside handset 9 (Fig. 18), and the handset public key is sent to CA3. CA 3 creates a slave unit public key certificate of the slave unit public key, encrypts it with the public key of the verification server 5, and transmits it to the slave unit 9. The handset 9 stores the encryption device public key certificate and is shipped to the customer.
[0011] 機器 7 (既に情報処理システム 1に接続されている)は、子機 9を子機として設定する 機能を備えており、子機 9からの接続要求があった場合、次の手順を経て親子関係 を設定する。まず、子機 9は、暗号化子機公開鍵を機器 7に送信する。  [0011] The device 7 (already connected to the information processing system 1) has a function of setting the slave unit 9 as a slave unit. When a connection request is received from the slave unit 9, the following procedure is performed. After that, the parent-child relationship is set. First, the slave unit 9 transmits the encrypted slave unit public key to the device 7.
機器 7は、これを顧客サーバ 4に送信する。顧客サーバ 4は、機器 7と子機 9を予め 対応づけた子機マスタを有しており、これを用いて機器 7と子機 9の対応を確認する。 顧客サーバ 4は、対応を確認した後、暗号ィ匕子機公開鍵証明書を検証サーバ 5に送 信する。 [0012] 検証サーバ 5は、検証サーバ秘密鍵を用いて暗号ィ匕子機公開鍵証明書を復号ィ匕 し、子機公開鍵を取り出して顧客サーバ 4に送信する。顧客サーバ 4は、検証サーバ 5から子機公開鍵を受信し、機器 7に転送する。 The device 7 transmits this to the customer server 4. The customer server 4 has a slave unit master in which the device 7 and the slave unit 9 are associated in advance, and the correspondence between the device 7 and the slave unit 9 is confirmed using this. After confirming the correspondence, the customer server 4 sends the encryption client public key certificate to the verification server 5. The verification server 5 decrypts the encryption slave unit public key certificate using the verification server private key, extracts the slave unit public key, and transmits it to the customer server 4. The customer server 4 receives the slave unit public key from the verification server 5 and transfers it to the device 7.
機器 7は、子機公開鍵を受信すると、共通鍵を生成し、これを子機公開鍵を用いて 暗号化して子機 9に送信する。子機 9は、子機秘密鍵を用いてこれを復号化して共通 鍵を取り出す。以後、機器 7と子機 9は、この共通鍵を用いて暗号化'復号ィ匕を行って 通信する。  When the device 7 receives the child device public key, the device 7 generates a common key, encrypts it using the child device public key, and transmits it to the child device 9. The slave unit 9 decrypts this using the slave unit private key and extracts the common key. Thereafter, the device 7 and the slave device 9 perform communication by performing encryption / decryption using the common key.
[0013] (2)実施の形態の詳細 [0013] (2) Details of the embodiment
本実施の形態では、計測機器のネットワークへの設置と、設置後の計測機器の利 用について説明する。  In the present embodiment, the installation of a measurement device on a network and the use of the measurement device after installation will be described.
[0014] [機器の設置] [0014] [Installation of equipment]
図 1は、本実施の形態に係る情報処理システムのネットワーク構成の一例を示した ブロック図である。  FIG. 1 is a block diagram showing an example of a network configuration of the information processing system according to the present embodiment.
情報処理システム 1は、 CA3、 3、検証サーバ 5、顧客サーバ 4、 4、機器登録サー バ 6、機器 7、 7、 7、 · · ·、基地局 8などがネットワーク 10を介して接続可能に配置され ており、 CA3、 3の上位には親 CA2が設けられている。  In the information processing system 1, CA3, 3, verification server 5, customer server 4, 4, device registration server 6, device 7, 7, 7, ..., base station 8, etc. can be connected via network 10. The parent CA2 is provided above CA3,3.
以後、 CA3、 3、顧客サーバ 4、 4、機器 7、 7、 · · ·など複数存在するものに関しては 、特に区別しない場合は単に CA3、顧客サーバ 4、機器 7と記すことにする。  In the following, for items such as CA3, 3, customer server 4, 4, equipment 7, 7,..., They are simply referred to as CA3, customer server 4, equipment 7 unless otherwise distinguished.
[0015] 親 CA2と CA3は、何れも公開鍵証明書を作成する認証局の認証サーバであり、親 CA2が発行するルート証明書により CA3の CA公開鍵の正統性を証明する証明書 信頼チ ーンを構成して 、る。 [0015] Both the parent CA2 and CA3 are certificate authority authentication servers that create public key certificates, and a certificate that proves the legitimacy of CA3's CA public key by the root certificate issued by the parent CA2. Make up the screen.
情報処理システム 1で複数の CA3を設けたのは、機器 7が大量に流通するため、こ れを例えば、製造ロットごと、あるいは機器 7を使用する顧客ごとなどに区分して CA3 に割り当てることができるようにするためである。  The reason why multiple CA3s are provided in Information Processing System 1 is that equipment 7 circulates in large quantities.For this reason, it is possible to assign these to CA3 separately for each production lot or for each customer who uses equipment 7. This is to make it possible.
このように、証明書信頼チェーンを用いるのは事業の便宜のためであり、単一の CA によって全ての機器 7を取り扱うように構成してもよ 、。  In this way, the use of a certificate trust chain is for business convenience, and a single CA may be configured to handle all devices 7.
[0016] CA3の公開鍵を証明する CA公開鍵証明書の正統性は、親 CA2の発行するルー ト証明書により確認される。 より詳細には、 CA3の CA公開鍵は、親 CA2の親 CA秘密鍵によりデジタル署名さ れており、このデジタル署名の正統性を親 CA公開鍵で検証することにより CA公開 鍵の正統性を確認することができる。 [0016] The authenticity of the CA public key certificate that certifies the public key of CA3 is confirmed by the root certificate issued by the parent CA2. More specifically, the CA public key of CA3 is digitally signed by the parent CA private key of the parent CA2, and the authenticity of the CA public key is verified by verifying the authenticity of this digital signature with the parent CA public key. Can be confirmed.
CA公開鍵証明書やルート証明書は、安全な方法により予め顧客サーバ 4、検証サ ーバ 5、機器 7などに提供されている。  The CA public key certificate and root certificate are provided to the customer server 4, the verification server 5, and the device 7 in advance by a secure method.
[0017] 顧客サーバ 4は、機器 7を利用して測定を行う顧客が運用する情報処理サーバで ある。なお、機器 7の販売者側から見て機器 7のユーザは販売者の顧客であるためュ 一ザを顧客と呼んでいる。 The customer server 4 is an information processing server operated by a customer who performs measurement using the device 7. Note that the user of the device 7 is called the customer because the user of the device 7 is the customer of the seller when viewed from the seller side of the device 7.
顧客サーバ 4は、 A社が運用するものや B社が運用するものなど、顧客がそれぞれ 運用している。  Customer servers 4 are operated by customers, such as those operated by Company A and those operated by Company B, respectively.
機器 7は、例えば、ガスメータなどの計測装置であり、顧客サーバ 4は、ネットワーク 10を介してこれら機器 7から計測値を収集する。収集された計測値によりガス料金な どが計算される。  The device 7 is a measuring device such as a gas meter, for example, and the customer server 4 collects measurement values from these devices 7 via the network 10. Gas charges etc. are calculated based on the collected measurements.
[0018] 機器 7は、ネットワーク 10に接続可能に設置された計測機器などであり、ガスメータ などの固定式のもののほか、移動式のものを用いることもできる。  [0018] The device 7 is a measuring device or the like installed so as to be connectable to the network 10, and may be a mobile device in addition to a fixed device such as a gas meter.
機器 7は、例えば、 A社の機器 7は A社の顧客サーバ 4に接続し、 B社の機器 7は B 社の顧客サーバ 4に接続すると 、うように、所有者に対応した顧客サーバ 4に接続し て計測値などの情報を顧客サーバ 4に送信する。  For example, when the device 7 of the company A is connected to the customer server 4 of the company A and the device 7 of the company B is connected to the customer server 4 of the company B, the customer server 4 corresponding to the owner 4 Connect to and send information such as measurement values to the customer server 4.
機器 7は、有線のほか、無線によってネットワーク 10に接続することも可能であり、こ の場合は、基地局 8を介してネットワーク 10に接続するようになって 、る。  The device 7 can be connected to the network 10 by wire as well as wirelessly. In this case, the device 7 is connected to the network 10 via the base station 8.
[0019] 検証サーバ 5は、機器 7をネットワーク 10に設置して顧客サーバ 4に接続する際に、 機器 7の正統性を検証し、なりすましなどの機器 7の不正使用を防ぐためのサーバで ある。 [0019] The verification server 5 is a server for verifying the legitimacy of the device 7 when the device 7 is installed in the network 10 and connected to the customer server 4 and preventing unauthorized use of the device 7 such as impersonation. .
検証サーバ 5で機器 7が正統品であることが検証された後、顧客サーバ 4は機器 7と 接続する。  After the verification server 5 verifies that the device 7 is authentic, the customer server 4 connects to the device 7.
[0020] 機器登録サーバ 6は、機器 7が機器公開鍵証明書などを CA3に発行してもらうに際 して機器 7と CA3との仲介を行うと共に、機器 7を検証サーバ 5に登録するサーバで ある。 なお、機器登録サーバ 6は、機器登録サーバ秘密鍵を記憶しており、検証サーバ 5 は、この秘密鍵に対応する機器登録サーバ公開鍵を記憶して 、る。 [0020] The device registration server 6 mediates between the device 7 and the CA3 when the device 7 issues a device public key certificate or the like to the CA3, and registers the device 7 in the verification server 5. It is. The device registration server 6 stores a device registration server secret key, and the verification server 5 stores a device registration server public key corresponding to the secret key.
そして、機器登録サーバ 6は、機器 7を機器登録するための登録要求情報を検証 サーバ公開鍵で暗号ィ匕して検証サーバ 5に送信し、検証サーバ 5は、これを検証サ ーバ秘密鍵で復号ィ匕するようになって!/、る。  Then, the device registration server 6 encrypts the registration request information for registering the device 7 with the verification server public key and transmits it to the verification server 5, which verifies the verification server private key. I started to decrypt!
検証サーバ 5は、登録要求情報が登録サーバ秘密鍵でデジタル署名することにより 、この情報が確かに機器登録サーバ 6から送信されたものであることを確認することが できる。  The verification server 5 can confirm that this information is surely transmitted from the device registration server 6 by digitally signing the registration request information with the registration server private key.
[0021] 以上のように構成された情報処理システム 1において、親 CA2、 CA3、検証サーバ 5、及び機器登録サ一ノ^は、機器 7の製造事業者や販売事業者などの販売側事業 者によって運用されており、顧客サーバ 4は、機器 7を購入した顧客によって運用さ れている。  [0021] In the information processing system 1 configured as described above, the parent CA2, CA3, the verification server 5, and the device registration system are the sales side operators such as the manufacturer 7 and the sales operator of the device 7. The customer server 4 is operated by the customer who purchased the device 7.
販売側事業者は機器 7の製造番号や機器 7の納入先の顧客などに関する情報を 有しているため、親 CA2、 CA3、検証サーバ 5、機器登録サーバ 6を運用して顧客に 機器検証サービスを提供するのに適した立場にある。  Since the sales company has information on the serial number of device 7 and the customer to whom the device 7 is delivered, etc., operate the parent CA2, CA3, verification server 5, and device registration server 6 to provide the device verification service to the customer. Is in a good position to provide.
[0022] また、機器 7、検証サーバ 5、機器登録サーバ 6、顧客サーバ 4などがネットワーク 1 0を介して形成する通信経路は SSL (Secure Sockets Layer)などの技術を用い て暗号ィ匕されており、情報処理システム 1のセキュリティが高められている。 [0022] The communication path formed by the device 7, the verification server 5, the device registration server 6, the customer server 4 and the like via the network 10 is encrypted using a technology such as SSL (Secure Sockets Layer). Therefore, the security of the information processing system 1 is enhanced.
[0023] 次に、図 2を用いて機器 7のハードウェア的な構成について説明する。 Next, the hardware configuration of the device 7 will be described with reference to FIG.
機器 7は、大きく分けて耐タンパ部 20と計測部 35がバスラインによって接続されて 構成されている。  The device 7 is roughly divided into a tamper-resistant part 20 and a measuring part 35 connected by a bus line.
耐タンパ部 20は、機器認証などセキュリティに関わる情報処理を行う機能部であり 、例えば、耐タンパ仕様の集積回路を収納した ICチップによって構成された耐タンパ モジユーノレである。  The tamper resistant part 20 is a functional part that performs information processing related to security such as device authentication. For example, the tamper resistant part 20 is a tamper resistant module constituted by an IC chip containing a tamper resistant integrated circuit.
[0024] 耐タンパ仕様とは、例えば、内部構造を解析しょうとすると自動的に内部構造を破 壊するなど、改竄や複製、内部の論理構造の解読などの不正行為に対して十分な 防御手段を講じるための仕様である。  [0024] The tamper-proof specification is a sufficient protection measure against fraudulent acts such as tampering and duplication, and decoding of the internal logical structure, such as automatically destroying the internal structure when trying to analyze the internal structure. It is a specification to take.
そのため、耐タンパ部 20は、外部からの解析が著しく困難で一種のブラックボックス となっており、例えば、機器秘密鍵などの秘密情報を安全に保持することができる。 なお、タンパ (tamper)とは、装置に手を加えるという意味や、情報などを不正に変 更するという意味があり、耐タンパとは、これらの操作に対して耐性を保持しているこ とを意味する。 Therefore, the tamper resistant part 20 is a kind of black box that is extremely difficult to analyze from the outside. For example, secret information such as a device secret key can be safely held. Note that tamper means that the device is tampered with, and that information is illegally changed.Tamper resistance means that it is resistant to these operations. Means.
[0025] 耐タンパ部 20は、 CPU (Central Processing Unit) 21、内部クロック 22、 RO M (Read Only Memory) 23、 RAM (Random Access Memory) 24、 EEPR OM (Electrically Erasable and Programmable ROM) 25などが図示しない バスラインによって接続されて構成されて 、る。  [0025] The tamper resistant unit 20 includes a CPU (Central Processing Unit) 21, an internal clock 22, a ROM (Read Only Memory) 23, a RAM (Random Access Memory) 24, an EEPROM OM (Electrically Erasable and Programmable ROM) 25, and the like. It is configured to be connected by a bus line (not shown).
[0026] CPU21は、 EEPROM25、 ROM23、 RAM24などに記憶されているプログラムに 従って各種の情報処理を行う中央処理装置である。  The CPU 21 is a central processing unit that performs various types of information processing according to programs stored in the EEPROM 25, the ROM 23, the RAM 24, and the like.
本実施の形態では、機器公開鍵と機器秘密鍵のペアを生成したり、検証サーバ 5と 通信して機器 7の機器認証を行ったり、顧客サーノ と通信する際に情報の暗号化' 復号ィ匕を行ったりする。  In the present embodiment, a pair of a device public key and a device private key is generated, device authentication of device 7 is performed by communicating with verification server 5, and information is encrypted when communicating with customer Sano. I do habit.
[0027] 内部クロック 22は、耐タンパ部 20を駆動するためのクロックを発生させるほか、例え ば、耐タンパ部 20が計測部 35の計測値に対して時刻情報を付与するタイプの機器 7に関しては、時刻情報を付与するための時計として使用することができる。内部クロ ック 22は、計測部 35の外部クロック 28と同期しており、 CPU21と CPU29はタイミン グを同期させて協働して動作することができる。  [0027] The internal clock 22 generates a clock for driving the tamper resistant part 20, and for example, the tamper resistant part 20 relates to a device 7 of a type that gives time information to the measurement value of the measuring part 35. Can be used as a clock for giving time information. The internal clock 22 is synchronized with the external clock 28 of the measurement unit 35, and the CPU 21 and the CPU 29 can operate in synchronism with each other.
ROM23は、読み出し専用の記憶装置 (メモリ)であって、耐タンパ部 20を駆動する ための基本的なプログラムやパラメータなどを格納している。  The ROM 23 is a read-only storage device (memory) and stores basic programs and parameters for driving the tamper resistant unit 20.
RAM24は、読み書き可能な記憶装置であって、 CPU21が各種の情報処理を行う 際のワーキングエリアを提供する。  The RAM 24 is a readable / writable storage device, and provides a working area when the CPU 21 performs various types of information processing.
[0028] EEPROM25は、読み書きが可能な不揮発性の記憶装置であり、プログラムゃデ ータなどが記憶されている。 [0028] The EEPROM 25 is a readable / writable nonvolatile storage device, and stores program data and the like.
本実施の形態では、一例として、非対称暗号鍵生成プログラム、機器秘密鍵、機器 公開鍵証明書、検証サーバ公開鍵証明書、検証サーバ接続情報、検証要求プログ ラム、 CA公開鍵証明書や、図示しない、通信プログラム、 OS (Operating System )などが記憶されている。 [0029] 非対称暗号鍵生成プログラムは、機器 7が顧客に渡される前に、機器 7の管理者( 通常は機器 7の製造事業者)が実行するプログラムであり、このプログラムを CPU21 で実行すると、耐タンパ部 20の内部で機器秘密鍵と機器公開鍵の非対称暗号鍵ぺ ァ (対)が生成される。 In this embodiment, as an example, an asymmetric encryption key generation program, device private key, device public key certificate, verification server public key certificate, verification server connection information, verification request program, CA public key certificate, Communication program, OS (Operating System), etc. are stored. [0029] The asymmetric encryption key generation program is a program executed by the administrator of the device 7 (usually the manufacturer of the device 7) before the device 7 is delivered to the customer. When this program is executed by the CPU 21, An asymmetric encryption key pair (pair) of a device private key and a device public key is generated inside the tamper resistant unit 20.
機器 7は、生成した機器秘密鍵を EEPROM25に記憶し、外部からこの機器秘密 鍵を知ることはできな 、ようになって!/、る。  The device 7 stores the generated device secret key in the EEPROM 25 and cannot know the device secret key from outside!
[0030] 機器公開鍵証明書は、生成した機器公開鍵を機器 7が機器登録サ一ノ^を介して[0030] The device public key certificate is generated by the device 7 via the device registration server ^.
CA3に送信し、 CA3が CA秘密鍵でデジタル署名した公開鍵証明書である。 A public key certificate sent to CA3 and digitally signed by CA3 with the CA private key.
機器公開鍵証明書を受け取つたものは、 CA公開鍵でデジタル署名を検証すること により機器公開鍵証明書に記載されている機器公開鍵が正統なものであることを確 認することができる。  Those who have received the device public key certificate can verify that the device public key described in the device public key certificate is authentic by verifying the digital signature with the CA public key.
[0031] 検証サーバ公開鍵証明書は、検証サーバ 5の公開鍵である検証サーバ公開鍵を C A3が CA秘密鍵でデジタル署名した公開鍵証明書である。  The verification server public key certificate is a public key certificate in which CA 3 digitally signs the verification server public key, which is the public key of verification server 5, with the CA private key.
後述するように、機器 7は、検証サーバ公開鍵に記録されている検証サーバ公開鍵 を用いて情報を暗号化し、検証サーバ 5に送信する。この暗号化情報は、検証サー ノ 5が有する検証サーバ秘密鍵でし力復号ィ匕することができないため、検証サーバ 5 以外のものがこの暗号ィ匕情報を受信しても復号ィ匕できず、セキュリティを高めることが できる。  As will be described later, the device 7 encrypts information using the verification server public key recorded in the verification server public key, and transmits the encrypted information to the verification server 5. Since this encrypted information is a verification server private key possessed by the verification server 5 and cannot be decrypted, it cannot be decrypted even if a non-verification server 5 receives this encryption information. Can increase security.
なお、検証サーバ公開鍵の正統性は、 CA公開鍵で検証サーバ公開鍵証明書の デジタル署名を検証することにより確認することができる。  The legitimacy of the verification server public key can be confirmed by verifying the digital signature of the verification server public key certificate with the CA public key.
[0032] CA公開鍵証明書は、 CA3の公開鍵である CA公開鍵を親 CA2が親 CA秘密鍵で デジタル署名した公開鍵証明書である。機器 7は、 CA公開鍵証明書に記載されて いる CA公開鍵を用いて、検証サーバ 5の検証サーバ公開鍵証明書や顧客サーバ 4 の顧客サーバ公開鍵証明書 (何れも CA3の CA公開鍵によりデジタル署名されて ヽ る)の正統性を検証することができる。 [0032] The CA public key certificate is a public key certificate obtained by digitally signing the CA public key, which is the public key of CA3, with the parent CA2 using the parent CA private key. The device 7 uses the CA public key described in the CA public key certificate to verify the verification server public key certificate of the verification server 5 and the customer server public key certificate of the customer server 4 (both are CA public keys of CA3). The legitimacy of the digital signature can be verified.
また、図示しないが、機器 7は、 EEPROM25に親 CA2が発行したルート証明書を 記憶しており、ルート証明書に記載されている親 CA公開鍵によって、 CA公開鍵証 明書の正統性を確認することができる。 [0033] 検証サーバ接続情報は、機器 7がネットワーク 10に接続した際に、検証サーバ 5に 接続するためのアドレス情報であり、例えば、検証サーバ 5の URL (Uniform Reso urce Locators)で構成されている。 In addition, although not shown, the device 7 stores the root certificate issued by the parent CA2 in the EEPROM 25, and the legitimacy of the CA public key certificate is confirmed by the parent CA public key described in the root certificate. Can be confirmed. [0033] The verification server connection information is address information for connecting to the verification server 5 when the device 7 is connected to the network 10, and includes, for example, a URL (Uniform Resource Locators) of the verification server 5. Yes.
機器 7は、ネットワーク 10に設置された際に、検証サーバ接続情報を用いて検証サ ーバ 5に接続し、機器検証を受ける。  When the device 7 is installed in the network 10, it connects to the verification server 5 using the verification server connection information and receives device verification.
このように、本実施の形態では、機器 7に予め検証サーバ接続情報を埋め込んで おくため、どのようなネットワーク環境下で機器 7が設置されても、機器 7から検証サー ノ 5にアクセスすることができる。  As described above, in this embodiment, since the verification server connection information is embedded in the device 7 in advance, the device 7 can access the verification server 5 regardless of the network environment. Can do.
[0034] 検証要求プログラムは、検証サーバ 5に機器に検証を要求するためのプログラムで ある。 [0034] The verification request program is a program for requesting the verification server 5 to verify the device.
機器 7をネットワーク 10に接続した後(例えば、電源投入直後)、 CPU21で検証要 求プログラムを実行すると、 CPU21は、後述の検証情報を生成する。そして CPU21 は、検証サーバ接続情報を用いて機器 7を検証サーバ 5に接続し、検証情報を検証 サーバ 5に送信する。  After the device 7 is connected to the network 10 (for example, immediately after the power is turned on), when the CPU 21 executes the verification request program, the CPU 21 generates verification information described later. Then, the CPU 21 connects the device 7 to the verification server 5 using the verification server connection information, and transmits the verification information to the verification server 5.
また、図示しないが、 EEPROM25には、計測部 35で計測した計測値を暗号ィ匕す るなど、セキュリティに関わる情報処理を行うためのプログラムが格納されている。 以上、耐タンパ部 20の各構成要素について説明した力 この他に耐タンパ部 20と 計測部 35との通信を制御する通信制御部なども構成されている。  Although not shown, the EEPROM 25 stores a program for performing information processing related to security, such as encrypting the measured value measured by the measuring unit 35. In addition to the forces described above for the components of the tamper resistant part 20, a communication control part for controlling communication between the tamper resistant part 20 and the measuring part 35 is also configured.
[0035] 計測部 35は、計測を行う機能部であり、 CPU29、 ROM27、 RAM30、外部クロッ ク 28、表示部 31、入力部 32、記憶部 33、計測装置部 34など力 構成されている。 計測装置部 34は、計測を行う装置であって、 CPU29から要求があると計測値をデ ジタル情報として CPU29に出力する。 The measurement unit 35 is a functional unit that performs measurement, and includes a CPU 29, a ROM 27, a RAM 30, an external clock 28, a display unit 31, an input unit 32, a storage unit 33, a measurement device unit 34, and the like. The measurement device unit 34 is a device that performs measurement, and outputs a measurement value to the CPU 29 as digital information when requested by the CPU 29.
計測装置部 34としては、例えば、ガス ·水道 ·電気の使用量を計測するもののほか 、温度計測、湿度計測、水質計測、大気汚染計測を行うものや、自動販売機に設置 して在庫や販売状況などを計測するものなど、各種のものを採用することができる。  For example, in addition to measuring gas, water, and electricity consumption, the measuring device unit 34 performs temperature measurement, humidity measurement, water quality measurement, air pollution measurement, and is installed in a vending machine for inventory and sales. Various things, such as what measures a situation etc., are employable.
[0036] CPU29は、記憶部 33、 ROM27、 RAM30などに記憶されているプログラムに従 つて各種の情報処理を行う中央処理装置である。 The CPU 29 is a central processing unit that performs various types of information processing according to programs stored in the storage unit 33, the ROM 27, the RAM 30, and the like.
CPU29は、 CPU21と協働して動作し、例えば、機器 7の設置の際に、耐タンパ部 20から出力された検証情報を検証サーバ 5に送信したり、設置後は、計測装置部 34 力も計測値を取得してこれを耐タンパ部 20でデジタル署名して顧客サーバ 4に送信 したりなどする。 The CPU 29 operates in cooperation with the CPU 21.For example, when installing the device 7, the tamper resistant part The verification information output from 20 is transmitted to the verification server 5, and after installation, the measurement device section 34 also acquires the measured value, digitally signs it with the tamper resistant section 20, and transmits it to the customer server 4. To do.
[0037] 外部クロック 28は、計測部 35を駆動するためのクロックを発生させる。また、一般に 外部クロック 28は内部クロック 22よりも精度が高いため、外部クロック 28を外部の電 波などで更正し、更正された外部クロック 28を用いて内部クロック 22を更正するよう に構成されている。  The external clock 28 generates a clock for driving the measuring unit 35. Also, since the external clock 28 is generally more accurate than the internal clock 22, it is configured to correct the external clock 28 using an external signal, etc., and to correct the internal clock 22 using the corrected external clock 28. Yes.
[0038] ROM27は、読み出し専用の記憶装置であって、 CPU29を駆動するための基本 的なプログラムやパラメータなどを格納している。  The ROM 27 is a read-only storage device, and stores basic programs, parameters, and the like for driving the CPU 29.
RAM30は、読み書き可能な記憶装置であって、 CPU29が各種の情報処理を行う 際のワーキングエリアを提供する。  The RAM 30 is a readable / writable storage device, and provides a working area when the CPU 29 performs various types of information processing.
[0039] 記憶部 33は、例えば、 EEPROMによって更正されており、各種プログラムゃデー タなどが記憶されている。 [0039] The storage unit 33 is corrected by, for example, EEPROM, and stores various programs and data.
記憶部 33に記憶しているプログラムを CPU29で実行することにより、計測装置部 3 By executing the program stored in the storage unit 33 on the CPU 29, the measuring device unit 3
4から計測値を取得する機能、耐タンパ部 20と通信して協働して情報処理を行う機 能、通信部 26を制御して、検証サーバ 5や顧客サーノ と通信する機能などを実現 することができる。 4) A function to acquire measurement values from 4), a function to communicate with and cooperate with the tamper resistant unit 20, and a function to communicate with the verification server 5 and customer sano by controlling the communication unit 26 be able to.
また、記憶部 33は、計測装置部 34で計測された計測値を一時的に記憶するのに 用いることちでさる。  Further, the storage unit 33 is used for temporarily storing the measurement value measured by the measurement device unit 34.
[0040] 表示部 31は、例えば、液晶表示パネルなどの表示デバイスを備えており、設置担 当者が機器 7をネットワーク 10に設置する際の操作指示や、計測装置部 34の計測 値など、各種の情報を表示することができる。  [0040] The display unit 31 includes, for example, a display device such as a liquid crystal display panel, and an operation instruction when the person in charge of installation installs the device 7 on the network 10 or a measurement value of the measurement device unit 34. Various types of information can be displayed.
入力部 32は、操作ボタンなどを備えており、例えば、設置担当者が機器 7をネットヮ ーク 10に設置する際に機器 7を操作するのに用いられる。  The input unit 32 includes operation buttons and the like, and is used, for example, when the person in charge of installation installs the device 7 on the network 10 to operate the device 7.
[0041] 通信部 26は、機器 7をネットワーク 10に接続するためのインターフェースを構成し ており、 CPU21や CPU29は通信部 26を介して機器登録サーバ 6、検証サーバ 5、 顧客サーバ 4などと通信することができる。機器 7が無線でネットワーク 10に接続する 場合、通信部 26は RF回路などを備える。 [0042] 次に図 3を用いて検証サーバ 5のハードウェア的な構成について説明する。 [0041] The communication unit 26 constitutes an interface for connecting the device 7 to the network 10. The CPU 21 and the CPU 29 communicate with the device registration server 6, the verification server 5, the customer server 4, and the like via the communication unit 26. can do. When the device 7 is connected to the network 10 wirelessly, the communication unit 26 includes an RF circuit and the like. Next, the hardware configuration of the verification server 5 will be described with reference to FIG.
検証サーバ 5は、 CPU41、 ROM42、 RAM43、記憶部 46、及び通信部 45などか ら構成されている。  The verification server 5 includes a CPU 41, a ROM 42, a RAM 43, a storage unit 46, a communication unit 45, and the like.
CPU41は、 ROM42、 RAM43、記憶部 46などに記憶されているプログラムに従 つて動作し、機器 7を検証するための各種の情報処理を行う。  The CPU 41 operates in accordance with programs stored in the ROM 42, RAM 43, storage unit 46, and the like, and performs various types of information processing for verifying the device 7.
[0043] ROM42は、読み出し専用の記憶装置であって、 CPU41を駆動するための基本 的なプログラムやパラメータなどを格納している。 [0043] The ROM 42 is a read-only storage device, and stores basic programs, parameters, and the like for driving the CPU 41.
RAM43は、読み書き可能な記憶装置であって、 CPU41が各種の情報処理を行う 際のワーキングエリアを提供する。  The RAM 43 is a readable / writable storage device, and provides a working area when the CPU 41 performs various types of information processing.
通信部 45は、検証サーバ 5をネットワーク 10に接続するインターフェースである。  The communication unit 45 is an interface that connects the verification server 5 to the network 10.
[0044] 記憶部 46は、例えば、ハードディスクなどの大容量の記憶媒体を用いて構成され ており、図示したような各種プログラムやデータが格納されている。 The storage unit 46 is configured using a large-capacity storage medium such as a hard disk, for example, and stores various programs and data as illustrated.
検証プログラムは、機器 7を機器検証するためのプログラムであり、 CPU41は機器 検証プログラムを実行することにより、機器 7から送信されてきた検証情報を検証し、 検証結果を顧客サーバ 4に送信することができる。  The verification program is a program for verifying the device 7. The CPU 41 executes the device verification program, verifies the verification information transmitted from the device 7, and transmits the verification result to the customer server 4. Can do.
[0045] CA公開鍵証明書は、 CA3の CA公開鍵の公開鍵証明書である。また、図示しない 力 親 CA2のルート証明書も記憶している。これらの証明書は、例えば、担当者間で 手渡しするなど、安全な方法により提供されたものである。 [0045] The CA public key certificate is a public key certificate of the CA public key of CA3. In addition, the root certificate of force parent CA2 (not shown) is also stored. These certificates are provided in a secure manner, for example, handed over between personnel.
検証サーバ秘密鍵は、検証サーバ公開鍵に対応する秘密鍵であり、情報の暗号 化やデジタル署名などに用いられる。  The verification server private key is a private key corresponding to the verification server public key, and is used for information encryption, digital signature, and the like.
[0046] 顧客サーバ接続情報は、ネットワーク 10を介して顧客サーバ 4に接続するための情 報であり、例えば顧客サーノ の URLや IPアドレスなどによって構成されている。 顧客サーバ接続情報は、予め顧客に提供してもらい記憶部 46に記憶したものであ る。 [0046] The customer server connection information is information for connecting to the customer server 4 via the network 10, and is configured by, for example, the URL or IP address of the customer sano. The customer server connection information is stored in the storage unit 46 in advance by the customer.
検証サーバ 5は、検証結果を顧客サーバ 4に送信する際に、顧客サーバ接続情報 を用いて顧客サーバ 4に接続して送信する。  When transmitting the verification result to the customer server 4, the verification server 5 connects to the customer server 4 using the customer server connection information and transmits it.
[0047] 次に、機器登録データベースについて説明する。 Next, the device registration database will be described.
機器登録データベースは、検証を要する機器 7を予め登録したデータベースであり 、その論理的な構成の一例を図 4に示す。 The device registration database is a database in which devices 7 that require verification are registered in advance. An example of the logical configuration is shown in FIG.
図に示したように、機器登録データベースは、「顧客 」、「顧客サーバ接続情報」 、「機器 ID」、「機器公開鍵」、…などの各項目から構成されている。  As shown in the figure, the device registration database includes items such as “customer”, “customer server connection information”, “device ID”, “device public key”, and so on.
[0048] 「顧客 ID」は、顧客サーバ 4、 4、 · · ·を運用する各顧客を特定する Iひ f青報である。 [0048] "Customer ID" is an I blueprint that identifies each customer who operates customer servers 4, 4,.
このように、顧客は予め検証サーバ 5に登録されており、 HD情報が付与されている。 Thus, the customer is registered in the verification server 5 in advance, and HD information is given.
「顧客サーバ接続情報」は、顧客サーバ 4に接続するための接続情報であり、顧客 I Dと対応づけて記憶されて 、る。 “Customer server connection information” is connection information for connecting to the customer server 4, and is stored in association with the customer ID.
なお、図では、各顧客に 1つの顧客サーバ接続情報が記載されているが、顧客が 複数の顧客サーノ を用いる場合は、これら複数の顧客サーバ接続情報が顧客 ID に対応づけられる。  In the figure, one customer server connection information is described for each customer. However, when a customer uses multiple customer servers, the multiple customer server connection information is associated with a customer ID.
[0049] 「機器 」は、機器 7、 7、 · · ·の個々に付与された 情報であり、例えば、製造シリ アル番号などを用いることができる。  “Equipment” is information assigned to each of the devices 7, 7,..., And for example, a production serial number can be used.
「機器公開鍵」は、機器秘密鍵に対応する機器公開鍵を各機器 7ごとに記憶したも のである。機器公開鍵は、 CA3が検証サーバ 5に送信した機器公開鍵証明書力ゝら取 得されたものである。  The “device public key” is a device public key corresponding to the device private key stored for each device 7. The device public key is obtained by the device public key certificate that CA3 sent to the verification server 5.
[0050] 機器 7を何れの顧客サーバ接続情報に対応させて登録するかは、例えば、機器 7 の販売時に顧客から機器 7を接続する顧客サーバ 4の指定を受け、これを検証サー ノ 5の管理者が対応させたものである。  [0050] Which customer server connection information the device 7 is registered to correspond to, for example, receives the designation of the customer server 4 to which the device 7 is connected from the customer when the device 7 is sold, The administrator has made it compatible.
[0051] 以上、検証サーバ 5のハードウェア的な構成について説明した力 顧客サーバ 4や 機器登録サーバ 6及び CA3などのハードウェア的な構成も検証サーバ 5と同様であ る。 As described above, the hardware configuration of the verification server 5 has the same hardware configuration as the verification server 5 such as the customer server 4, the device registration server 6, and the CA 3.
CA3、親 CA2は、予め記憶した所定のプログラムを CPUが実行することにより公開 鍵証明書を作成したりなどの各種情報処理を行う機能を発揮する。  CA3 and parent CA2 perform various information processing functions such as creating a public key certificate by the CPU executing a predetermined program stored in advance.
更に、 CA3の場合は、機器公開鍵証明書を発行した機器 7の失効情報を記憶した 失効リストを記憶部 46に記憶して 、る。  Further, in the case of CA3, the revocation list storing the revocation information of the device 7 that issued the device public key certificate is stored in the storage unit 46.
失効リストは、 CA3が機器公開鍵証明書を発行した機器 7が現在失効状態カゝ否か を機器 IDの有無に対応させて記憶したデータリストであり、機器公開鍵証明書発行 後直後は、当該機器に関する情報は何も登録されていない。そして、失効は、顧客 力もの申告により当該機器 IDを失効リストに登録することにより設定される。 The revocation list is a data list that stores whether the device 7 to which CA3 issued the device public key certificate is currently revoked or not, corresponding to the presence or absence of the device ID. Immediately after the device public key certificate is issued, No information about the device is registered. And revocation is the customer It is set by registering the device ID in the revocation list by powerful declaration.
検証サーバ 5は、顧客サーノ など力も有効性の問い合わせがあった場合に、 CA 3の失効リストを参照し、有効性を検証する。  The verification server 5 verifies the validity by referring to the revocation list of CA 3 when there is an inquiry about validity such as customer sano.
即ち、検証サーバ 5は、機器 7の正統性を検証する際に、機器が失効状態であるか 否かを記憶した失効状態記憶手段 (CA3の失効リスト)を用いて機器 7の有効性を検 証する有効性検証手段を備えて ヽる。  In other words, the verification server 5 verifies the validity of the device 7 by using the revocation status storage means (revocation list of CA3) that stores whether the device is in a revocation status or not when verifying the legitimacy of the device 7. There should be a means of verifying the effectiveness.
[0052] 顧客サーバ 4の場合は、記憶部 46に機器マスタと計測値データベースなどが記憶 されている。 [0052] In the case of the customer server 4, the storage unit 46 stores a device master, a measured value database, and the like.
機器マスタは、顧客サーバ 4が接続する機器 7のマスタ情報であり、例えば、機器 7 の機器 ID、機器 7に接続するための機器接続情報、機器公開鍵といった基本的な事 項や、機器 7の設置場所、設置日時といった付属的な情報力 構成されている。顧 客サーバ 4は、機器マスタによって各機器 7を管理する。  The device master is master information of the device 7 to which the customer server 4 is connected. For example, basic information such as the device ID of the device 7, the device connection information for connecting to the device 7, the device public key, and the device 7 Attached information power, such as the installation location and date of installation. The customer server 4 manages each device 7 by the device master.
[0053] 例えば、基本的な事項は、機器検証の際に検証サーバ 5から受信して記憶したも のであり、付属的な事項は顧客サーバ 4の管理者が入力したものである。  [0053] For example, basic items are received and stored from the verification server 5 at the time of device verification, and incidental items are input by the administrator of the customer server 4.
機器 7が失効となった場合は、顧客サーバ 4の管理者が顧客サーバ 4に当該機器 7 の失効を入力して機器マスタから削除する。この際に、顧客サーバ 4は、失効要求を CA3に送信し、 CA3が失効リストに登録されることにより失効とされる。  When the device 7 is revoked, the administrator of the customer server 4 inputs the revocation of the device 7 to the customer server 4 and deletes it from the device master. At this time, the customer server 4 sends a revocation request to CA3 and is revoked when CA3 is registered in the revocation list.
[0054] 計測値データベースは、ネットワーク 10を経由して機器 7から送信されてきた計測 値を記憶 ·蓄積したデータベースである。  The measured value database is a database that stores and accumulates measured values transmitted from the device 7 via the network 10.
計測値データベースでは、各計測値がこれを計測した機器 7の機器 IDに対応づけ られ、計測日時なども記憶される。  In the measurement value database, each measurement value is associated with the device ID of the device 7 that measured it, and the measurement date and time are also stored.
[0055] 機器登録サーバ 6は、機器 7が機器公開鍵証明書を取得する際に機器 7と CA3と の仲介を行う機能や、 登録要求情報を生成して検証サーバ 5に送信し、検証サー ノ ¾に機器 7を登録する機能などを CPUに発揮させるプログラムを記憶部 46に記憶 しており、これを実行することによりこれらの機能を発揮する。また、機器登録サーバ 6 は、機器 7に入力するための検証サーバ接続情報なども記憶して 、る。  [0055] The device registration server 6 generates a function for mediating between the device 7 and CA3 when the device 7 obtains a device public key certificate, and generates registration request information and transmits it to the verification server 5 to transmit the verification server. In addition, a program for causing the CPU to perform functions such as registering the device 7 is stored in the storage unit 46, and these functions are exhibited by executing this program. The device registration server 6 also stores verification server connection information for input to the device 7.
[0056] 次に、図 5を用いて、機器 7の出荷前処理力も設置までの手順の全体構成につい て説明する。図中に手順の順序を括弧にて示してあり、以下、この順序に従って説明 していく。 Next, the overall configuration of the procedure up to the installation of the processing power before shipping of the device 7 will be described with reference to FIG. In the figure, the order of the procedures is shown in parentheses. I will do it.
なお、手順 (1)から手順 (4)までは、機器 7の設置前 (好ましくは顧客への出荷前) に行う作業である。  Steps (1) to (4) are performed before installation of the device 7 (preferably before shipment to the customer).
(1) (機器秘密鍵と機器公開鍵の非対称暗号鍵ペアの生成)  (1) (Generate asymmetric encryption key pair of device private key and device public key)
機器 7のハードウェアが完成すると、作業担当者が機器 7を操作して非対称暗号鍵 生成プログラムを実行し、耐タンパ部 20内で CPU21に機器秘密鍵と機器公開鍵の ペアを生成させる (非対称暗号鍵生成手段)。  When the hardware of device 7 is completed, the operator operates device 7 to execute the asymmetric encryption key generation program, and causes CPU 21 to generate a device private key / device public key pair within tamper resistant unit 20 (asymmetric Encryption key generation means).
そして、機器 7は、生成した機器秘密鍵を EEPROM25の所定のエリアに記憶する (秘密鍵記憶手段)。  The device 7 stores the generated device secret key in a predetermined area of the EEPROM 25 (secret key storage means).
[0057] (2) (機器公開鍵の送信) [0057] (2) (Send device public key)
機器 7は、作業担当者によって当該機器 7を担当する機器登録サ一ノ^に接続され 、生成した機器公開鍵や機器固有情報などを機器登録サーノ ¾に送信する (公開鍵 提供手段)。  The device 7 is connected by a worker in charge to the device registration server in charge of the device 7, and transmits the generated device public key, device unique information, and the like to the device registration server (public key providing means).
ここで、機器固有情報には、機器 、耐タンパ部の MACアドレスなど機器 7に固有 の情報が含まれている。  Here, the device-specific information includes information unique to the device 7 such as the device and the MAC address of the tamper-proof part.
機器登録サーバ 6は、機器 7からこれらの情報を受信する (公開鍵取得手段)。そし て、機器登録サーバ 6は、機器公開鍵や機器 IDなどを CA3に送信し、 CA3に機器 公開鍵証明書の発行を要求する (公開鍵証明書発行要求手段)。  The device registration server 6 receives these pieces of information from the device 7 (public key acquisition means). Then, the device registration server 6 sends the device public key, device ID, etc. to CA3 and requests CA3 to issue a device public key certificate (public key certificate issue request means).
[0058] (3) (機器証明書の書き込み) [0058] (3) (Write device certificate)
CA3は、機器登録サーバ 6から機器公開鍵から機器証明書を作成する。そして、 C A3は、機器証明書に検証サーバ 5の検証サーバ公開鍵証明書を加えて機器証明 書を作成し、機器登録サーバ 6に送信する。  CA3 creates a device certificate from the device public key from the device registration server 6. CA 3 adds the verification server public key certificate of the verification server 5 to the device certificate to create a device certificate, and transmits the device certificate to the device registration server 6.
機器登録サーバ 6は、機器証明書を CA3から受信すると、これに検証サーバ接続 情報を付加して機器7に送信する。 When the device registration server 6 receives the device certificate from CA3, it adds the verification server connection information to the device certificate and transmits it to the device 7 .
機器 7は、機器登録サーバ 6から機器証明書を受信して耐タンパ部 20に記憶する 以上のように、機器証明書には、機器公開鍵証明書、検証サーバ接続情報、検証 サーバ公開鍵証明書などが含まれて 、る。 [0059] より詳細には、機器公開鍵証明書は、機器 7の機器公開鍵を CA3の CA秘密鍵 (証 明サーバ秘密鍵)でデジタル署名した公開鍵証明書である (公開鍵証明書作成手段 )。このように CA3は秘密鍵記憶手段を備えて 、る。 The device 7 receives the device certificate from the device registration server 6 and stores it in the tamper resistant unit 20. As described above, the device certificate includes the device public key certificate, the verification server connection information, and the verification server public key certificate. The book is included. [0059] More specifically, the device public key certificate is a public key certificate obtained by digitally signing the device public key of device 7 with the CA3 CA private key (certificate server private key). Means). Thus, CA3 has a secret key storage means.
より詳細には、機器公開鍵証明書は、例えば、「公開鍵 [abl2, · ·01]は、機器 ID[ 12 · · · ]の機器公開鍵である。」といった内容のメッセージと、当該メッセージから生成 したダイジェスト(例えば、メッセージのハッシュ値を用いる)を CA3の CA秘密鍵で暗 号化したデジタル署名など力 構成されて 、る。  More specifically, the device public key certificate includes, for example, a message having a content such as “Public key [abl2,... 01] is a device public key of device ID [12. It is composed of a digital signature that is obtained by encrypting the digest (for example, using the hash value of the message) generated from CA with the CA3 private key.
機器公開鍵証明書を受信したものは、 CA3の CA公開鍵 (証明サーバ公開鍵)を 用いてデジタル署名を復号化し、更に、メッセージのダイジェストを作成して両者の一 致を確認することにより、メッセージが改編されていないことを確認することができる。  When the device public key certificate is received, the digital signature is decrypted using the CA public key (certification server public key) of CA3, and a message digest is created to confirm the match between the two. It can be confirmed that the message has not been modified.
[0060] 検証サーバ接続情報は、ネットワーク 10上で検証サーバ 5に接続するための情報 であり、例えば、検証サーバ 5の URL (Uniform Resource Locators)や IPァドレ スで構成されて 、る (検証サーバ接続情報記憶手段)。 [0060] The verification server connection information is information for connecting to the verification server 5 on the network 10. For example, the verification server connection information includes a URL (Uniform Resource Locators) and an IP address of the verification server 5 (validation server Connection information storage means).
[0061] 検証サーバ公開鍵証明書は、検証サーバ公開鍵を CA3の秘密鍵でデジタル署名 した公開鍵証明書である。 [0061] The verification server public key certificate is a public key certificate obtained by digitally signing the verification server public key with the CA3 private key.
検証サーバ公開鍵証明書には、検証サーバ公開鍵が含まれているため、機器 7は これによつて検証サーバ公開鍵を取得する。  Since the verification server public key certificate includes the verification server public key, the device 7 acquires the verification server public key using this.
なお、機器 7は、予め組み込まれている CA公開鍵などを用いて、機器公開鍵証明 書や検証サーバ公開鍵証明書の正統性を検証することができる。  Note that the device 7 can verify the legitimacy of the device public key certificate and the verification server public key certificate by using a pre-installed CA public key.
なお、本実施の形態の機器登録サーバ 6は、 CA3から受信した機器証明書に検証 サーバ公開鍵証明書を含めて機器 7に送信したが、これに限定せず、 CA3から受信 した機器証明書と、検証サーバ接続情報を別々に機器 7に送信するように構成する ことちでさる。  The device registration server 6 according to the present embodiment includes the verification server public key certificate in the device certificate received from CA3 and transmits it to the device 7. However, the present invention is not limited to this, and the device certificate received from CA3. And the configuration to send the verification server connection information to the device 7 separately.
[0062] (4) (機器 7の登録要求) [0062] (4) (Registration request for device 7)
機器登録サ一ノ^は、機器 7に対して CA3が機器証明書を発行する際に、機器公 開鍵証明書を取得することができる。  The device registration system can obtain a device public key certificate when CA3 issues a device certificate to device 7.
そして、機器登録サーノ 6は、このようにして得た機器公開鍵証明書と、機器固有 情報 (機器 ID)などが含まれる登録要求情報を作成して、検証サーバ 5に送信し、検 証サーバ 5に機器 7の登録を要求する (公開鍵証明書送信手段)。 Then, the device registration Sano 6 creates registration request information including the device public key certificate obtained in this way, device unique information (device ID), etc., and sends it to the verification server 5 for verification. Request the certificate server 5 to register the device 7 (public key certificate transmission means).
検証サーバ 5は、登録要求情報を機器登録サーバ 6から受信し、これを用いて機器 登録データベースを更新する。  The verification server 5 receives the registration request information from the device registration server 6 and updates the device registration database using this information.
[0063] また、機器 7の販売側事業者は、機器 7の販売先の顧客から当該機器 7を接続する 顧客サーバ 4の指定を受けた後、当該顧客サーバ 4の顧客サーバ接続情報を機器 7 に対応させて検証サーバ 5に入力するようになっている。 [0063] Further, after receiving the designation of the customer server 4 to which the device 7 is connected from the customer to whom the device 7 is sold, the seller of the device 7 receives the customer server connection information of the customer server 4 from the customer 7 The data is input to the verification server 5 in correspondence with.
即ち、検証サーノ ¾は、登録要求情報に含まれる機器公開鍵を機器 7に対応づけ て機器登録データベースに記憶し (公開鍵記憶手段)、更に機器 7と顧客サーバ 4を 対応づけて機器登録データベースに記憶する (情報処理サーバ機器対応記憶手段 That is, the verification server stores the device public key included in the registration request information in the device registration database in association with the device 7 (public key storage means), and further associates the device 7 with the customer server 4 in the device registration database. (Information processing server device compatible storage means
) o ) o
[0064] (5) (出荷)  [0064] (5) (Shipping)
機器 7は、検証サーバ 5に登録された後、顧客に出荷される。機器 7は、出荷された 後は顧客の管理下におかれる。  The device 7 is shipped to the customer after being registered in the verification server 5. Equipment 7 is under customer control after it is shipped.
[0065] (6) (検証要求) [0065] (6) (Verification request)
機器 7は、出荷された後、設置担当者によってネットワーク 10に接続され、検証要 求プログラムが実行される。  After the equipment 7 is shipped, it is connected to the network 10 by the installer, and the verification request program is executed.
検証要求プログラムが実行されると、機器 7は、検証要求情報を生成する。そして、 機器 7は、 EEPROM25に記憶してある検証サーバ接続情報を用いて検証サーバ 5 に接続し (検証サーバ接続手段)、検証要求情報を送信する。  When the verification request program is executed, the device 7 generates verification request information. Then, the device 7 connects to the verification server 5 using the verification server connection information stored in the EEPROM 25 (verification server connection means), and transmits the verification request information.
[0066] 検証要求情報は、機器 、顧客サーバ 4から機器 7に接続するための機器接続情 報、環境情報 (ネットワーク接続環境に関する情報)などを機器秘密鍵でデジタル署 名したものを、検証サーバ公開鍵で暗号ィ匕したものである。 [0066] The verification request information is obtained by digitally signing the device connection information for connecting the device from the customer server 4 to the device 7 and the environment information (information on the network connection environment) with the device secret key. It is encrypted with the public key.
このように、機器 7は、ネットワーク 10に接続されると自身の機器接続情報を取得し ( 接続情報取得手段)、これを検証サーバ 5に送信する (接続情報送信手段)。これに 対し、検証サーバ 5は、これを受信する接続情報受信手段を備えている。  In this way, when the device 7 is connected to the network 10, it acquires its device connection information (connection information acquisition means) and transmits it to the verification server 5 (connection information transmission means). On the other hand, the verification server 5 is provided with connection information receiving means for receiving it.
また、検証要求情報は、機器秘密鍵でダイジェスト (所定の情報)を暗号ィ匕したデジ タル署名が含まれており、署名情報として機能する。このように機器 7は署名情報送 信手段を有している。 [0067] (7) (失効リストの参照) The verification request information includes a digital signature obtained by encrypting a digest (predetermined information) with a device private key, and functions as signature information. In this way, the device 7 has a signature information transmission means. [0067] (7) (Refer to revocation list)
検証サーバ 5は、機器 7から検証情報を受信すると (署名情報受信手段)、これを検 証サーバ秘密鍵で復号化する。そして、検証サーバ 5は、機器登録データベースか ら当該機器 7の機器公開鍵を取得し (公開鍵取得手段)、これを用いてデジタル署名 の正統性を確認することにより、機器 7が正統品であるカゝ否かを検証する (検証手段) 更に、図示しないが、検証サーバ 5は、当該機器 7が失効である力否かを CA3に問 Vヽ合わせて確認する (有効性検証手段)。  When the verification server 5 receives the verification information from the device 7 (signature information receiving means), it decrypts it with the verification server private key. Then, the verification server 5 acquires the device public key of the device 7 from the device registration database (public key acquisition means), and uses this to confirm the authenticity of the digital signature, so that the device 7 is an authentic product. (Verification means) Further, although not shown in the figure, the verification server 5 confirms with CA3 whether or not the device 7 is invalid (validity verification means).
(8) (検証結果の通知)  (8) (Notification of verification result)
当該機器 7が有効であった場合、検証サーノ 5は、機器登録データベースで当該 機器 7に対応づけられて 、る顧客サーバ接続情報を用いて顧客サーバ 4に検証結 果を送信する (検証結果送信手段)。  If the device 7 is valid, the verification sano 5 sends the verification result to the customer server 4 using the customer server connection information associated with the device 7 in the device registration database (send verification result). means).
検証結果は、例えば、機器 7の機器公開鍵証明書、機器 7への機器接続情報、検 証結果などを検証サーバ秘密鍵で暗号ィ匕したものである。このように、検証サーバ 5 は、機器 7への接続情報を顧客サーバ 4に送信する接続情報送信手段を備えて 、る  The verification result is, for example, the device public key certificate of the device 7, the device connection information to the device 7, the verification result, etc. encrypted with the verification server private key. As described above, the verification server 5 includes connection information transmitting means for transmitting connection information to the device 7 to the customer server 4.
[0068] 顧客サーバ 4は、検証結果を予め記憶した検証サーバ公開鍵で復号ィ匕することに より検証結果の正統性を確認することができる。あるいは、検証結果を検証サーバ 5 の検証サーバ秘密鍵でデジタル署名することにより正統性を保証してもよ ヽ。 [0068] The customer server 4 can confirm the legitimacy of the verification result by decrypting the verification result with the verification server public key stored in advance. Alternatively, legitimacy may be guaranteed by digitally signing the verification result with the verification server private key of verification server 5.
機器 7が失効であった場合は、機器 7にエラーメッセージを送信し、検証結果は顧 客サーバ 4に通知しない。または、検証サーバ 5が失効となった機器 7からの検証要 求があった旨の通知を顧客サーバ 4に行うように構成してもよ 、。  If the device 7 has expired, an error message is sent to the device 7, and the verification result is not notified to the customer server 4. Alternatively, it may be configured to notify the customer server 4 that there has been a verification request from the device 7 for which the verification server 5 has expired.
[0069] (9) (顧客サーバ情報の通知) [0069] (9) (Notification of customer server information)
顧客サーバ 4は、検証サーバ 5から検証結果を受信して (検証結果受信手段)、当 該機器 7が正統品であると検証されたことを確認した後、機器 7と接続して (接続手段 )顧客サーバ 4に顧客サーバ情報を送信する。  The customer server 4 receives the verification result from the verification server 5 (verification result receiving means), confirms that the device 7 is verified as a legitimate product, and then connects to the device 7 (connection means). ) Send customer server information to customer server 4.
顧客サーバ情報は、顧客サーバ公開鍵証明書や機器 7がネットワーク 10を介して 顧客サーバ 4に接続するための顧客サーバ接続情報などが含まれている。 [0070] なお、顧客サーノ と機器 7の接続は、顧客サーノ から機器 7に接続してもよ 、し 、あるいは、機器 7から顧客サーバ 4に接続してもよい。 The customer server information includes customer server public key certificate, customer server connection information for the device 7 to connect to the customer server 4 via the network 10, and the like. It should be noted that the connection between the customer sano and the device 7 may be connected from the customer sano to the device 7, or alternatively, the device 7 may be connected to the customer server 4.
前者の場合は、顧客サーバ 4が機器 7の接続情報を用いて機器 7に接続し、後者 の場合は、機器 7が検証要求の際に検証サーバ 5から顧客サーバ接続情報を受信し ておき、これを用いて顧客サーバ 4に接続するようにする。  In the former case, the customer server 4 connects to the device 7 using the connection information of the device 7, and in the latter case, the device 7 receives the customer server connection information from the verification server 5 at the time of the verification request. Use this to connect to the customer server 4.
[0071] (10) (機器 7と顧客サーバ 4の通信) [0071] (10) (Communication between device 7 and customer server 4)
機器 7は、顧客サーバ 4から送信された顧客サーバ公開鍵証明書 (CA秘密鍵でデ ジタル署名されて 、る)を予め記憶した CA公開鍵で検証し、顧客サーバ 4の正統性 を確認することができる。  The device 7 verifies the customer server 4's legitimacy by verifying the customer server public key certificate (digitally signed with the CA private key) transmitted from the customer server 4 with the pre-stored CA public key. be able to.
以降、機器 7と顧客サーバ 4は通信可能な状態となり、機器 7は計測データを顧客 サーバ公開鍵で暗号化して顧客サーバ 4に送信する。  Thereafter, the device 7 and the customer server 4 become communicable, and the device 7 encrypts the measurement data with the customer server public key and transmits it to the customer server 4.
計測データは顧客サーバ秘密鍵を有する顧客サーバ 4し力復号ィ匕できないため、 計測データの送信途上での漏洩を防止することができる。  Since the measurement data cannot be decrypted by the customer server having the customer server private key, it is possible to prevent leakage of the measurement data during transmission.
[0072] (11) (失効要求) [0072] (11) (Revocation request)
例えば、機器 7を新しい機器で置き換えるなどして機器 7が使用されなくなった場合 、顧客は、機器マスタで当該機器 7を失効にすると共に、 CA3に対して当該機器 7の 失効要求を行う。  For example, when the device 7 is no longer used due to replacement of the device 7 with a new device, the customer invalidates the device 7 in the device master and requests the CA 3 to revoke the device 7.
CA3の失効リストで機器 7を失効とすることにより、機器 7が他の場所に新たに設置 されたり、あるいは不正利用されることを防ぐことができる。  By revoking device 7 from the CA3 revocation list, it is possible to prevent device 7 from being newly installed or used illegally.
[0073] 以上に、機器 7を設置するまでの全体的な手順について説明した力 次に、フロー チャートを用いてこれらの手順にっ 、て詳細に説明する。 [0073] The above is a description of the overall procedure up to the installation of the device 7. Next, these procedures will be described in detail using a flow chart.
図 6は、機器 7を顧客に出荷するまでの手順を説明するためのフローチャートである 機器 7は、組み立てラインで組み立てられた後、機器登録部門に送られる。機器登 録部門では、当該機器 7を購入する顧客、機器 7を接続する顧客サーバ 4、当該機 器 7を割り当てる CA3などを予め把握して 、る。  FIG. 6 is a flowchart for explaining the procedure until the device 7 is shipped to the customer. The device 7 is assembled on the assembly line and then sent to the device registration department. In the device registration department, the customer who purchases the device 7, the customer server 4 to which the device 7 is connected, the CA 3 to which the device 7 is assigned, and the like are known in advance.
[0074] 作業担当者は、機器 7を CA3に接続して入力部 32を操作し、非対称暗号鍵生成 プログラムを CPU21に実行させる。 すると、 CPU21は、例えば、乱数を用いるなどして、機器 7に固有の非対称暗号鍵 ペアである機器秘密鍵と機器公開鍵を生成する (ステップ 5)。 [0074] The worker in charge connects the device 7 to CA3 and operates the input unit 32 to cause the CPU 21 to execute the asymmetric encryption key generation program. Then, the CPU 21 generates a device secret key and a device public key, which is an asymmetric encryption key pair unique to the device 7, using, for example, a random number (step 5).
なお、 CA3への接続は、機器秘密鍵と機器公開鍵を生成した後でもよい。  The connection to CA3 may be made after the device private key and device public key are generated.
[0075] CPU21は、生成した機器秘密鍵を EEPROM25内の所定エリアに格納する。そし て、 CPU21は、予め EEPROM25に記憶されている機器 IDゃ耐タンパ部 20の MA Cアドレスなどの機器 7に固有な機器固有情報を読み出し、これらを機器公開鍵と共 に機器登録サーバ 6に送信する (ステップ 10)。 The CPU 21 stores the generated device secret key in a predetermined area in the EEPROM 25. Then, the CPU 21 reads the device ID stored in the EEPROM 25 in advance and the device unique information unique to the device 7 such as the MAC address of the tamper resistant unit 20 and sends them to the device registration server 6 together with the device public key. Send (step 10).
検証サーノ 5は、機器 7から機器公開鍵や機器固有情報などを受信し、 CA3に送 信する (ステップ 13)。  Verification sano 5 receives the device public key, device unique information, etc. from device 7 and sends it to CA3 (step 13).
[0076] CA3は、機器登録サーバ 6から機器 7の機器公開鍵と機器固有情報を受信する( ステップ 15)。  [0076] CA3 receives the device public key and device specific information of device 7 from device registration server 6 (step 15).
そして、 CA3は、機器固有情報から機器 IDを抽出し、例えば、「機器公開鍵〇〇 〇は、機器 ID〇〇〇の機器公開鍵です。証明者は CA3です。」といった、機器公開 鍵、機器 ID、証明者、及びその他の例えば証明日時力もなるメッセージを生成する。 更に CA3は、メッセージカゝらダイジェストを生成し、これを CA秘密鍵で暗号化する ことによりデジタル署名する。  CA3 then extracts the device ID from the device-specific information. For example, “Device public key 00 is the device public key with device ID 00. The certifier is CA3.” Generate a device ID, certifier, and other messages that also have proof date power, for example. Furthermore, CA3 generates a digest from the message card and digitally signs it by encrypting it with the CA private key.
[0077] CA3は、メッセージとデジタル署名から機器公開鍵証明書を作成した後 (ステップ 2 0)、当該機器公開鍵証明書と検証サーバ公開鍵証明書を用いて機器証明書を生 成する (ステップ 25)。 [0077] CA3 creates a device public key certificate from the message and digital signature (step 20), and then generates a device certificate using the device public key certificate and the verification server public key certificate ( Step 25).
そして、 CA3は、生成した機器証明書を機器登録サーバ 6に送信する (ステップ 30 CA3 transmits the generated device certificate to the device registration server 6 (step 30).
) o ) o
機器登録サーバ 6は、 CA3から機器証明書を受信し、これに検証サーバ接続情報 を添付して機器 7に送信する (ステップ 33)。なお、検証サーバ接続情報は、機器証 明書とは別に送信してもよい。  The device registration server 6 receives the device certificate from CA3, and sends it to the device 7 with the verification server connection information attached thereto (step 33). The verification server connection information may be transmitted separately from the device certificate.
[0078] 機器 7は、機器証明書を受信し、これを耐タンパ部 20内の EEPROM25に記憶す る(ステップ 35)。 The device 7 receives the device certificate and stores it in the EEPROM 25 in the tamper resistant unit 20 (step 35).
EEPROM25内には、予め CA3の CA公開鍵証明書や親 CA2のルート証明書が 記憶されており、機器 7は、これらを用いて機器証明書の正統性を確認することがで きる。 The EEPROM 25 stores the CA public key certificate of CA3 and the root certificate of the parent CA2 in advance, and the device 7 can check the legitimacy of the device certificate using these. wear.
[0079] 一方、機器登録サーバ 6は、機器 7に機器証明書を送信した後、検証サーバ 5に機 器 ID、機器公開鍵証明書などカゝらなる登録要求情報を送信して、当該機器 7の機器 登録データベースへの登録要求を行う(ステップ 40)。  [0079] On the other hand, after transmitting the device certificate to the device 7, the device registration server 6 transmits the registration request information such as the device ID and the device public key certificate to the verification server 5, and transmits the device certificate. A registration request to the device registration database in step 7 is made (step 40).
この際、機器登録サーバ 6は、登録要求情報を機器登録サーバ秘密鍵でデジタル 署名して検証サーバ 5に送信し、検証サーバ 5が機器登録サーバ公開鍵で検証要 求情報の正統性を確認できるようにする。  At this time, the device registration server 6 digitally signs the registration request information with the device registration server private key and transmits it to the verification server 5, and the verification server 5 can confirm the legitimacy of the verification request information with the device registration server public key. Like that.
[0080] 検証サーバ 5は、機器登録サーバ 6が登録要求情報をデジタル署名し、これを検証 サーバ 5が確認することにより登録要求情報の正統性を確認する。 In the verification server 5, the device registration server 6 digitally signs the registration request information, and the verification server 5 confirms this to confirm the legitimacy of the registration request information.
検証サーバ 5は、機器登録サーバ公開鍵を用いて機器公開鍵証明書の正統性を 確認し、登録要求情報に含まれる顧客サーバ接続情報、機器 、機器公開鍵の対 応関係を機器登録データベースに登録する (ステップ 45)。  The verification server 5 checks the legitimacy of the device public key certificate using the device registration server public key, and stores the correspondence relationship between the customer server connection information, the device, and the device public key included in the registration request information in the device registration database. Register (step 45).
[0081] 以上により、機器 7の出荷前処理を完了し、機器秘密鍵と検証サーバ接続情報が 耐タンパ部 20に埋め込まれた機器 7が顧客に出荷される。 As described above, the pre-shipment processing of the device 7 is completed, and the device 7 in which the device secret key and the verification server connection information are embedded in the tamper resistant unit 20 is shipped to the customer.
一方、検証サーバ 5では、機器 7の検証に備えて、機器 7に関する情報が記憶され る。  On the other hand, the verification server 5 stores information related to the device 7 in preparation for the verification of the device 7.
なお、フローチャートには記さな力つた力 機器 7が接続すべき顧客サーノ の顧客 サーバ接続情報は、検証サーバ 5の機器登録データベースに別途入力される。  Note that the customer server connection information of customer sano to be connected to the device 7 to which the device 7 is not connected is input separately into the device registration database of the verification server 5.
[0082] 次に、図 7のフローチャートを用いて、機器 7を設置現場に設置して、ネットワーク 1 0を介して顧客サーバ 4に接続するまでの手順について説明する。 Next, a procedure from installing the device 7 at the installation site to connecting to the customer server 4 via the network 10 will be described using the flowchart of FIG.
機器 7は、顧客に出荷されると、顧客の事業計画に基づいて設置箇所に搬送され る。  When equipment 7 is shipped to the customer, it is transported to the installation site based on the customer's business plan.
設置担当者は現地に赴き、機器 7をネットワーク 10に接続して、検証要求プロダラ ムを起動する。  The person in charge of the installation goes to the site, connects the device 7 to the network 10 and starts the verification request program.
すると、機器 7は、ネットワーク 10上での自己の IPアドレスといった機器接続情報や 、例えば、ルータを介して接続されているなどの環境情報を収集する (ステップ 50)。  Then, the device 7 collects device connection information such as its own IP address on the network 10 and environmental information such as being connected via a router (step 50).
[0083] 次に、機器 7は、自己の機器 IDを EEPROM25から読み出し、これを先に収集した 機器接続情報や環境情報と共に機器秘密鍵でデジタル署名して検証要求情報を作 成する。 [0083] Next, the device 7 reads its own device ID from the EEPROM 25, and digitally signs it with the device private key together with the device connection information and environment information collected earlier, and creates verification request information. To do.
そして、機器 7は、検証要求情報を検証サーバ公開鍵で暗号ィ匕することにより暗号 化した検証要求情報を作成する。  Then, the device 7 creates the verification request information encrypted by encrypting the verification request information with the verification server public key.
次に、機器 7は、検証サーバ接続情報を用いて検証サーバ 5に接続し、暗号化した 検証要求情報を検証サーバ 5に送信し、自身の検証を検証サーバ 5に要求する (ス テツプ 55)。  Next, the device 7 connects to the verification server 5 using the verification server connection information, transmits the encrypted verification request information to the verification server 5, and requests its verification from the verification server 5 (step 55). .
[0084] 検証サーバ 5は、機器 7から暗号ィ匕した検証情報を受信し、これを予め記憶した検 証サーバ秘密鍵で復号化する。  The verification server 5 receives the verification information encrypted from the device 7 and decrypts it with the verification server private key stored in advance.
検証サーバ秘密鍵は検証サーバ 5しか有して 、な 、ため、暗号化した検証情報は 送信途上で他者に渡ったとしても復号ィ匕することはできない。  Since the verification server private key has only the verification server 5, the encrypted verification information cannot be decrypted even if it is transmitted to another party during transmission.
次に、検証サーバ 5は、検証要求情報に含まれる機器 IDを機器登録データベース で検索し、当該機器 IDに対応づけられて ヽる機器公開鍵を取得する。  Next, the verification server 5 searches the device registration database for the device ID included in the verification request information, and obtains the device public key associated with the device ID.
[0085] 次に、検証サーバ 5は、この機器公開鍵を用いてデジタル署名を確認し、検証情報 の正統性を確認する (ステップ 60)。 Next, the verification server 5 confirms the digital signature using the device public key and confirms the authenticity of the verification information (step 60).
より詳細には、検証サーバ 5は検証要求情報力 ダイジェストを生成すると共にデジ タル署名を機器公開鍵で復号ィ匕してダイジェストを復元し、両者が一致することをも つて検証要求情報が正統であると確認する。  More specifically, the verification server 5 generates a verification request information power digest, decrypts the digital signature with the device public key, restores the digest, and the verification request information is legitimate because both match. Confirm that there is.
両者が一致しない場合、検証サーバ 5は、機器 7が正統でないとしてエラーメッセ一 ジを機器7に送信する。 If they do not match, the verification server 5, device 7 transmits an error message one di to the device 7 as unorthodox.
[0086] 検証サーバ 5は、機器 7の正統性を確認した後、当該機器 7の機器 IDなどを図示し な!ヽ CA3に送信し、当該機器 7の失効の有無を問 、合わせる。  [0086] After confirming the legitimacy of the device 7, the verification server 5 sends the device ID of the device 7 to the CA3, not shown, and asks whether the device 7 has expired or not.
そして、検証サーバ 5は、機器 7の失効の有無を CA3から受信し、これによつて機 器 7の有効性を確認する (ステップ 65)。  Then, the verification server 5 receives from the CA 3 whether or not the device 7 has expired, and confirms the validity of the device 7 based on this (step 65).
当該機器7が有効である場合、検証サーノ 5は、機器 7の機器 ID、接続情報、正統 であるとの検証結果、接続環境などを検証サーバ秘密鍵でデジタル署名し、検証結 果を作成する (ステップ 70)。 If the device 7 is valid, the verification Sano 5 digitally signs the device ID, connection information, verification result of authenticity of the device 7, the connection environment, etc. with the verification server private key, and creates a verification result. (Step 70).
[0087] 次に、検証サーバ 5は、機器 7の機器 IDを機器登録データベースで検索し、当該 機器 7に対応づけられている顧客サーバ 4の顧客サーバ接続情報を取得する。 そして、検証サーバ 5は、これを用いて顧客サーバ 4に接続し、検証結果を送信す る(ステップ 75)。 Next, the verification server 5 searches the device registration database for the device ID of the device 7, and acquires the customer server connection information of the customer server 4 associated with the device 7. Then, the verification server 5 uses this to connect to the customer server 4 and transmits the verification result (step 75).
一方、当該機器 7が機器登録データベースで失効となっていた場合、検証サーバ 5 は、エラーメッセージを機器 7に送信し、顧客サーバ 4へは検証結果を送信しない。 なお、検証されな力つた旨の通知を顧客サーバ 4に送信するように構成することもで きる。  On the other hand, if the device 7 has expired in the device registration database, the verification server 5 transmits an error message to the device 7 and does not transmit the verification result to the customer server 4. It can be configured to send a notification to the customer server 4 that the verification has been made.
[0088] 顧客サーバ 4は、検証サーバ 5から検証結果を受信し、これを予め記憶してある検 証サーバ公開鍵で復号ィ匕することにより検証サーバ 5の正統性を検証する (ステップ 85)。  [0088] The customer server 4 receives the verification result from the verification server 5, and verifies the legitimacy of the verification server 5 by decrypting it with the verification server public key stored in advance (step 85). .
即ち、検証結果を検証サーバ秘密鍵でデジタル署名できるのは検証サーバ 5だけ であるので、検証結果を検証サーバ公開鍵で復号ィ匕できることにより検証サーバ 5の 正統性を検証することができる。  That is, since only the verification server 5 can digitally sign the verification result with the verification server private key, the authenticity of the verification server 5 can be verified by decrypting the verification result with the verification server public key.
なお、検証結果は、サーバ秘密鍵でデジタル署名し、これを顧客サーバ 4で検証す るように構成してちょい。  The verification result should be configured to be digitally signed with the server private key and verified on the customer server 4.
[0089] 顧客サーバ 4は、検証サーバ 5の正統性を確認した後、検証結果に含まれる機器 I D、機器公開鍵、機器接続情報などを機器マスタに記憶し、機器 7を顧客サーバ 4の 正統な計測機器として登録する。 [0089] After confirming the authenticity of the verification server 5, the customer server 4 stores the device ID, device public key, device connection information, etc. included in the verification result in the device master, and stores the device 7 in the authenticity of the customer server 4. To register as a measuring instrument.
一方、顧客サーバ 4は、正統性が確認できな力つた場合、エラーメッセージを検証 サーバ 5に送信する。  On the other hand, the customer server 4 transmits an error message to the verification server 5 when the legitimacy cannot be confirmed.
[0090] 次に、顧客サーバ 4は、機器マスタに登録した機器接続情報を用いて機器 7に接続 し、顧客サーバ情報を送信する (ステップ 90)。  [0090] Next, the customer server 4 connects to the device 7 using the device connection information registered in the device master, and transmits the customer server information (step 90).
顧客サーバ情報には、公開鍵証明書 (CA公開鍵でデジタル署名された顧客サー バ公開鍵証明書)や、 URLや IPアドレスなど力 なる顧客サーバ 4への接続情報が 含まれている。  The customer server information includes public key certificates (customer server public key certificates digitally signed with a CA public key) and connection information to the powerful customer server 4 such as URL and IP address.
[0091] 機器 7は、顧客サーバ 4から顧客サーバ情報を受信すると、 CA公開鍵を用いて顧 客サーバ公開鍵証明書のデジタル署名を検証し、顧客サーバ 4の正統性を確認す る。  [0091] Upon receiving the customer server information from the customer server 4, the device 7 verifies the digital signature of the customer server public key certificate using the CA public key and confirms the legitimacy of the customer server 4.
そして、機器 7は、顧客サーバ接続情報を EEPROM25に記憶し、顧客サーバ 4に 接続する際に用いる。 The device 7 stores the customer server connection information in the EEPROM 25 and stores it in the customer server 4. Used when connecting.
以後、顧客サーノ と機器 7は通信可能となり (ステップ 95)、機器 7は計測値を顧 客サーバ 4に送信することができる。この際、機器 7は、計測値を顧客サーバ公開鍵 で暗号ィ匕して顧客サーバ 4に送信することにより、計測値の漏洩を防止する。  Thereafter, the customer Sano and the device 7 can communicate with each other (step 95), and the device 7 can transmit the measurement value to the customer server 4. At this time, the device 7 prevents leakage of the measured value by encrypting the measured value with the customer server public key and transmitting it to the customer server 4.
[0092] 以上の例では、顧客サーバ 4から機器 7に接続したが、機器 7から顧客サーバ 4に 接続するよう〖こ構成することもできる。 In the above example, the customer server 4 is connected to the device 7, but the device 7 can be configured to connect to the customer server 4.
この場合、検証サーバ 5は、顧客サーバ 4に検証結果を送信した後 (ステップ 75)、 顧客サーバ 4から機器 7を登録した旨の通知を受ける。  In this case, the verification server 5 transmits a verification result to the customer server 4 (step 75), and then receives a notification that the device 7 has been registered from the customer server 4.
検証サーバ 5は、このようにして機器 7が登録されたことを確認した後、顧客サーバ 接続情報を機器 7に送信する (ステップ 80)。  After verifying that the device 7 has been registered in this way, the verification server 5 transmits the customer server connection information to the device 7 (step 80).
機器 7は、検証サーバ 5から顧客サーバ接続情報を受信し、これを用いて顧客サー バ 4に接続する。  The device 7 receives the customer server connection information from the verification server 5 and uses this information to connect to the customer server 4.
以後、顧客サーバ 4と機器 7は通信可能となる (ステップ 95)。  Thereafter, the customer server 4 and the device 7 can communicate (step 95).
[0093] 以上に説明した情報処理システム 1では、機器 7の有効性を CA3の失効リストで管 理したが、失効リストのコピーを検証サーバ 5で管理するように構成することもできる。 この場合、例えば、 1日 1回程度、ノ ツチ処理にて検証サーバ 5の機器登録データ ベースを CA3の失効リストに同期させる。 In the information processing system 1 described above, the validity of the device 7 is managed by the revocation list of the CA3, but a copy of the revocation list can be managed by the verification server 5. In this case, for example, the device registration database of the verification server 5 is synchronized with the revocation list of CA3 by notch processing once a day.
そして、機器 7の検証の際に、検証サーバ 5の機器登録データベースで機器 7が失 効であった場合、(失効になったものが有効になることはないので)検証サーバ 5は C A3に問い合わせを行わなくても、当該機器 7が失効であることを確認することができ る。  If the device 7 is invalidated in the device registration database of the verification server 5 when the device 7 is verified, the verification server 5 will change to CA3 (since the invalidated item will not be valid). Even without making an inquiry, it can be confirmed that the device 7 has expired.
そのため、検証サーバ 5は、自己の機器登録データベースで機器 7が有効であった 場合に CA3に失効の有無を問い合わせればよい。この場合、前回バッチ処理を行つ た後、失効となった機器 7が失効として CA3から検証サーバ 5に通知される。  For this reason, the verification server 5 may inquire CA3 about whether or not it has expired when the device 7 is valid in its device registration database. In this case, after the previous batch processing, the device 7 that has become invalid is notified from the CA 3 to the verification server 5 as invalid.
このように、失効リストのコピーを用いることにより CA3への問 、合わせ回数を減ら すことができ、 CA3の負荷を低減することができる。  In this way, by using a copy of the revocation list, the number of questions to CA3 and the number of matches can be reduced, and the load on CA3 can be reduced.
[0094] また、本実施の形態では、 CA3、機器登録サーバ 6及び検証サーバ 5を別のサー ノ《として構成したが、 1台のサーバで両者の機能を発揮するように構成することもでき る。 [0094] In the present embodiment, CA3, device registration server 6 and verification server 5 are configured as separate servos <<, but a single server can be configured to exhibit both functions. The
例えば、検証サーバ 5と機器登録サーノ 6の機能を備えたサーバと CA3、機器登 録サーバ 6と CA3の機能を備えたサーノと検証サーバ 5、検証サーバ 5と CA3の機 能を備えたサーバと機器登録サーバ 6、あるいは、 CA3、検証サーバ 5、機器登録サ ーバ 6の機能を備えたサーバを構成することもできる。これらの場合、サーバのメンテ ナンス作業などを軽減することができる。  For example, a server and CA3 that have the functions of the verification server 5 and the device registration Sano 6, a Sano and verification server 5 that has the functions of the device registration server 6 and CA3, and a server that has the functions of the verification server 5 and CA3. A device registration server 6 or a server having the functions of CA3, verification server 5, and device registration server 6 can be configured. In these cases, server maintenance work can be reduced.
[0095] 以上に説明した本実施の形態により次のような効果を得ることができる。 The following effects can be obtained by the present embodiment described above.
(1)耐タンパ部 20内で非対称鍵のペア (機器秘密鍵、機器公開鍵)を生成すること により、機器 7に機器秘密鍵を外部力 秘匿して記憶させることができる。  (1) By generating a pair of asymmetric keys (device secret key, device public key) in the tamper resistant unit 20, the device secret key can be stored in the device 7 while keeping it secret.
(2)機器公開鍵を用いて機器 7が機器秘密鍵を記憶していることを確認することによ り機器 7が正統な機器であることを検証することができる。  (2) It is possible to verify that the device 7 is a legitimate device by confirming that the device 7 stores the device secret key using the device public key.
(3)機器 7と顧客サーバ 4を接続する際に、機器 7の正統性を検証サーバ 5で検証す ることにより、顧客サーバ 4に対して機器 7が正統な機器であることを保証することが できる。  (3) When connecting the device 7 and the customer server 4, the verification of the authenticity of the device 7 by the verification server 5 ensures that the device 7 is a legitimate device to the customer server 4. Is possible.
(4)検証サーバの接続情報を予め機器 7に記憶させておくことにより、機器 7の接続 環境にかかわらず、機器 7を検証サーバ 5に接続することができる。  (4) By storing the connection information of the verification server in the device 7 in advance, the device 7 can be connected to the verification server 5 regardless of the connection environment of the device 7.
(5)失効となった機器 7を失効リストで管理することにより、失効になった機器 7と顧客 サーバ 4の接続を防止することができる。  (5) By managing the revoked device 7 using the revocation list, it is possible to prevent the revoked device 7 from being connected to the customer server 4.
(6)機器 7の検証をネットワーク 10を介して自動的に行うため、機器 7の設置現場に 高度な技術を有する技術者を派遣する必要がな ヽ。  (6) In order to automatically verify the device 7 via the network 10, it is necessary to dispatch a highly skilled engineer to the installation site of the device 7.
[0096] [機器の運用]  [0096] [Device operation]
次に、情報処理システム 1に機器 7を設置した後の運用について説明する。  Next, an operation after the device 7 is installed in the information processing system 1 will be described.
図 8は、情報処理システム 1で機器 7の運用に関係するものを示したブロック図であ る。図 1で示した検証サーバ 5、 CA3、親 CA2は、機器 7の設置が完了すると機能を 終えるため図 8には示して!/、な!/、。  FIG. 8 is a block diagram showing information processing system 1 related to the operation of device 7. The verification server 5, CA3, and parent CA2 shown in Fig. 1 are shown in Fig. 8 because they finish their functions when installation of the device 7 is completed.
また、機器 7の運用を開始すると監査サーバと標準電波送信装置が関係してくるた め、図 8には、監査サーバ 12、標準電波送信装置 11が図示されている。  Further, since the audit server and the standard radio wave transmitter are related when the operation of the device 7 is started, the audit server 12 and the standard radio wave transmitter 11 are shown in FIG.
[0097] 機器 7は、内部クロック 22の計測する時刻によって計測値にタイムスタンプを発行 するタイムスタンプ機會を有して ヽる。 [0097] Device 7 issues a time stamp to the measured value according to the time measured by internal clock 22 I have a time stamp machine to do.
また、機器 7は、標準電波送信装置 11が送信する標準電波を受信するための装置 を備えており、後述するように、標準電波で外部クロック 28 (図 2)を更正し、更に外部 クロック 28を用いて内部クロック 22を更正する。  In addition, the device 7 includes a device for receiving the standard radio wave transmitted by the standard radio wave transmitter 11. As will be described later, the external clock 28 (FIG. 2) is corrected with the standard radio wave, and the external clock 28 is further corrected. Use to correct internal clock 22.
なお、本実施の形態では、標準電波によって内部クロック 22を更正するが、これに 限定するものではなぐ例えば、 GPSで配信される時刻や無線通信のプロトコルに含 まれる時刻を用いることも可能であり、あるいは、時刻配信サーバの配信時刻を有線 や無線にて機器 7に供給するように構成することも可能である。  In this embodiment, the internal clock 22 is corrected by the standard radio wave, but the present invention is not limited to this. For example, it is possible to use a time distributed by GPS or a time included in a wireless communication protocol. Alternatively, it is possible to supply the device 7 with the distribution time of the time distribution server by wire or wireless.
[0098] 監査サーバ 12は、監査局が運用するサーバであって、機器 7の内部クロック 22を 監査する。 The audit server 12 is a server operated by the audit bureau and audits the internal clock 22 of the device 7.
一般に、監査局は、機器 7を運用する顧客とは第三者である事業体が運用している 。そのため、顧客が監査サーバ 12の運用者と共謀してタイムスタンプのバックデイト を行うことが事実上不可能になり、極めて高いセキュリティレベルを実現することがで きる。  In general, the audit bureau is operated by an entity that is a third party with the customer who operates the equipment7. This makes it virtually impossible for customers to collaborate with the operator of the audit server 12 and perform time stamp backdates, thus achieving an extremely high level of security.
[0099] 監査サーバ 12は、原子時計と監査用秘密鍵を備えており、原子時計による基準時 刻を監査用秘密鍵でデジタル署名して時刻証明書を作成し、これを機器 7に送信す る。  [0099] The audit server 12 includes an atomic clock and an audit private key, and creates a time certificate by digitally signing the reference time of the atomic clock with the audit private key, and transmits the time certificate to the device 7. The
機器 7は、この時刻証明書を用いて内部クロック 22が正しい時刻を出力しているか 否かを確認し、正しい時刻を出力していない場合は、タイムスタンプの発行を停止す るようになっている。このように、監査サーバ 12は、機器 7に基準時刻を送信すること により時刻監査を行うことができる。  The device 7 uses this time certificate to check whether or not the internal clock 22 is outputting the correct time. If the correct time is not output, the device 7 stops issuing the time stamp. Yes. In this way, the audit server 12 can perform time auditing by transmitting the reference time to the device 7.
[0100] 標準電波送信装置 11は、標準電波局が運用し、時刻情報を含む標準電波を不特 定多数の受信装置に送信する送信装置である。 [0100] The standard radio wave transmitter 11 is a transmitter that is operated by a standard radio station and transmits standard radio waves including time information to an unspecified number of receivers.
機器 7は、標準電波送信装置 11が送信する標準電波を受信し、これを用いて (外 部クロック 28を介して)内部クロック 22を更正する。  The device 7 receives the standard radio wave transmitted by the standard radio wave transmitter 11, and uses this to correct the internal clock 22 (via the external clock 28).
顧客サーバ 4は、機器 7からタイムスタンプが付与された計測データを受信し、計測 値データベースに記憶する。  The customer server 4 receives the measurement data with the time stamp from the device 7 and stores it in the measurement value database.
[0101] 図 9は、機器 7、監査サーバ 12、及び顧客サーバ 4の関係を説明するための図であ る。 [0101] FIG. 9 is a diagram for explaining the relationship among the device 7, the audit server 12, and the customer server 4. The
監査サーバ 12は、時刻証明書に記載する時刻を計測するための原子時計を備え 、更に監査用秘密鍵を記憶している。 The audit server 12 includes an atomic clock for measuring the time described in the time certificate, and further stores an audit secret key.
監査サーバ 12が機器 7に送信する時刻証明書には、基準時刻、制限時間、シリア ル番号、固有情報、デジタル署名などが含まれている。 The time certificate transmitted from the audit server 12 to the device 7 includes a reference time, a time limit, a serial number, unique information, a digital signature, and the like.
基準時刻は、原子時計が計測した時刻を用いて構成された時刻であり、原子時計 の現在時刻をそのまま用いてもよいし、あるいは、通信の遅延が問題になる場合は、 遅延時間で健在時刻を補正した値を用いるなど、何らかの補正を施した値を用いて ちょい。  The reference time is the time constructed using the time measured by the atomic clock, and the current time of the atomic clock may be used as it is, or if communication delay is a problem, the time of alive is the delay time. Use a value that has been corrected in some way, such as using a corrected value.
[0102] 制限時間は、時刻証明書に記録してある基準時刻の有効期限である。即ち、時刻 証明書に記してある基準時刻で監査した内部クロック 22の出力時刻は、この制限時 間の間、監査局により精度が保証される。  [0102] The time limit is the expiration date of the reference time recorded in the time certificate. That is, the accuracy of the output time of the internal clock 22 audited at the reference time indicated on the time certificate is guaranteed by the auditing bureau during this time limit.
機器 7は、この制限時間の範囲内でタイムスタンプを発行することができ、このタイム スタンプを発行できる時間を活性ィ匕時間と呼ぶ。  The device 7 can issue a time stamp within this time limit, and the time during which this time stamp can be issued is called the active time.
[0103] シリアル番号は、監査サーバ 12が発行順に付与する時刻証明書の番号であるが、 連番を発行すると、外部から推測が容易になる可能性があることから、本実施の形態 では、シリアル番号を乱数により構成した。 [0103] The serial number is the number of the time certificate assigned by the audit server 12 in the order of issue. However, if the serial number is issued, it may be easy to guess from the outside. The serial number was composed of random numbers.
固有情報は、例えば、耐タンパ部 20の HD情報など、機器 7のハードウェアに固有な 情報である。固有情報が一致しない場合、耐タンパ部 20はエラーを発する。  The unique information is information unique to the hardware of the device 7, such as HD information of the tamper resistant unit 20, for example. If the unique information does not match, the tamper resistant part 20 issues an error.
[0104] なお、これらの項目のほかに、時刻証明書の有効期限や、時刻証明書の正当性が 確認された後、機器 7と監査サーバ 12の間の通信の共通鍵なども時刻証明書に含 めることができる。 [0104] In addition to these items, the expiration date of the time certificate and the common key for communication between the device 7 and the audit server 12 after the validity of the time certificate is confirmed are also included in the time certificate. Can be included.
[0105] デジタル署名は、メッセージのダイジェストを監査用秘密鍵で暗号ィ匕したものである ここで、メッセージは、現在時刻、制限時間、シリアル番号、固有情報など、改竄を 防止する情報であり、ダイジェストはメッセージをハッシュ関数によって演算したハツ シュ値である。  [0105] The digital signature is a message digest encrypted with a private key for audit. Here, the message is information that prevents tampering, such as the current time, time limit, serial number, and unique information. A digest is a hash value obtained by computing a message using a hash function.
時刻証明書の受信者は、メッセージカゝらダイジェストを作成し、更に、デジタル署名 を監査用公開鍵で復号ィ匕してダイジェストを復元する。そして、両者の一致によって 時刻証明書の内容が改竄されて ヽな ヽことを確認することができる。 The recipient of the time certificate creates a digest from the message catalog, and then the digital signature The digest is restored with the audit public key. Then, it is possible to confirm that the contents of the time certificate have been tampered with by agreement between the two.
[0106] 機器 7は、耐タンパ部 20に、先に説明した機器秘密鍵、内部クロック 22のほかに、 監査用秘密鍵と対をなす監査用公開鍵を EEPROM25に記憶すると共にモード切 替部 51を有している。  [0106] In addition to the device secret key and the internal clock 22 described above, the device 7 stores the audit public key paired with the audit secret key in the EEPROM 25 and the mode switching unit. 51.
モード切替部 51は、出荷時に EEPROM25に予め記憶されたタイムスタンププロ グラムを CPU21で実行することにより構成されたものである。  The mode switching unit 51 is configured by causing the CPU 21 to execute a time stamp program stored in advance in the EEPROM 25 at the time of shipment.
また、 EEPROM25には、直近の過去に監査サーバ 12から受信した時刻証明書で ある前回証明書が記憶されている。  Further, the EEPROM 25 stores the previous certificate that is the time certificate received from the audit server 12 in the last past.
図 2では、通信部 26を計測部 35に含めて示した力 ここでは理解を容易にするた め通信部 26を計測部 35の外に図示して 、る。  In FIG. 2, the force shown by including the communication unit 26 in the measurement unit 35. Here, the communication unit 26 is illustrated outside the measurement unit 35 for easy understanding.
[0107] 監査用公開鍵は、監査サーバ 12から送信されてくる時刻証明書に付随するデジタ ル署名を復号ィ匕するための公開鍵情報である。 The audit public key is public key information for decrypting the digital signature attached to the time certificate transmitted from the audit server 12.
耐タンパ部 20は、監査用公開鍵を用いて時刻証明書の正統性を確認することがで き、基準時刻の有効性を確認する。  The tamper resistant part 20 can confirm the legitimacy of the time certificate using the audit public key and confirm the validity of the reference time.
[0108] 機器秘密鍵は、顧客サーバ 4に送信する計測データをデジタル署名するのに用い る。 [0108] The device private key is used to digitally sign measurement data to be transmitted to the customer server 4.
ここで、メッセージとして用いられる情報は、計測値、機器 、計測時刻などであり、 これらのダイジェストを機器秘密鍵でデジタル署名することによりタイムスタンプが構 成されている。  Here, information used as a message is a measurement value, device, measurement time, and the like, and a time stamp is formed by digitally signing these digests with a device private key.
なお、ダイジェストを生成せずに、メッセージをそのままデジタル署名してもよい。  The message may be digitally signed as it is without generating a digest.
[0109] 内部クロック 22は、計測値に計測時刻を付与する。即ち、耐タンパ部 20が計測部 3 5から計測値を取得した時刻を内部クロック 22で計測し、この時刻を計測時刻とする 内部クロック 22は、耐タンパ部 20の内部に構成されるという制約があるため、高精 度の時計装置で構成することが困難である。一方、外部クロック 28は精度が高ぐ標 準電波によって常に更正されている。そこで、耐タンパ部 20は、外部クロック 28 (図 2 )を適宜参照して内部クロック 22を更正する。 [0110] ここで、内部クロック 22の更正について図 10を用いてより詳細に説明する。 The internal clock 22 gives a measurement time to the measurement value. That is, the time when the tamper resistant unit 20 acquires the measurement value from the measuring unit 35 is measured by the internal clock 22, and the internal clock 22 having this time as the measurement time is configured inside the tamper resistant unit 20. Therefore, it is difficult to configure with a highly accurate clock device. On the other hand, the external clock 28 is constantly corrected by a standard radio wave with high accuracy. Therefore, the tamper resistant unit 20 corrects the internal clock 22 with reference to the external clock 28 (FIG. 2) as appropriate. Here, the correction of the internal clock 22 will be described in more detail with reference to FIG.
図 10は、内部クロック 22が計測する時刻の一例を示しており、一例として「2005年 Fig. 10 shows an example of the time measured by the internal clock 22.
3月 30日 15時 30分 20秒 2百ミリ秒」となっている。このように内部クロック 22は時刻を 百ミリ秒単位で計測して 、る。 March 30th, 15:30, 20 seconds, 2 hundred milliseconds ". Thus, the internal clock 22 measures the time in units of 100 milliseconds.
耐タンパ部 20は、内部クロック 22の時刻を分以上の部分 (以下、時刻ラベルと呼ぶ The tamper resistant part 20 is a part of the time of the internal clock 22 or more (hereinafter referred to as a time label).
)と秒単位に区分して管理しており、時刻監査は時刻ラベルに対して行い、時刻の更 正は秒単位に対して行う。 ) And seconds, and the time audit is performed on the time label, and the time is adjusted on the second unit.
[0111] このため、内部クロック 22の時刻のうち、セキュリティを要する部分(時刻ラベル)に ついては改竄を行うことができず、セキュリティを高めることができる。また、品質を提 供する部分 (秒単位)は、標準電波によって高精度に更正される。 [0111] For this reason, of the time of the internal clock 22, the portion (time label) requiring security cannot be tampered with, and security can be improved. The part that provides quality (in seconds) is corrected with high accuracy by standard radio waves.
一般に、内部クロック 22は、更正しなくても数ケ月間程度は 1分以内の精度を維持 できるので、顧客は、その間に機器 7を設置して内部クロック 22の秒単位の更正を行 うことにより内部クロック 22の更正を行うことができる。  In general, the accuracy of the internal clock 22 can be maintained within 1 minute for several months without correction, so the customer should install the device 7 in the meantime and perform the correction of the internal clock 22 in seconds. The internal clock 22 can be corrected by this.
[0112] なお、本実施の形態では、一例として秒単位を境としてセキュリティに関係する部分 と品質保証に関係する部分に時刻を区分したが、これに限定するものではなぐ計測 対象などに応じて、更に大きい単位、あるいは小さい単位で区分することも可能であ る。 [0112] In this embodiment, as an example, the time is divided into a part related to security and a part related to quality assurance with a second unit as a boundary. However, the time is not limited to this. It is also possible to classify by larger units or smaller units.
即ち、例えば、タイムスタンプで 1秒単位まで正確な時刻が必要な場合は、 1秒以 上の部分を監査サーバ 12で監査し、 999ミリ秒以下の時刻を標準電波で更正する。  In other words, for example, if an accurate time is required up to 1 second with a time stamp, the audit server 12 audits the part longer than 1 second and corrects the time less than 999 milliseconds with the standard radio wave.
[0113] 図 9に戻り、前回証明書は、前回の時刻監査の際に監査サーバ 12から送られてき て使用した時刻証明書を EEPROM25に記憶しておいたものである。 [0113] Returning to FIG. 9, the last certificate is the one in which the time certificate sent from the audit server 12 and used in the previous time audit is stored in the EEPROM 25.
耐タンパ部 20は、監査サーバ 12から送信されてきた時刻証明書の基準時刻を確 認する際に、この基準時刻が前回に監査サーバ 12から受信した基準時刻よりも後で あることを確認する。  When the tamper resistant part 20 checks the reference time of the time certificate transmitted from the audit server 12, it confirms that this reference time is later than the reference time received from the audit server 12 last time. .
[0114] タイムスタンプにおいて、最も防がなくてはならないことは、改竄などによりバックデ イト (過去の時刻を出力させること)された時刻でタイムスタンプを発行することである そのため、耐タンパ部 20は、監査サーバ 12から送信されてきた基準時刻が前回に 監査を行った時刻(前回証明書に記載されている時刻)よりも後であることを確認する [0114] In the time stamp, the most important thing to prevent is to issue a time stamp at the time of back date (to output the past time) due to tampering, etc. The reference time sent from the audit server 12 Confirm that it is later than the time when the audit was performed (the time indicated in the previous certificate)
[0115] そして、監査サーバ 12から送信されてきた基準時刻が前回証明書に記載された時 刻よりも前である場合は、エラーメッセージを発するなどして監査モード (後述)で停 止し、タイムスタンプの発行を行わない。 [0115] If the reference time transmitted from the audit server 12 is earlier than the time described in the previous certificate, it stops in the audit mode (described later) by issuing an error message, etc. Do not issue time stamps.
[0116] このように前回の基準時刻を記憶しておき、監査に用いる基準時刻がこれよりも後 の時刻であることを確認することにより、ノ ックデイトされた時刻でタイムスタンプが発 行されるのを防止することができる。 [0116] By storing the previous reference time in this way and confirming that the reference time used for the audit is later, a time stamp is issued at the knocked time. Can be prevented.
なお、工場出荷時に、デフォルトの前回証明書を EEPROM25に記憶させておく。  Note that the default previous certificate is stored in the EEPROM 25 at the time of factory shipment.
[0117] モード切替部 51は、耐タンパ部 20のタイムスタンプ機能に関する動作モードを順 次切り替える機能部である。 The mode switching unit 51 is a functional unit that sequentially switches operation modes related to the time stamp function of the tamper resistant unit 20.
耐タンパ部 20が行う動作モードには、監査モード、同期モード、スタンプモードがあ る。  The operation mode performed by the tamper resistant unit 20 includes an audit mode, a synchronization mode, and a stamp mode.
これらの各動作モードはそれぞれ独立したモジュールが行 、、モジュール間の干 渉が生じな 、ようにしてある。  Each of these modes of operation is performed by independent modules so that no interference occurs between the modules.
[0118] 監査モードは、監査サーバ 12から送信されてきた基準時刻を用いて内部クロック 2 2の時刻ラベルが正しいことを監査する動作モードである。 The audit mode is an operation mode for auditing that the time label of the internal clock 22 is correct using the reference time transmitted from the audit server 12.
同期モードは、標準電波送信装置 11から標準電波により配信される時刻を用いて 内部クロック 22の秒単位の部分を正確な時刻に同期させる(即ち、更正する)動作モ ードである。  The synchronization mode is an operation mode that synchronizes (that is, corrects) the second clock portion of the internal clock 22 with an accurate time using the time distributed from the standard radio wave transmitter 11 by the standard radio wave.
スタンプモードは、計測部 35が計測した計測値に対してタイムスタンプを発行する 動作モードである。  The stamp mode is an operation mode in which a time stamp is issued for the measurement value measured by the measurement unit 35.
[0119] モード切替部 51は、耐タンパ部 20の動作モードを、図 11に示したように、監査モ 一ド→同期モード→スタンプモード→監査モード→· · ·、といったように、所定の順序 にて順次切り替えていく。  [0119] As shown in Fig. 11, the mode switching unit 51 sets the operation mode of the tamper resistant unit 20 to a predetermined value such as audit mode-> synchronous mode-> stamp mode-> audit mode -... Switch sequentially in order.
これらのモードのうち、監査モードとスタンプモードは、時刻ラベルを扱うため、高い セキュリティを要する動作モードであり(セキュリティモード)、一方、同期モードは秒単 位を扱うため、高 、セキュリティが必ずしも必要な 、動作モード(一般モード)である。 [0120] そして、モード切替部 51は、現在動作中の動作モードが完了するまでは耐タンパ 部 20を次の動作モードに切り替えな 、。 Among these modes, audit mode and stamp mode are operation modes that require high security because they handle time labels (security mode). On the other hand, synchronization mode handles seconds, so high security is always necessary. The operation mode (general mode). [0120] The mode switching unit 51 does not switch the tamper resistant unit 20 to the next operation mode until the currently operating mode is completed.
そのため、スタンプモードで動作するためには、監査モードと同期モードが完了して いることが必要となり、耐タンパ部 20は、監査、同期された時刻にてタイムスタンプを 発行することができる。  Therefore, in order to operate in the stamp mode, the audit mode and the synchronization mode must be completed, and the tamper resistant unit 20 can issue a time stamp at the audited and synchronized time.
また、耐タンパ部 20は、監査モード、同期モードの少なくとも一方でエラーが発生し た場合に、タイムスタンプの発行を停止することができる。  Further, the tamper resistant unit 20 can stop issuing the time stamp when an error occurs in at least one of the audit mode and the synchronous mode.
[0121] このように、耐タンパ部 20は、セキュリティモードと一般モードを切り替えて動作する ことにより、高 、セキュリティの必要な処理と高 、セキュリティの必要のな 、処理を同 時に行うことを防止して 、る。 [0121] In this way, the tamper resistant unit 20 operates by switching between the security mode and the general mode, thereby preventing high-security processing and high-security processing from being performed simultaneously. And then.
し力も、各動作モードは独立したモジュールにて動作するため、耐タンパ部 20は、 セキュリティモードでの処理と一般モードでの処理が耐タンパ部 20内で干渉すること を防ぐことができ、クラッキングなどの不正アクセスに対して高 、耐性を備えて 、る。  However, since each operation mode operates with an independent module, the tamper resistant part 20 can prevent the processing in the security mode and the general mode from interfering with each other in the tamper resistant part 20. High resistance to unauthorized access such as
[0122] なお、耐タンパ部 20では、セキュリティモードを監査モードとスタンプモードに区分 して切り替えている力 これらは何れもセキュリティモードなので、同じモードにて監査 とスタンプの発行を行うように構成してもよ!/、。 [0122] The tamper resistance unit 20 has the ability to switch the security mode into an audit mode and a stamp mode, both of which are security modes, so that the audit and stamp issuance is performed in the same mode. Anyway!
更に、本実施の形態では、監査モード→同期モード→スタンプモード→監査モード Furthermore, in this embodiment, audit mode → synchronous mode → stamp mode → audit mode
• · ·の順序でモードの切り替えを行った力 モード切り替えの順序はこれに限定する ものではなぐ例えば、同期モード→監査モード→スタンプモード→同期モード→· · · など、他の順序で動作モードを切り替えてもよ 、。 • · · Force that switches modes in order · The order of mode switching is not limited to this. For example, synchronization mode → audit mode → stamp mode → synchronization mode → · · · operation mode in other order You can switch.
[0123] このようにして、機器 7 (図 9)は、スタンプモードの間、計測部 35から計測値を取得 して内部クロック 22の時刻によりタイムスタンプを発行し、計測データとして顧客サー バ 4に送信する。 [0123] In this way, during the stamp mode, the device 7 (Fig. 9) acquires the measurement value from the measurement unit 35 and issues a time stamp according to the time of the internal clock 22, and the customer server 4 as measurement data. Send to.
このように、機器 7は、タイムスタンプ機能を内蔵しており、計測と共にタイムスタンプ を発行するため、当該計測値が確かに当該計測時刻に計測されたことを保証するこ とがでさる。  Thus, since the device 7 has a built-in time stamp function and issues a time stamp together with the measurement, it can be ensured that the measurement value is surely measured at the measurement time.
なお、本実施の形態では、内部クロック 22で計測した時刻を計測時刻としたが、計 測部 35が計測値と共に計測時刻を耐タンパ部 20に出力し、この計測時刻を含めて 耐タンパ部 20がタイムスタンプを発行するように構成することもできる。 In this embodiment, the time measured by the internal clock 22 is used as the measurement time. However, the measurement unit 35 outputs the measurement time together with the measurement value to the tamper resistant unit 20, and includes this measurement time. The tamper resistant part 20 can be configured to issue a time stamp.
[0124] 顧客サーバ 4 (図 9)は、機器 7を登録した機器マスタと機器 7から送信された計測デ ータを記憶する計測値データベースを備えて 、る。 The customer server 4 (FIG. 9) includes a device master that has registered the device 7 and a measurement value database that stores the measurement data transmitted from the device 7.
図 12 (a)は、機器マスタの論理的な構成の一例を示した図である。  FIG. 12 (a) is a diagram showing an example of the logical configuration of the device master.
機器マスタは、「機器 」、「接続情報」、「機器公開鍵」、「型番」、「設置箇所」、「設 置日」、 …などの各項目力 構成されて 、る。  The device master is composed of items such as “device”, “connection information”, “device public key”, “model number”, “installation location”, “installation date”, and so on.
機器 IDは、機器 7を識別するのに用い、接続情報は機器 7に接続するのに用いる。 機器公開鍵は計測データのタイムスタンプ (デジタル署名 )を確認するのに用いる。  The device ID is used to identify the device 7, and the connection information is used to connect to the device 7. The device public key is used to confirm the time stamp (digital signature) of the measurement data.
[0125] 図 12 (b)は、計測値データベースの論理的な構成の一例を示した図である。 FIG. 12B is a diagram showing an example of the logical configuration of the measurement value database.
計測値データベースは、「機器 ID」、「受信時刻」、「計測値」、「計測時刻」、…な どの項目力 構成されて 、る。  The measurement value database consists of items such as “device ID”, “reception time”, “measurement value”, “measurement time”, and so on.
機器 IDは、計測データの送信元である機器 7の機器 IDであり、受信時刻は、顧客 サーノ が計測データを受信した時刻である。計測値は、計測データに含まれてい た計測値である。  The device ID is the device ID of the device 7 that is the transmission source of the measurement data, and the reception time is the time when the customer Sano received the measurement data. The measurement value is the measurement value included in the measurement data.
顧客サーバ 4は、機器 7の機器公開鍵で計測データのタイムスタンプを検証し、計 測データや計測時刻などが改竄されて 、な 、ことを確認して力 これらを計測値デ ータベースに登録する。  The customer server 4 verifies the time stamp of the measurement data with the device public key of the device 7, confirms that the measurement data, the measurement time, etc. have been tampered with, and registers them in the measurement value database. .
[0126] 次に、図 13を用いて顧客サーノ が機器 7から計測データを収集する手順につい て説明する。 [0126] Next, a procedure for collecting measurement data from the device 7 by the customer Sano will be described with reference to FIG.
ここでは、機器 7が監査モードに切り替わった時点力も説明する。なお、以下の機器 7の動作は耐タンパ部 20が行うものである。  This section also explains the point in time when the device 7 switches to the audit mode. The following operation of the device 7 is performed by the tamper resistant unit 20.
まず、モード切替部 51が耐タンパ部 20を監査モードに切り替えると、機器 7は、監 查サーバ 12に接続し、時刻証明書の送信を要求する (ステップ 25)。  First, when the mode switching unit 51 switches the tamper resistant unit 20 to the audit mode, the device 7 connects to the audit server 12 and requests transmission of a time certificate (step 25).
[0127] 監査サーバ 12は、機器 7から時刻証明書の送信要求を受けると、原子時計の出力 する時刻を用いて時刻証明書作成し、機器 7に送信する (ステップ 30)。 When the audit server 12 receives a time certificate transmission request from the device 7, it creates a time certificate using the time output by the atomic clock and transmits it to the device 7 (step 30).
機器 7は、監査サーバ 12から時刻証明書を受信すると、監査用公開鍵を用いて時 刻証明書のデジタル署名を確認した後、時刻証明書の基準時刻と、内部クロック 22 が計測している時刻の時刻ラベル(図 10)がー致することを確認する (ステップ 35)。 [0128] 時刻ラベルが基準時刻ラベルと一致しな 、場合、耐タンパ部 20では、モード切替 部 51がモード切替を停止し、機器 7はエラーメッセージを顧客サーバ 4に送信する。 これによつて、顧客サーバ 4では、機器 7の異常を検知することができる。 When the device 7 receives the time certificate from the audit server 12, it checks the digital signature of the time certificate using the audit public key, and then measures the reference time of the time certificate and the internal clock 22. Check that the time label of the time (Fig. 10) matches (step 35). [0128] If the time label does not match the reference time label, in the tamper resistant unit 20, the mode switching unit 51 stops the mode switching, and the device 7 transmits an error message to the customer server 4. As a result, the customer server 4 can detect an abnormality of the device 7.
時刻ラベルと基準時刻が一致する場合、モード切替部 51は、耐タンパ部 20の動作 モードを同期モードに切り替える。  When the time label matches the reference time, the mode switching unit 51 switches the operation mode of the tamper resistant unit 20 to the synchronous mode.
[0129] 耐タンパ部 20が同期モードに設定されると、機器 7は、基地局 8が放送している標 準電波 (ステップ 40)を受信し、標準電波で送られた時刻を用いて内部クロック 22の 秒単位を更正する (ステップ 45)。 [0129] When the tamper resistant unit 20 is set to the synchronous mode, the device 7 receives the standard radio wave (step 40) broadcasted by the base station 8 and uses the time sent by the standard radio wave. Correct the clock 22 seconds (step 45).
内部クロック 22の秒単位の更正が完了すると、モード切替部 51は、耐タンパ部 20 の動作モードをスタンプモードに切り替える。  When the correction of the internal clock 22 in units of seconds is completed, the mode switching unit 51 switches the operation mode of the tamper resistant unit 20 to the stamp mode.
[0130] 耐タンパ部 20がスタンプモードに切り替わると、計測部 35の CPU29は、計測装置 部 34で計測された計測値を耐タンパ部 20に送信する。そして、耐タンパ部 20は、こ れを用いて計測データを生成して顧客サーバ 4に送信する (ステップ 50)。 When the tamper resistant unit 20 is switched to the stamp mode, the CPU 29 of the measuring unit 35 transmits the measurement value measured by the measuring device unit 34 to the tamper resistant unit 20. Then, the tamper resistant part 20 generates measurement data using this and transmits it to the customer server 4 (step 50).
顧客サーバ 4は、機器 7から計測データを受信し、計測値などを計測値データべ一 スに記憶する(ステップ 60)。  The customer server 4 receives the measurement data from the device 7 and stores the measurement value and the like in the measurement value data base (step 60).
[0131] 耐タンパ部 20は、時刻監査力ゝらの期間が活性ィ匕時間を経過したカゝ否カゝを監視して おり、活性ィ匕時間を経過していない場合 (ステップ 55 ; N)、機器 7は、ステップ 50に 戻って計測を続行する。 [0131] The tamper resistance unit 20 monitors whether the time of the time auditing ability has exceeded the activation time, and if the activation time has not elapsed (step 55; N ), Device 7 returns to Step 50 and continues measurement.
一方、活性ィ匕時間を経過した場合 (ステップ 55 ; N)、機器 7は、無限ループを続行 するカゝ否かを判断する (ステップ 65)。  On the other hand, when the activation time has elapsed (step 55; N), the device 7 determines whether or not to continue the infinite loop (step 65).
[0132] 無限ループを続行する場合は (ステップ 65 ;Y)、モード切替部 51が耐タンパ部 20 の動作モードを監査モードに切り替えて機器 7はステップ 25に戻る。無限ループを続 行しな 、場合 (ステップ 65; Ν)、機器 7は動作を終了する。 [0132] When the infinite loop is continued (step 65; Y), the mode switching unit 51 switches the operation mode of the tamper resistant unit 20 to the audit mode, and the device 7 returns to step 25. If the infinite loop is not continued (step 65; Ν), device 7 ends its operation.
機器 7は、通常無限ループで連続的に動作するが、例えば、使用期間が限定され てる場合で使用期限が切れた場合など、無限ループを続行しない場合は自動停止 する。  Device 7 normally operates continuously in an infinite loop, but automatically stops if the infinite loop is not continued, for example when the usage period is limited and the expiration date has expired.
[0133] 次に、図 14のフローチャートを用いて機器 7の時刻監査についてより詳細に説明す る。図 14のステップ 110〜ステップ 140は、図 13のステップ 35に対応する。 機器 7が時刻証明書を要求し (ステップ 25)、これに応じて監査サーバ 12が時刻証 明書を送信する (ステップ 30)。 [0133] Next, the time audit of the device 7 will be described in more detail using the flowchart of FIG. Step 110 to step 140 in FIG. 14 correspond to step 35 in FIG. The device 7 requests a time certificate (step 25), and the audit server 12 transmits the time certificate in response (step 30).
機器 7は、監査サーバ 12から送信されてきた時刻証明書を受信し、これを耐タンパ 部 20に入力する。  The device 7 receives the time certificate transmitted from the audit server 12 and inputs it to the tamper resistant unit 20.
そして、機器 7は、時刻証明書に記されている基準時刻と内部クロック 22が計測し て 、る時刻を比較する (ステップ 110)。  Then, the device 7 compares the reference time described in the time certificate with the time measured by the internal clock 22 (step 110).
[0134] この比較は時刻ラベル、即ち分単位で行 、、秒単位は行わな 、。例えば、時刻証 明書に記載されていた時刻が「2005年 3月 20日 12時 30分 3秒 2百ミリ秒」で、内部 クロック 22の時刻が「2005年 3月 20日 12時 30分 0秒 5百ミリ秒」であった場合、両者 は分単位以上が同じであるので、機器 7は両者が一致すると判断する。  [0134] This comparison is a time label, ie, line by minute, not by second. For example, the time stated in the time certificate is “March 20, 2005, 12:30, 3 seconds, 2 hundred milliseconds”, and the internal clock 22 time is “March 20, 2005, 12:30. If it is “0 seconds, 5 hundred milliseconds”, both units are equal in minutes or more, so device 7 determines that they match.
[0135] 時刻証明書に記載されて 、た時刻と内部クロック 22の時刻が一致しな 、場合 (ステ ップ 115 ;N)、機器 7はステップ 25に戻り、監査サーバ 12に再度時刻証明書の送信 を要求する。  [0135] If the time described in the time certificate does not match the time of the internal clock 22 (step 115; N), the device 7 returns to step 25 and again returns the time certificate to the audit server 12. Request transmission of.
両時刻が一致する場合 (ステップ 115 ;Y)、機器 7は、時刻証明書の有効性を確認 する(ステップ 120)。  If both times coincide (step 115; Y), the device 7 checks the validity of the time certificate (step 120).
[0136] この有効性は、時刻証明書に付属するデジタル署名を監査用公開鍵で復号ィ匕して ダイジェストを復元し、更に時刻証明書から監査サーバ 12と同じ関数 (例えば、ハツ シュ関数)を用いてダイジェストを求め、両者の一致を確認することにより行う。  [0136] This validity is obtained by decrypting the digital signature attached to the time certificate with the public key for audit, restoring the digest, and further using the same function as the audit server 12 from the time certificate (for example, a hash function). The digest is obtained using and the agreement between the two is confirmed.
また、時刻証明書に時刻証明書の有効期限が付属している場合は、有効期限内で あることを確認する。  Also, if the time certificate has an expiration date attached to it, check that it is within the expiration date.
[0137] このように、時刻証明書と内部クロック 22の時刻の比較を時刻証明書の有効性の 確認の前に行ったのは、時刻の比較をなるベく速やかに行うためである。  [0137] The reason for comparing the time certificate and the time of the internal clock 22 before confirming the validity of the time certificate is that the time comparison should be performed as quickly as possible.
即ち、有効性の確認の後に時刻の比較を行うと、有効性の確認に要する時間だけ 内部クロック 22の時刻が進んでしま 、、時刻証明書に記載されて 、る時刻との差が 大きくなるためである。  In other words, if the time is compared after the validity is confirmed, the time of the internal clock 22 is advanced by the time required for the validity confirmation, and the difference from the time described in the time certificate becomes large. Because.
[0138] 時刻証明書が有効でな力つた場合 (ステップ 125 ;Ν)、機器 7はステップ 25に戻る 時刻証明書が有効であった場合 (ステップ 125 ;Υ)、機器 7は、前回証明書 (図 9) に記載されている基準時刻と、時刻証明書に記載されている基準時刻との前後関係 を比較する (ステップ 130)。 [0138] If the time certificate is valid (step 125; Ν), device 7 returns to step 25. If the time certificate is valid (step 125; Υ), device 7 is the previous certificate. (Figure 9) The reference time described in the above and the reference time described in the time certificate are compared (step 130).
[0139] 時刻証明書に記載されている基準時刻が、前回証明書に記載されている基準時刻 よりも前の時刻であった場合 (ステップ 135 ;N)、機器 7はステップ 25に戻る。 [0139] When the reference time described in the time certificate is earlier than the reference time described in the previous certificate (step 135; N), the device 7 returns to step 25.
一方、時刻証明書に記載されている基準時刻が、前回証明書に記載されている基 準時刻よりも後の時刻であった場合 (ステップ 135 ;Y)、前回証明書を今回受け取つ た時刻証明書にて上書きするなどして置き換える。  On the other hand, when the reference time described in the time certificate is later than the reference time described in the previous certificate (step 135; Y), the time when the previous certificate was received this time Replace by overwriting with a certificate.
[0140] 通信回線の状態などにより、監査エラーが発生する場合があり、この場合、機器 7は[0140] Depending on the status of the communication line, etc., an audit error may occur.
、その都度ステップ 25に戻って監査サーバ 12に時刻証明書の発行を要求するように なっている。 Each time, the process returns to step 25 to request the audit server 12 to issue a time certificate.
そして、監査サーバ 12は、監査の再実行が所定回数に達した場合は、機器 7を停 止させるコマンドを機器 7に送信する。  Then, when the audit re-execution reaches a predetermined number of times, the audit server 12 transmits a command for stopping the device 7 to the device 7.
このように、機器 7で何らかの異常が発生していると考えられる場合、監査サーバ 12 は機器 7を停止させることができる。  As described above, when it is considered that some abnormality has occurred in the device 7, the audit server 12 can stop the device 7.
[0141] 次に、図 15のフローチャートを用いて機器 7の計測処理についてより詳細に説明す る。図 15のステップ 200〜ステップ 220は、図 13のステップ 50に対応し、図 15のステ ップ 225、 230は、図 13のステップ 60に対応する。 Next, the measurement process of the device 7 will be described in more detail using the flowchart of FIG. Steps 200 to 220 in FIG. 15 correspond to step 50 in FIG. 13, and steps 225 and 230 in FIG. 15 correspond to step 60 in FIG.
機器 7の計測部 35 (図 2)は、外部クロック 28を監視しており、予め設定された計測 時刻に達すると、計測装置部 34に計測を指示し、これによつて計測を実行する (ステ ップ 200)。  The measurement unit 35 (Fig. 2) of the device 7 monitors the external clock 28, and when the preset measurement time is reached, the measurement unit 34 is instructed to perform measurement and thereby performs measurement ( Step 200).
なお、計測部 35が計測装置部 34から計測値を取得するタイミングは、機器 7の種 類や用途などによって様々設定することができる。  Note that the timing at which the measurement unit 35 acquires the measurement value from the measurement device unit 34 can be variously set depending on the type and application of the device 7.
[0142] そして、機器 7は、計測部 35で取得した計測値をバスラインを介して耐タンパ部 20 に提供する (ステップ 205)。 [0142] Then, the device 7 provides the measurement value acquired by the measurement unit 35 to the tamper resistant unit 20 via the bus line (step 205).
耐タンパ部 20では、計測値が提供された時刻を内部クロック 22から取得し、この時 刻を測定値の計測時刻とする (ステップ 210)。  The tamper resistant unit 20 acquires the time when the measurement value is provided from the internal clock 22, and uses this time as the measurement time of the measurement value (step 210).
[0143] 次に、機器 7は、耐タンパ部 20内で、機器 ID、計測値、計測時刻などのメッセージ のダイジェストを作成し、これを機器秘密鍵で暗号ィ匕してタイムスタンプを生成 ·発行 する(ステップ 215)。 [0143] Next, device 7 creates a digest of the device ID, measurement value, measurement time, and other messages in tamper resistant unit 20, and encrypts this with the device private key to generate a time stamp. Issue (Step 215).
そして、機器 7は、機器 、計測値、計測時刻やタイムスタンプなどカゝら計測データ を作成し、顧客サーバ 4に送信する (ステップ 220)。  Then, the device 7 creates measurement data such as the device, measurement value, measurement time and time stamp, and transmits it to the customer server 4 (step 220).
[0144] 顧客サーバ 4は、計測データを機器 7から受信すると、計測データに記されている 機器 IDを機器マスタで検索し、当該機器 7の機器公開鍵を取得する。 [0144] When the customer server 4 receives the measurement data from the device 7, the customer server 4 searches the device master for the device ID described in the measurement data, and acquires the device public key of the device 7.
そして、顧客サーバ 4は、この機器公開鍵を用いてタイムスタンプの確認を行う(ス テツプ 225)。  The customer server 4 confirms the time stamp using the device public key (step 225).
タイムスタンプの確認を終えると、顧客サーバ 4は、計測データに記されている計測 値や計測時刻などを計測値データベースに記憶し、これを更新する (ステップ 230)。  When the confirmation of the time stamp is completed, the customer server 4 stores the measurement value and measurement time described in the measurement data in the measurement value database and updates it (step 230).
[0145] 以上に説明したように、機器 7の計測部 35は、計測対象を計測する計測手段として 機能し、内部クロック 22は、時刻を計測する時計装置として機能する。 [0145] As described above, the measurement unit 35 of the device 7 functions as a measurement unit that measures a measurement target, and the internal clock 22 functions as a clock device that measures time.
そして、耐タンパ部 20は、スタンプモードにおいて、計測部 35で計測がなされた際 の時刻を内部クロック 22から取得し、当該計測値に対して当該取得した時刻による 時刻証明情報 (タイムスタンプ)を生成する時刻証明情報生成手段として機能して ヽ る。  Then, in the stamp mode, the tamper resistant unit 20 acquires the time when the measurement unit 35 performs measurement from the internal clock 22, and provides the time certification information (time stamp) based on the acquired time for the measurement value. It functions as a means for generating time certification information.
[0146] また、 EEPROM25は、非対称暗号鍵として対をなす機器公開鍵と機器秘密鍵の うち、機器秘密鍵を記憶する秘密鍵記憶手段として機能し、耐タンパ部 20は、当該 機器秘密鍵を用いて、計測値と時刻を対応づけた対応情報 (メッセージゃダイジエス ト)を、所定の暗号方式により暗号化することにより時刻証明情報を生成する。  In addition, the EEPROM 25 functions as a secret key storage unit that stores a device secret key out of a device public key and a device secret key paired as an asymmetric encryption key, and the tamper resistant unit 20 stores the device secret key. The time certification information is generated by encrypting the correspondence information (message is digest) that associates the measured value with the time using a predetermined encryption method.
また、通信部 26は、生成した時刻証明情報を所定の送信先に送信する送信手段と して機會して ヽる。  Further, the communication unit 26 functions as a transmission means for transmitting the generated time certification information to a predetermined transmission destination.
[0147] また、機器 7は、基準時刻送信装置 (標準電波送信装置 11など)が送信した基準時 刻 (標準電波など)を受信する基準時刻情報受信手段と、当該基準時刻を用いて、 内部クロック 22が計測する時刻のうち所定単位よりも小さ ヽ単位の時刻(秒単位の時 刻)を補正する時刻補正手段と、備えている。  [0147] In addition, the device 7 uses the reference time information receiving means for receiving the reference time (standard radio wave etc.) transmitted by the reference time transmitting device (standard radio wave transmitter 11 etc.) and the internal time using the reference time. Time correction means for correcting a time in units of seconds (time in seconds) smaller than a predetermined unit among the times measured by the clock 22 is provided.
更に、機器 7は、所定の監査サーバから基準時刻を受信する基準時刻受信手段を 備え、モード切替部 51は、前記所定単位以上の時刻(時刻ラベル)において、内部 クロック 22で計測した時刻と当該受信した基準時刻が一致する場合に前記時刻証明 情報生成手段を動作させ、一致しな!、場合に前記時刻証明情報生成手段を停止さ せる監査結果実行手段として機能して!/、る。 Further, the device 7 includes reference time receiving means for receiving a reference time from a predetermined audit server, and the mode switching unit 51 includes the time measured by the internal clock 22 at the time (time label) equal to or more than the predetermined unit. If the received reference time matches, the time certificate If the information generating means is operated and does not match, it functions as an audit result executing means for stopping the time certification information generating means.
[0148] 以上に説明した本実施の形態により次のような効果を得ることができる。  [0148] The following effects can be obtained by the present embodiment described above.
(1)機器 7にタイムスタンプ機能が内蔵されてるため、計測値カゝらタイムスタンプで証 明される時刻に計測されたものであることを保証することができる。  (1) Since the device 7 has a built-in time stamp function, it can be assured that the measured value is measured at the time proven by the time stamp.
(2)機器 7での計測時刻が改竄できないため、信頼できる計測値の時系列を得ること ができる。  (2) Since the measurement time at the device 7 cannot be falsified, a reliable time series of measured values can be obtained.
(3)内部クロック 22の更正に、標準電波を用いるため、更正用の時刻を配信する設 備が必要ない。  (3) Since the standard radio wave is used to correct the internal clock 22, there is no need to provide a facility for distributing the time for correction.
(4)時刻の更正は秒単位以下に対してし力行うことができないため、時刻ラベルの改 竄を防ぐことができる。  (4) Since the time cannot be corrected for the unit of seconds or less, tampering of the time label can be prevented.
(5)耐タンパ部 20の動作をセキュリティモード(時刻監査、タイムスタンプの発行)と一 般モード(同期)で切り替えるため、セキュリティを高めることができる。  (5) Since the operation of the tamper resistant part 20 is switched between the security mode (time audit, time stamp issuance) and the general mode (synchronous), security can be improved.
[0149] なお、本実施の形態では、内部クロック 22の計測する時刻を時刻ラベルと秒単位 に区分し、時刻監査は時刻ラベルに対して行い、時刻の更正は標準電波にて秒単 位に対して行ったが、従来技術のように時刻配信サーバを設け、これによつて時刻配 信を行 、、これによつて更正された内部クロック 22の時刻を時刻監査するように構成 してちよい。  [0149] In this embodiment, the time measured by the internal clock 22 is divided into a time label and a second unit, the time audit is performed on the time label, and the time correction is performed in seconds using the standard radio wave. However, the time distribution server is provided as in the prior art, the time distribution is performed by this, and the time of the internal clock 22 corrected by this is audited. Good.
また、機器 7の用途としては、水道'ガスメータといったメータ類のほかに、ハウス栽 培の温度計、原子力発電所での放射能漏れ計測装置、地震計などに用いることがで きる。  In addition to water and gas meters, equipment 7 can be used for thermometers for house cultivation, radioactive leak measurement devices at nuclear power plants, and seismometers.
[0150] また、機器 7は、次のような時刻証明サーバとしての機能を有して!/、る。  [0150] The device 7 has the following function as a time certification server! /
即ち、時刻を出力する時計装置と、前記時計装置が出力した時刻のうち、所定の単 位以上の時刻(時刻ラベル)を取得する第 1の時刻取得手段と、基準時刻を配信する 基準時刻配信サーバ (監査サーバ 12)から基準となる時刻を受信する基準時刻受信 手段と、前記所定単位以上の時刻において前記第 1の時刻取得手段で取得した時 刻と前記受信した基準時刻とがー致することを確認することにより、前記時計装置が 所定の範囲の精度で作動して!/、ることを検証する検証手段と、クライアント機器 (計測 部 35)から、時刻証明対象となる証明対象情報を受信する証明対象情報受信手段と 、前記精度を検証した前記時計装置が出力する時刻を用いて、前記受信した証明 対象情報の時刻証明情報 (タイムスタンプ)を生成する時刻証明情報生成手段と、前 記生成した時刻証明情報を所定の送信先に送信する時刻証明情報送信手段と、を 具備したことを特徴とする時刻証明サーバを提供する (第 1の構成)。 That is, a clock device that outputs time, first time acquisition means that acquires a time (time label) of a predetermined unit or more among the times output by the clock device, and a reference time distribution that distributes a reference time The reference time receiving means for receiving the reference time from the server (audit server 12) and the time acquired by the first time acquisition means at the time equal to or greater than the predetermined unit and the received reference time match. By confirming that the timepiece device operates with accuracy within a predetermined range! /, And a client device (measurement Unit 35), the proof object information receiving means for receiving the proof object information as the time proof object, and the time proof information of the received proof object information using the time output by the timepiece device that has verified the accuracy ( There is provided a time proof server comprising: time proof information generating means for generating (time stamp); and time proof information transmitting means for transmitting the generated time proof information to a predetermined transmission destination. First configuration).
第 1の構成において、前記検証手段は、検証に用いる基準時刻が、前回の検証で 用いた基準時刻よりも後の時刻であることが確認できた場合に、前記時計装置が所 定の範囲の精度にて作動して 、ると検証するように構成することもできる(第 2の構成 )。  In the first configuration, when the reference time used for the verification is confirmed to be a time later than the reference time used in the previous verification, the verification unit has a predetermined range. It can also be configured to verify that it operates with accuracy (second configuration).
第 1の構成、又は第 2の構成において、更正時刻発生装置 (標準電波送信装置 11 )から更正時刻を取得する更正時刻取得手段と、前記取得した更正時刻を用いて、 前記時計装置が計測する時刻のうち、前記所定の単位よりも小さ!ヽ単位 (秒単位)の 時刻を更正する時刻更正手段と、を具備し、前記時刻証明情報生成手段は、前記構 成した時刻を用いて前記時刻証明情報を生成するように構成することもできる(第 3 の構成)。  In the first configuration or the second configuration, the clock device measures using the correction time acquisition means for acquiring the correction time from the correction time generator (standard radio wave transmitter 11) and the acquired correction time. Time correction means for correcting a time in units of seconds (seconds) smaller than the predetermined unit of the time, and the time certification information generation means uses the configured time to It can also be configured to generate proof information (third configuration).
第 1の構成、第 2の構成、又は第 3の構成において、前記所定の単位を変更する所 定単位変更手段を具備するように構成することもできる (第 4の構成)。  In the first configuration, the second configuration, or the third configuration, it may be configured to include predetermined unit changing means for changing the predetermined unit (fourth configuration).
第 3の構成において、前記検証手段と前記時刻証明情報生成手段が動作する第 1 の動作モードと、前記時刻更正手段が動作する第 2の動作モードと、を切り替える動 作モード切替手段を具備し、前記動作モード切替手段は、それぞれの動作モードに て動作が完了した後に動作モードを切り替えるように構成することもできる(第 5の構 成)。  In the third configuration, there is provided an operation mode switching unit that switches between a first operation mode in which the verification unit and the time certification information generation unit operate and a second operation mode in which the time correction unit operates. The operation mode switching means may be configured to switch the operation mode after the operation is completed in each operation mode (fifth configuration).
第 5の構成において、前記第 1の動作モードは、前記検証手段が前記時計装置を 検証する検証モードと、前記時刻証明情報生成手段が前記時刻証明情報を生成す る時刻証明情報生成モードと、から成り、前記動作モード切替手段は、前記検証モ ードと前記時刻証明情報生成モードの切替において、モード切替元の動作が完了し た後にモード切替先に動作モードを切り替えるように構成することもできる(第 6の構 成)。 [0151] [子機の設置] In the fifth configuration, the first operation mode includes a verification mode in which the verification unit verifies the timepiece device, a time certification information generation mode in which the time certification information generation unit generates the time certification information, The operation mode switching means may be configured to switch the operation mode to the mode switching destination after the operation of the mode switching source is completed in the switching between the verification mode and the time certification information generation mode. Yes (sixth configuration). [0151] [Installation of handset]
次に、以上のようにして設置された機器 7に子機を設置する場合について説明する 図 16は、情報処理システム 1において、機器 7を親機として子機 9を接続したところ を示したブロック図である。  Next, the case where a slave unit is installed in the device 7 installed as described above will be described. FIG. 16 is a block diagram showing the information processing system 1 in which the slave unit 9 is connected using the device 7 as a master unit. FIG.
機器 7は、複数の子機 9に直接接続することができると共に、子機 9を介して更に多 くの子機 9と接続することができる。  The device 7 can be directly connected to a plurality of slave units 9 and can be connected to more slave units 9 via the slave units 9.
本実施の形態では、機器 7と子機 9の接続、及び子機 9と子機 9の接続は無線を用 いるが、有線にて接続してもよい。  In the present embodiment, the connection between the device 7 and the slave unit 9 and the connection between the slave unit 9 and the slave unit 9 are wireless, but they may be wired.
[0152] 情報処理システム 1にお 、て、子機 9は、計測値を機器 7に送信し、機器 7は、これ にタイムスタンプを付与して顧客サーバ 4に送信する。 [0152] In the information processing system 1, the slave unit 9 transmits the measurement value to the device 7, and the device 7 adds a time stamp thereto and transmits it to the customer server 4.
このようにして、顧客サーバ 4は、機器 7や子機 9からタイムスタンプが付与された計 測値を収集することができる。  In this way, the customer server 4 can collect the measurement values to which the time stamp is given from the device 7 or the slave unit 9.
[0153] 図 17は、子機 9のハードウェア的な構成の一例を示したブロック図である。 FIG. 17 is a block diagram showing an example of a hardware configuration of slave unit 9.
子機 9の構成は、図 2に示した機器 7と概略同じになっている。そのため、対応する 構成要素には機器 7と同じ符号を付し、重複する説明は簡略ィ匕あるいは省略する。  The configuration of the slave unit 9 is substantially the same as that of the device 7 shown in FIG. For this reason, the corresponding components are denoted by the same reference numerals as those of the device 7, and overlapping descriptions are simplified or omitted.
[0154] EEPROM25には、非対称暗号鍵生成プログラム、子機秘密鍵、子機証明書、接 続要求プログラム、共通鍵、 CA公開鍵証明書などが記憶されている。 The EEPROM 25 stores an asymmetric encryption key generation program, a slave device private key, a slave device certificate, a connection request program, a common key, a CA public key certificate, and the like.
非対称暗号鍵生成プログラムは、子機秘密鍵と子機公開鍵のペアを生成するため のプログラムであり、 CPU21がこのプログラムを実行することにより、子機秘密鍵と子 機公開鍵のペアが耐タンパ部 20内で生成される。  The asymmetric encryption key generation program is a program for generating a pair of the slave unit private key and the slave unit public key. When the CPU 21 executes this program, the pair of the slave unit private key and the slave unit public key is protected. It is generated in the tamper section 20.
そして、子機秘密鍵は、生成された後、 EEPROM25に記憶される。このように EE PROM25は、子機秘密鍵記憶手段を構成している。  Then, after the child machine secret key is generated, it is stored in the EEPROM 25. Thus, the EE PROM 25 constitutes a handset secret key storage means.
[0155] 子機証明書は、子機公開鍵の子機公開鍵証明書を検証サーバ公開鍵で暗号ィ匕し た暗号化子機公開鍵証明書や、子機 IDなどカゝらなる子機固有情報などを、 CA3が CA秘密鍵でデジタル署名したものである。このように、 EEPROM25は、暗号化子 機公開鍵記憶手段を構成して 、る。 [0155] The slave unit certificate is an encrypted slave unit public key certificate obtained by encrypting the slave unit public key certificate of the slave unit public key with the verification server public key, or a child unit ID such as the slave unit ID. The machine-specific information is digitally signed by CA3 with the CA private key. Thus, the EEPROM 25 constitutes an encrypted slave public key storage means.
接続要求プログラムは、子機 9を機器 7に接続する際に用いるプログラムである。機 器 7も子機 9からの接続要求を受け付ける子機接続プログラムを記憶しており、これら が協働して機能することにより機器 7と子機 9の接続がなされる。 The connection request program is a program used when connecting the slave unit 9 to the device 7. Machine The device 7 also stores a child device connection program that accepts a connection request from the child device 9, and the device 7 and the child device 9 are connected when these programs function in cooperation.
[0156] 共通鍵は、機器 7と接続する際に、機器 7から送信されてきた共通鍵であり、子機 9 は、計測値を機器 7に送信する際に、これを共通鍵で暗号ィ匕して送信し、また、機器 7から送られてくる情報 (共通鍵で暗号化されて!/ヽる)を共通鍵で復号ィ匕する。  [0156] The common key is a common key transmitted from the device 7 when connecting to the device 7, and the slave unit 9 encrypts the measured value with the common key when transmitting the measured value to the device 7. Sent and transmit, and also decrypt the information sent from device 7 (encrypted with the common key! /) With the common key.
CA公開鍵証明書は、 CA3の公開鍵証明書である。また、図示しないが、ルート証 明書も EEPROM25に記憶されている。  The CA public key certificate is a CA3 public key certificate. Although not shown, a root certificate is also stored in the EEPROM 25.
[0157] 次に、図 18を用いて、子機 9の出荷前処理力も設置までの手順の全体構成につい て説明する。図中に手順の順序を括弧にて示してあり、以下、この順序に従って説明 していく。なお、機器 7は、既に情報処理システム 1に設置されているものとする。 また、手順 (1)から手順 (4)までは、子機 9の設置前 (好ましくは顧客への出荷前) に行う作業である。  [0157] Next, the overall configuration of the procedure up to the installation of the pre-shipment processing power of the slave unit 9 will be described with reference to FIG. The order of the procedures is shown in parentheses in the figure, and will be explained in the following order. Note that the device 7 is already installed in the information processing system 1. Steps (1) to (4) are operations performed before installation of the slave unit 9 (preferably before shipment to the customer).
(1) (子機秘密鍵と子機公開鍵の非対称暗号鍵ペアの生成)  (1) (Generation of asymmetric encryption key pair of handset private key and handset public key)
子機 9のハードウェアが完成すると、作業担当者が子機 9を操作して非対称暗号鍵 生成プログラムを実行し、耐タンパ部 20内で CPU21に子機秘密鍵と子機公開鍵の ペアを生成させる。  When the hardware of the slave unit 9 is completed, the worker in charge operates the slave unit 9 to execute the asymmetric encryption key generation program, and in the tamper resistant unit 20, sets a pair of the slave unit private key and the slave unit public key to the CPU 21. Generate.
そして、子機 9は、生成した子機秘密鍵を EEPROM25の所定のエリアに記憶する  Then, the handset 9 stores the generated handset private key in a predetermined area of the EEPROM 25.
[0158] (2) (子機公開鍵の送信) [0158] (2) (Send device public key transmission)
子機 9は、作業担当者によって当該子機 9を担当する CA3に接続され、生成した子 機公開鍵と子機固有情報 (子機 IDなど)を CA3に送信する。  The slave unit 9 is connected to the CA 3 in charge of the slave unit 9 by the person in charge of work, and transmits the generated slave unit public key and slave unit specific information (slave unit ID, etc.) to the CA 3.
(3) (子機証明書の書き込み)  (3) (Write handset certificate)
CA3は、子機 9から子機公開鍵を受信すると、これを CA秘密鍵でデジタル署名し て子機公開鍵証明書を作成する。  When CA3 receives the handset public key from handset 9, CA3 digitally signs it with the CA private key and creates a handset public key certificate.
更に、 CA3は、検証サーバ公開鍵を記憶しており、これを用いて所定の暗号方式 により子機公開鍵証明書を暗号ィ匕し、暗号ィ匕子機公開鍵証明書を作成する。  Further, CA3 stores the verification server public key, and encrypts the slave unit public key certificate by using a predetermined encryption method to create a cryptographic slave unit public key certificate.
そして、 CA3は、暗号ィ匕子機公開鍵証明書やその他の情報 (子機固有情報など) をデジタル署名して子機証明書を作成し、子機 9に送信する。 子機 9は、子機証明書を CA3から受信し、 EEPROM25に記憶する。 Then, CA3 creates a slave unit certificate by digitally signing the encryption slave unit public key certificate and other information (slave unit specific information, etc.), and transmits it to slave unit 9. The slave unit 9 receives the slave unit certificate from the CA 3 and stores it in the EEPROM 25.
(4) (出荷)  (4) (Shipping)
子機 9は、子機証明書を記憶した後、顧客に出荷され、その後は顧客の管理下に おカゝれる。  The slave unit 9 stores the slave unit certificate, and is shipped to the customer. Thereafter, the slave unit 9 is managed by the customer.
[0159] (5) (接続要求) [0159] (5) (Connection request)
子機 9は、出荷された後、設置担当者によって設置箇所に設置される。機器 7と子 機 9が無線通信できる範囲は限られているので、子機 9は、親機となる機器 7との通信 範囲内 (例えば、機器 7から半径百メートルの範囲)に設置される。  After the child machine 9 is shipped, it is installed at the installation site by the person in charge of installation. Since the range in which the device 7 and the child device 9 can perform wireless communication is limited, the child device 9 is installed within the communication range of the parent device 7 (for example, a radius of 100 meters from the device 7). .
子機 9では、設置箇所に設置された後、設置担当者によって接続要求プログラムが 起動される。  In the slave unit 9, after being installed at the installation location, the connection request program is started by the person in charge of installation.
[0160] 子機 9は、接続要求プログラムが起動すると、通信範囲内にある機器 7を検出する。  [0160] When the connection request program is activated, the slave unit 9 detects the device 7 within the communication range.
そして、子機 9は、検出された機器 7に対して接続要求を行い、子機証明書を機器 7に送信する。このように子機 9は、暗号ィ匕子機公開鍵 (子機証明書に含まれている) 送信手段を備えている。  Then, the slave unit 9 sends a connection request to the detected device 7 and transmits a slave unit certificate to the device 7. As described above, the slave unit 9 includes an encryption slave unit public key (included in the slave unit certificate) transmission means.
機器 7が複数検出された場合、子機 9は、例えば、各機器 7の機器 IDを取得して表 示装置に表示し、設置担当者に接続する機器 7を選択させる。  When a plurality of devices 7 are detected, the slave unit 9 acquires, for example, the device ID of each device 7 and displays it on the display device, and allows the installation person to select the device 7 to be connected.
[0161] (6) (顧客サーバ 4への子機証明書の送信) [0161] (6) (Send client certificate to customer server 4)
機器 7は、子機 9から子機証明書を受信して (暗号化子機公開鍵受信手段)、 CA 公開鍵でデジタル署名を確認する。そして、機器 7は、顧客サーバ 4に接続して子機 証明書を顧客サーバ 4に送信する。  The device 7 receives the handset certificate from the handset 9 (encrypted handset public key receiving means) and confirms the digital signature with the CA public key. Then, the device 7 connects to the customer server 4 and transmits the slave unit certificate to the customer server 4.
このように、機器 7は、暗号ィ匕子機公開鍵を所定の送信先に送信する暗号ィ匕子機 公開鍵送信手段を備えている。本実施の形態では、所定の送信先を顧客サーバ 4と するが、例えば、検証サーバ 5に直接送信するなど、各種の変形例が考えられる。  As described above, the device 7 includes the encryption slave unit public key transmission unit that transmits the encryption slave unit public key to a predetermined transmission destination. In the present embodiment, the predetermined transmission destination is the customer server 4, but various modified examples such as direct transmission to the verification server 5 are conceivable.
[0162] 顧客サーバ 4は、機器 7から子機証明書を受信する。このように、機器 7は、暗号ィ匕 子機公開鍵受信手段を備えて!/ヽる。 Customer server 4 receives the slave certificate from device 7. Thus, the device 7 is provided with the encryption slave device public key receiving means!
顧客サーバ 4は、機器 7から機器 IDを取得し、子機証明書力ゝら子機 IDを取得するこ とができる。なお、顧客サーバ 4は、子機証明書の受信に際し、デジタル署名によつ て正統性を確認する。 そして、顧客サーバ 4は、子機マスタを用いて機器 7と子機 9の組み合わせが予め 登録されて!ヽるカゝ否かを確認する。 The customer server 4 can obtain the device ID from the device 7 and obtain the child device ID from the child device certificate. The customer server 4 confirms the legitimacy by the digital signature when receiving the slave unit certificate. Then, the customer server 4 confirms whether the combination of the device 7 and the slave unit 9 is registered in advance using the slave unit master.
[0163] 子機マスタは、図 19に示したように、機器 7に接続する子機 9を機器 IDと子機 IDの 組み合わせにより予め規定したものであり、対応記憶手段を構成している。また、子 機マスタには、子機 9の有効性も登録されており、使用可能なものは有効に設定され 、使用されないものは失効に設定されている。 As shown in FIG. 19, the slave device master predefines the slave device 9 connected to the device 7 by a combination of the device ID and the slave device ID, and constitutes a correspondence storage means. In the slave unit master, the validity of the slave unit 9 is also registered, and those that can be used are set to valid, and those that are not used are set to invalid.
[0164] 顧客サーバ 4は、機器 7から受信した機器 IDと子機 IDの組み合わせが子機マスタ で規定されているものと一致し、更に当該子機の有効性が有効である場合に、後の 処理を続行する。一方、これらの条件のうち、少なくとも一方が満たされない場合は、 エラーメッセージを機器 7に送信する。 [0164] Customer server 4 determines that the combination of the device ID and the child device ID received from device 7 matches the one specified in the child device master, and the validity of the child device is valid. Continue processing. On the other hand, if at least one of these conditions is not satisfied, an error message is transmitted to the device 7.
即ち、機器 7は、機器 7と子機9が子機マスタで対応づけられている力否かを確認す る対応確認手段を備えて ヽる。 That is, the device 7 is provided with correspondence confirmation means for confirming whether or not the device 7 and the child device 9 are associated with each other by the child device master.
このように、機器 7に接続する子機 9を顧客が予め計画して子機マスタに規定して おくことにより、なりすましによる子機 9の設置や子機 9の誤設置を防ぐことができる。  In this way, by setting the slave unit 9 connected to the device 7 in advance by the customer and prescribing the slave unit master as a master unit, installation of the slave unit 9 due to impersonation or erroneous installation of the slave unit 9 can be prevented.
[0165] (7) (検証サーバ 5への子機証明書の送信) [0165] (7) (Send slave certificate to verification server 5)
図 18に戻り、顧客サーバ 4は、子機マスタによる確認を行った後、子機証明書を検 証サーバ 5に送信する。このように、機器 7は、暗号ィ匕子機公開鍵送信手段を備えて いる。  Returning to FIG. 18, the customer server 4 transmits the slave unit certificate to the verification server 5 after confirming by the slave unit master. As described above, the device 7 includes an encryption slave unit public key transmission unit.
(8) (顧客サーバ 4への子機公開鍵送信)  (8) (Slave unit public key transmission to customer server 4)
検証サーバ 5は、顧客サーバ 4から子機証明書を受信すると、デジタル署名によつ て正統性を確認する。  When the verification server 5 receives the slave certificate from the customer server 4, it verifies the legitimacy by the digital signature.
そして、検証サーノ ¾は、子機証明書に含まれる暗号ィ匕子機公開鍵証明書を検証 サーバ秘密鍵で復号化し、顧客サーバ 4に送信する。  Then, the verification server decrypts the encryption slave unit public key certificate included in the slave unit certificate with the verification server private key and transmits it to the customer server 4.
暗号ィ匕子機公開鍵証明書の復号ィ匕ができな力つたり、あるいは子機証明書などの 正統性が確認できなかった場合、検証サーバ 5は顧客サーバ 4にエラーメッセージを 送信する。  The verification server 5 sends an error message to the customer server 4 when it is impossible to decrypt the encryption device public key certificate or when the authenticity of the device certificate or the like cannot be confirmed.
[0166] (9) (機器 7への子機公開鍵の送信)  [0166] (9) (Transmission of handset public key to device 7)
顧客サーバ 4は、検証サーバ 5から子機公開鍵を受信すると、これを機器 7に転送 する。 When customer server 4 receives the slave unit public key from verification server 5, it forwards it to device 7. To do.
(10) (共通鍵の送信)  (10) (Send common key)
機器 7は、顧客サーバ 4から子機公開鍵を受信し (子機公開鍵受信手段)、これを R AM24に一時記憶する。そして、機器 7は、乱数を発生させるなどして共通鍵を生成 し、これを一時記憶してぉ 、た子機公開鍵で暗号ィ匕して子機 9に送信する。  The device 7 receives the slave unit public key from the customer server 4 (slave unit public key receiving means) and temporarily stores it in the RAM 24. The device 7 generates a common key by generating a random number, temporarily stores it, encrypts it with the handset public key, and transmits it to the handset 9.
子機 9は、機器 7からこの暗号ィ匕共通鍵を受信し、これを子機秘密鍵で復号ィ匕して 共通鍵を復元する。  The slave unit 9 receives the encryption key common key from the device 7, decrypts it with the slave key and restores the common key.
以後、機器 7と子機 9は、この共通鍵を用いて情報を暗号ィ匕し、通信する。即ち、機 器 7と子機 9のうち、情報送信側は、共通鍵で情報を暗号化して送信し、情報受信側 は、共通鍵で情報を復号化する。  Thereafter, the device 7 and the slave unit 9 encrypt information using this common key and communicate. That is, of the device 7 and the slave device 9, the information transmitting side encrypts and transmits information with the common key, and the information receiving side decrypts the information with the common key.
[0167] なお、以上の例では、機器 7は顧客サーバ 4を介して検証サーバ 5に暗号ィ匕子機公 開鍵証明書を送信し、更に顧客サーバ 4を介して子機公開鍵を受信したが、これ〖こ 限定するものではなぐ例えば、機器 7が検証サーバ 5と接続し、機器 7から検証サー ノ 5に暗号ィ匕子機公開鍵証明書を直接送信し、また、子機公開鍵の受信も検証サー ノ 5から直接行うように構成することもできる。  [0167] In the above example, the device 7 transmits the encryption slave unit public key certificate to the verification server 5 via the customer server 4, and further receives the slave unit public key via the customer server 4. However, this is not limited.For example, device 7 connects to verification server 5, and device 7 directly transmits the encryption slave unit public key certificate to verification server 5. The key can also be received directly from the verification servo 5.
[0168] また、顧客サーバ 4は、機器 7から暗号化子機公開鍵を受信すると、これを順次検 証サーバ 5に送信するように構成したが、ある期間の間、暗号ィ匕子機公開鍵を受信し て記憶しておき、ノツチ処理にてこれらを一括して検証サーバ 5に送るように構成す ることちでさる。  [0168] Further, the customer server 4 is configured to sequentially transmit the encrypted slave unit public key to the verification server 5 when it receives the encrypted slave unit public key from the device 7. It can be configured by receiving and storing the keys and sending them to the verification server 5 in a batch by a notch process.
[0169] 次に、図 20のフローチャートを用いて子機 9が機器 7に接続する手順について説明 する。なお、以下で子機 9が行う情報処理は主に耐タンパ部 20 (図 17)内で CPU21 が行うものである。  Next, a procedure for connecting the slave unit 9 to the device 7 will be described using the flowchart of FIG. In the following, the information processing performed by the slave unit 9 is mainly performed by the CPU 21 in the tamper resistant part 20 (FIG. 17).
なお、子機 9内で子機公開鍵と子機秘密鍵のペアを生成するなど、子機出荷前の 処理は機器 7と同様であるので説明を省略する。  The processing before shipping of the slave unit, such as generating a pair of the slave unit public key and the slave unit private key in the slave unit 9, is the same as that of the device 7, and the description thereof is omitted.
子機 9は、設置場所に設置されると、設置担当者が入力部 32 (図 17)を操作し、接 続要求プログラムを起動する。すると、子機 9は、周辺に存在する機器 7を検索し、検 索された機器 7に対して接続要求を行う。  When the slave unit 9 is installed at the installation location, the person in charge of the operation operates the input unit 32 (Fig. 17) to start the connection request program. Then, the slave unit 9 searches for a device 7 existing in the vicinity and makes a connection request to the searched device 7.
[0170] 一方、機器 7は子機 9から接続要求があった場合に、耐タンパ部 20 (図 2)に予め記 憶した子機接続プログラムを起動し、子機 9と協働して以下の一連の情報処理を行う まず、機器 7で子機接続プログラムが起動されると、子機 9は EEPROM25から子 機証明書を読み出し、機器 7に送信する (ステップ 305)。 [0170] On the other hand, when there is a connection request from the slave unit 9, the device 7 records in advance in the tamper resistant part 20 (Fig. 2). Start up the memorized slave unit connection program and perform the following series of information processing in cooperation with the slave unit 9. First, when the slave unit connection program is started on the device 7, the slave unit 9 uses the EEPROM 25 to verify the slave unit. The document is read and transmitted to the device 7 (step 305).
[0171] 機器 7は、子機 9から子機証明書を受信すると、 CA公開鍵を用いてデジタル署名 を検証し、子機証明書の正統性を確認する。 [0171] Upon receiving the handset certificate from handset 9, device 7 verifies the digital signature using the CA public key and confirms the legitimacy of the handset certificate.
正統性が確認できなかった場合、機器 7は子機 9にエラーメッセージを送信する。 正統性が確認できた場合、顧客サーバ接続情報を用いて顧客サーバ 4に接続する。 この際に、機器 7の機器 IDが顧客サーバ 4に通知される。なお、機器 7と顧客サーバ 4が常時接続されたものである場合は、新たに接続する必要はな!/、。  If the legitimacy cannot be confirmed, the device 7 sends an error message to the slave unit 9. When the legitimacy is confirmed, the customer server 4 is connected using the customer server connection information. At this time, the device ID of the device 7 is notified to the customer server 4. If the device 7 and the customer server 4 are always connected, there is no need to newly connect! /.
機器 7は、顧客サーノ に接続した後、子機 9から受信した子機証明書を顧客サー ノ に送信する (ステップ 310)。  After connecting to the customer sano, the device 7 transmits the handset certificate received from the handset 9 to the customer sano (step 310).
[0172] 顧客サーバ 4は、機器 7から子機証明書を受信すると、 CA公開鍵によってデジタル 署名を確認する。 [0172] When customer server 4 receives the slave certificate from device 7, customer server 4 verifies the digital signature using the CA public key.
次に、機器 7の機器 IDと子機 9の子機証明書に記載された子機 IDの組み合わせを 子機マスタ(図 19)で検索し、予めこの組み合わせが子機マスタで規定されているか 否かを確認する (ステップ 315)。  Next, the combination of the device ID of device 7 and the slave device ID described in the slave device certificate of slave device 9 is searched in the slave device master (Fig. 19), and is this combination defined in advance in the slave device master? Confirm whether or not (step 315).
組み合わせが確認できな力つた場合、顧客サーバ 4は機器 7に対してエラーメッセ ージを送信し、このエラーメッセージは、更に機器 7から子機 9に伝達される。  If the combination cannot be confirmed, the customer server 4 transmits an error message to the device 7, and this error message is further transmitted from the device 7 to the slave unit 9.
組み合わせが確認できた場合、顧客サーバ 4は、検証サーバ 5に接続し、子機証 明書を送信する (ステップ 320)。  If the combination is confirmed, the customer server 4 connects to the verification server 5 and transmits the slave unit certificate (step 320).
[0173] 検証サーバ 5は、顧客サーバ 4から子機証明書を受信すると、 CA公開鍵でデジタ ル署名を確認する。 [0173] When the verification server 5 receives the client certificate from the customer server 4, it verifies the digital signature with the CA public key.
次に、子機証明書に含まれる暗号ィ匕子機公開鍵証明書を予め記憶した検証サー バ秘密鍵でこれを復号ィ匕し、子機公開鍵証明書を復元する (ステップ 325)。  Next, the encryption device public key certificate included in the child device certificate is decrypted with the verification server private key stored in advance, and the child device public key certificate is restored (step 325).
次に、検証サーバ 5は、 CA公開鍵を用いて子機公開鍵証明書のデジタル署名を 確認し、子機公開鍵証明書の正統性を確認する。  Next, the verification server 5 verifies the digital signature of the slave unit public key certificate using the CA public key, and confirms the legitimacy of the slave unit public key certificate.
[0174] 子機証明書や子機公開鍵証明書が正統なものでなカゝつた場合、検証サーバ 5は、 顧客サーバ 4にエラーメッセージを送信し、このエラーメッセージは更に機器 7を介し て子機 9まで伝達される。 [0174] If the handset certificate or handset public key certificate is not authentic, the verification server 5 An error message is transmitted to the customer server 4, and this error message is further transmitted to the slave unit 9 via the device 7.
子機公開鍵証明書が正統なものであった場合、検証サーバ 5は子機公開鍵を顧客 サーバ 4に送信する(ステップ 330)。  If the slave unit public key certificate is authentic, the verification server 5 transmits the slave unit public key to the customer server 4 (step 330).
[0175] 顧客サーバ 4は、検証サーバ 5から子機公開鍵を受信し、これを機器 7に送信する( ステップ 335)。 [0175] Customer server 4 receives the slave public key from verification server 5 and transmits it to device 7 (step 335).
機器 7は、顧客サーバ 4から子機公開鍵を受信すると、共通鍵を生成し、これを子 機公開鍵で暗号ィ匕して暗号ィ匕共通鍵を生成する (ステップ 340)。そして、機器 7は、 暗号ィ匕共通鍵を子機 9に送信する (ステップ 345)。  When the device 7 receives the child device public key from the customer server 4, the device 7 generates a common key and encrypts it with the child device public key to generate an encryption common key (step 340). Then, the device 7 transmits the encryption key common key to the child device 9 (step 345).
[0176] 子機 9は、機器 7から暗号ィ匕共通鍵を受信すると、これを EEPROM25に記憶して ある子機秘密鍵を用いて復号化して共通鍵を復元する (ステップ 350)。 [0176] Upon receiving the encryption key common key from device 7, handset 9 decrypts it using the handset private key stored in EEPROM 25 and restores the common key (step 350).
このようにして、機器 7と子機 9は、共通鍵を共有することができ、以後、機器 7と子 機 9は、送受信する情報を共通鍵で暗号化'復号ィ匕して通信する。  In this way, the device 7 and the child device 9 can share the common key, and thereafter, the device 7 and the child device 9 communicate by encrypting / decrypting information to be transmitted / received with the common key.
このようにして、機器 7と子機 9が共通鍵を共有したことを確認した後、機器 7は、子 機 9の子機固有情報やアドレスなどを EEPROM25 (図 2)に記憶し、子機 9を自己の 子機として正式登録する。このようにして、機器 7と子機 9は接続する (ステップ 355)。  In this way, after confirming that the device 7 and the child device 9 share the common key, the device 7 stores the child device specific information and address of the child device 9 in the EEPROM 25 (FIG. 2), and the child device. 9 is officially registered as its own handset. In this way, the device 7 and the slave unit 9 are connected (step 355).
[0177] 次に、図 21のフローチャートを用いて、子機 9と機器 7の接続方法の変形例につい て説明する。 Next, a modified example of the connection method between the slave unit 9 and the device 7 will be described using the flowchart of FIG.
先に説明した実施の形態では、子機マスタで予め機器 7と子機 9の組み合わせが 規定されていたが、この変形例では、機器 7に任意の子機 9を接続し、この機器 7と子 機 9の組み合わせによって動的に子機マスタを更新する。  In the embodiment described above, the combination of the device 7 and the child device 9 is defined in advance in the child device master. However, in this modification, an arbitrary child device 9 is connected to the device 7 and the device 7 and the child device 9 are combined. The slave unit master is dynamically updated according to the combination of slave units 9.
なお、図 20と共通のステップには、同じステップ番号を付し、説明を簡略ィ匕あるい は省略することにする。  Steps common to those in FIG. 20 are denoted by the same step numbers, and description thereof will be simplified or omitted.
[0178] ステップ 305、ステップ 310は、図 20と同様である。 [0178] Steps 305 and 310 are the same as in FIG.
次に、顧客サーノ は、子機証明書を機器 7から受信すると、当該機器 7の機器 ID に対して当該子機 9の子機 IDを対応づけて子機マスタに仮登録する (ステップ 360) 本変形例の子機マスタでは、初めは機器 IDと子機 IDの対応づけがなされておらず 、ステップ 360の処理によって機器 IDと子機 IDの対応を記憶するようになって 、る。 Next, when the customer sano receives the handset certificate from the device 7, the customer Sano temporarily associates the handset ID of the handset 9 with the device ID of the device 7 (step 360). In the slave unit master of this modification, the device ID and the slave unit ID are not associated at first. In step 360, the correspondence between the device ID and the slave unit ID is stored.
[0179] 以降、ステップ 320からステップ 355までは図 20と同じである。 [0179] Steps 320 to 355 are the same as those in FIG.
そして、機器 7は、子機 9との接続を確立すると、顧客サーバ 4に対して子機 9と接 続した旨の接続通知を送信する (ステップ 365)。  When the device 7 establishes a connection with the child device 9, the device 7 transmits a connection notification indicating that the child device 9 is connected to the customer server 4 (step 365).
顧客サーバ 4は、機器 7から接続通知を受信すると、子機マスタで仮登録してある 当該機器 7の機器 IDと当該子機 9の子機 IDの組み合わせを確定し、子機マスタに正 式に登録する (ステップ 370)。  When the customer server 4 receives the connection notification from the device 7, the customer server 4 determines the combination of the device ID of the device 7 and the child device ID of the child device 9 that are temporarily registered in the slave device master, (Step 370).
[0180] この変形例では、予め機器 7と子機 9の組み合わせを機器マスタで規定しないので[0180] In this modification, the combination of the device 7 and the child device 9 is not defined in advance by the device master.
、機器 7と子機 9の組み合わせを確認することはできないが、機器 7に対して任意の 子機 9を接続していくことができるため、子機 9運用の柔軟性が高まる。 Although the combination of the device 7 and the child device 9 cannot be confirmed, since any child device 9 can be connected to the device 7, the operation flexibility of the child device 9 is increased.
[0181] 以上に説明した子機設定方法により次のような効果を得ることができる。 [0181] The following effects can be obtained by the slave unit setting method described above.
(1)子機の設置と管理は顧客が行うため、機器 7や子機 9の供給事業者は機器 7〖こ 関する情報 (機器公開鍵など)を管理すればよ!ヽ。  (1) Since the customer installs and manages the handset, the supplier of equipment 7 and handset 9 should manage information related to equipment 7 (device public key, etc.)!
(2)子機マスタにより機器 7と子機 9の組み合わせを予め登録しておくことにより、子 機 9のなりすましゃ子機 9の誤設置などを抑制することができる。  (2) By registering the combination of the device 7 and the slave unit 9 in advance by the slave unit master, it is possible to suppress erroneous installation of the spoofed slave unit 9 of the slave unit 9.
(3)機器 7は、子機証明書の検証を検証サーバ 5に依頼することにより、子機認証を 行うことができる。  (3) The device 7 can authenticate the slave unit by requesting the verification server 5 to verify the slave unit certificate.
(4)機器 7に複数の子機 9を設置することができ、機器 7や子機 9による計測機器の設 置の柔軟性を高めることができる。  (4) A plurality of slave units 9 can be installed in the device 7, and the flexibility of installation of measuring devices by the device 7 and the slave units 9 can be increased.
図面の簡単な説明  Brief Description of Drawings
[0182] [図 1]本実施の形態に係る情報処理システムのネットワーク構成の一例を示したプロ ック図である。  [0182] FIG. 1 is a block diagram showing an example of a network configuration of an information processing system according to the present embodiment.
[図 2]機器のハードウェア的な構成の一例を示したブロック図である。  FIG. 2 is a block diagram showing an example of the hardware configuration of the device.
[図 3]検証サーバのハードウェア的な構成の一例を示したブロック図である。  FIG. 3 is a block diagram showing an example of a hardware configuration of a verification server.
[図 4]機器登録データベースの論理的な構成の一例を示した図である。  FIG. 4 is a diagram showing an example of a logical configuration of a device registration database.
[図 5]機器を設置して顧客サーバに接続するまでの全体的な手順について説明する ための図である。  FIG. 5 is a diagram for explaining the overall procedure from installing the device to connecting to the customer server.
[図 6]機器を出荷する前に行う処理の手順を説明するためのフローチャートである。 [図 7]機器を設置現場に設置して顧客サーバに接続するまでの手順を説明するため のフローチャートである。 FIG. 6 is a flowchart for explaining a procedure of processing performed before shipping the device. FIG. 7 is a flowchart for explaining the procedure from installing the device at the installation site to connecting to the customer server.
[図 8]情報処理システムの運用に関する部分を示したブロック図である。  FIG. 8 is a block diagram showing a part related to the operation of the information processing system.
[図 9]機器、監査サーバ、及び顧客サーバの関係を示したブロック図である。  FIG. 9 is a block diagram showing the relationship among devices, audit servers, and customer servers.
[図 10]内部クロックの更正について説明するための図である。  FIG. 10 is a diagram for explaining internal clock correction.
[図 11]モード切替部のモード切替動作を説明するための図である。  FIG. 11 is a diagram for explaining a mode switching operation of a mode switching unit.
[図 12]機器マスタ、計測値データベースの論理的な構成を示した図である。  FIG. 12 is a diagram showing a logical configuration of a device master and a measurement value database.
[図 13]顧客サーノ が機器 7から計測データを収集する手順を説明するためのフロ 一チャートである。  FIG. 13 is a flowchart for explaining the procedure for customer Sano to collect measurement data from device 7.
[図 14]時刻監査手順を説明するためのフローチャートである。  FIG. 14 is a flowchart for explaining a time audit procedure.
[図 15]計測処理手順を説明するためのフローチャートである。  FIG. 15 is a flowchart for explaining a measurement processing procedure.
[図 16]情報処理システムにおいて機器と子機を接続したところを示した図である。  FIG. 16 is a diagram showing a place where devices and slave units are connected in the information processing system.
[図 17]子機のハードウェア的な構成の一例を示したブロック図である。  FIG. 17 is a block diagram showing an example of a hardware configuration of a slave unit.
[図 18]子機を設置するまでの手順を説明するための図である。  FIG. 18 is a diagram for explaining a procedure until a slave unit is installed.
[図 19]子機マスタの論理的な構成の一例を示した図である。  FIG. 19 is a diagram showing an example of a logical configuration of a slave unit master.
[図 20]子機を機器に接続する手順を説明するためのフローチャートである。  FIG. 20 is a flowchart for explaining a procedure for connecting a slave unit to a device.
[図 21]子機を機器に接続する手順の変形例を説明するためのフローチャートである。 符号の説明  FIG. 21 is a flowchart for explaining a modification of a procedure for connecting a slave unit to a device. Explanation of symbols
1 情報処理システム  1 Information processing system
2 親 CA  2 Parent CA
3 CA  3 CA
4 顧客サーバ  4 Customer server
5 検証サーバ  5 Verification server
6 機器登録サーバ  6 Device registration server
7 機器  7 Equipment
8 基地局  8 Base station
9 子機  9 Handset
10 ネットワーク 監査サーバ モード切替部 10 network Audit server mode switching part

Claims

請求の範囲 The scope of the claims
[1] ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバと、子機公開鍵を 前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号化した暗号化子機公開 鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端末と、前記ネットヮー クと接続すると共に前記子機端末と通信する端末機器とを用いて構成された情報処 理システムにお 、て使用する端末機器であって、  [1] A verification server connected to a network and storing a verification server private key, an encrypted slave public key obtained by encrypting a slave public key with a verification server public key paired with the verification server private key, and An information processing system configured using a slave device terminal that stores a slave device secret key that is paired with a slave device public key, and a terminal device that is connected to the network and communicates with the slave device terminal. Terminal equipment to be used,
前記子機端末から前記暗号化子機公開鍵を受信する暗号化子機公開鍵受信手 段と、  An encrypted handset public key receiving means for receiving the encrypted handset public key from the handset terminal;
前記受信した暗号ィ匕子機公開鍵を所定の送信先に送信する暗号ィ匕子機公開鍵送 信手段と、  An encryption slave unit public key transmission means for transmitting the received encryption slave unit public key to a predetermined destination;
前記検証サーバが前記送信した暗号化子機公開鍵を前記検証サーバ秘密鍵で復 号化した子機公開鍵を受信する子機公開鍵受信手段と、  A slave unit public key receiving means for receiving a slave unit public key obtained by decrypting the encrypted slave unit public key transmitted by the verification server with the verification server private key;
を具備したことを特徴とする端末機器。  A terminal device comprising:
[2] 共通鍵を生成し、当該生成した共通鍵を前記受信した子機公開鍵を用いて暗号ィ匕 して前記子機端末に送信することを特徴とする請求項 1に記載の端末機器。  [2] The terminal device according to claim 1, wherein a common key is generated, and the generated common key is encrypted using the received handset public key and transmitted to the handset terminal. .
[3] 前記暗号化子機公開鍵送信手段は、前記情報処理サーバを介して前記暗号化子 機公開鍵を前記検証サーバに送信し、 [3] The encrypted slave device public key transmission means transmits the encrypted slave device public key to the verification server via the information processing server,
前記子機公開鍵受信手段は、前記情報処理サーバを介して前記子機公開鍵を前 記検証サーバから受信することを特徴とする請求項 1、又は請求項 2に記載の端末 機器。  3. The terminal device according to claim 1, wherein the slave unit public key receiving unit receives the slave unit public key from the verification server via the information processing server.
[4] ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバと、子機公開鍵を 前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号化した暗号化子機公開 鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端末と、前記ネットヮー クと接続すると共に前記子機端末と通信する端末機器とを用いて構成された情報処 理システムにおいて使用する子機端末であって、  [4] A verification server that is connected to a network and stores a verification server private key; an encrypted public key that is encrypted with a verification server public key that is paired with the verification server private key; Used in an information processing system configured using a handset terminal that stores a handset secret key that is paired with a handset public key and a terminal device that is connected to the network and communicates with the handset terminal. A handset terminal,
子機公開鍵を検証サーバ公開鍵で暗号ィ匕した暗号ィ匕子機公開鍵を記憶する暗号 化子機公開鍵記憶手段と、  An encrypted slave device public key storage means for storing an encrypted slave device public key obtained by encrypting the slave device public key with the verification server public key;
前記子機公開鍵と対をなす子機秘密鍵を記憶する子機秘密鍵記憶手段と、 前記記憶した暗号ィ匕子機公開鍵を前記端末機器に送信する暗号ィ匕子機公開鍵送 信手段と、 A handset secret key storage means for storing a handset secret key paired with the handset public key; An encryption slave unit public key transmission means for transmitting the stored encryption slave unit public key to the terminal device;
を具備したことを特徴とする子機端末。  A slave terminal characterized by comprising:
[5] 前記送信した暗号ィ匕子機公開鍵を復号ィ匕して得られた子機公開鍵を用いて暗号 化された暗号化共通鍵を前記端末機器から受信し、前記記憶した子機秘密鍵を用 Vヽて、前記受信した暗号化共通鍵から共通鍵を復号化することを特徴とする請求項 4に記載の子機端末。 [5] An encrypted common key encrypted using a slave unit public key obtained by decrypting the transmitted encrypted slave unit public key is received from the terminal device, and the stored slave unit 5. The slave terminal according to claim 4, wherein a secret key is used to decrypt the common key from the received encrypted common key.
[6] ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバと、子機公開鍵を 前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号化した暗号化子機公開 鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端末と、前記ネットヮー クと接続すると共に前記子機端末と通信する端末機器と、ネットワークを介して前記 端末機器と通信する情報処理サーバと、を用いて構成された情報処理システムにお V、て使用する情報処理サーバであって、  [6] A verification server that is connected to a network and stores a verification server private key; an encrypted public key that is encrypted with a verification server public key that is paired with the verification server private key; A handset terminal that stores a handset secret key that is paired with a handset public key, a terminal device that is connected to the network and communicates with the handset terminal, and information processing that communicates with the terminal device via a network And an information processing server used by an information processing system configured using the server,
端末機器と子機端末の対応を記憶する対応記憶手段と、  Correspondence storage means for storing correspondence between the terminal device and the slave terminal;
端末機器から、子機端末に記憶されて ヽた暗号ィ匕子機公開鍵を受信する暗号ィ匕 子機公開鍵受信手段と、  An encryption device public key receiving means for receiving the encryption device public key stored in the child device terminal from the terminal device;
当該端末機器と当該子機端末が、前記対応記憶手段で対応づけられて ヽるか否 かを確認する対応確認手段と、  A correspondence confirmation means for confirming whether or not the terminal device and the slave terminal are associated with each other by the correspondence storage means;
前記対応確認手段で、当該端末機器と当該子機端末が対応づけられて ヽる場合 に、前記受信した暗号化子機公開鍵を前記検証サーバに送信する暗号化子機公開 鍵送信手段と、  An encryption handset public key transmission means for sending the received encrypted handset public key to the verification server when the correspondence checking means associates the terminal device with the handset terminal;
を具備したことを特徴とする情報処理サーバ。  An information processing server comprising:
[7] ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバと、子機公開鍵を 前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号化した暗号化子機公開 鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端末と、前記ネットヮー クと接続すると共に前記子機端末と通信する端末機器とを用いて構成された情報処 理システムにおいて使用する端末機器で行う情報処理方法であって、 [7] A verification server that is connected to the network and stores the verification server private key, an encrypted public key that is encrypted with a verification server public key that is paired with the verification server private key, and Used in an information processing system configured using a handset terminal that stores a handset secret key that is paired with a handset public key and a terminal device that is connected to the network and communicates with the handset terminal. An information processing method performed by a terminal device,
前記端末機器は、暗号化子機公開鍵受信手段と、暗号化子機公開鍵送信手段と 、子機公開鍵受信手段と、を備え、 The terminal device includes an encrypted slave device public key receiving means, an encrypted slave device public key transmitting means, A handset public key receiving means,
前記暗号化子機公開鍵受信手段によって、前記子機端末から前記暗号化子機公 開鍵を受信する暗号ィ匕子機公開鍵受信ステップと、  An encryption slave device public key receiving step of receiving the encrypted slave device public key from the slave device by the encrypted slave device public key receiving means;
前記暗号化子機公開鍵送信手段によって、前記受信した暗号化子機公開鍵を所 定の送信先に送信する暗号化子機公開鍵送信ステップと、  An encrypted slave unit public key transmission step of transmitting the received encrypted slave unit public key to a predetermined transmission destination by the encrypted slave unit public key transmission unit;
前記子機公開鍵受信手段によって、前記検証サーバが前記送信した暗号化子機 公開鍵を前記検証サーバ秘密鍵で復号ィ匕した子機公開鍵を受信する子機公開鍵 受信ステップと、  A slave unit public key receiving step for receiving a slave unit public key obtained by decrypting the encrypted slave unit public key transmitted by the verification server with the verification server private key by the slave unit public key receiving unit;
から構成されたことを特徴とする情報処理方法。  An information processing method comprising:
[8] ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバと、子機公開鍵を 前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号ィ匕した暗号ィ匕子機公開 鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端末と、前記ネットヮー クと接続すると共に前記子機端末と通信する端末機器とを用いて構成された情報処 理システムにおいて使用する子機端末で行う情報処理方法であって、  [8] A verification server that is connected to the network and stores the verification server private key, and a cryptographic slave unit public key obtained by encrypting the slave unit public key with the verification server public key that is paired with the verification server private key; An information processing system configured using a child device terminal that stores a child device secret key that is paired with the child device public key and a terminal device that is connected to the network and communicates with the child device terminal. An information processing method performed by a slave terminal used,
前記子機端末は、暗号化子機公開鍵記憶手段と、子機秘密鍵記憶手段と、暗号 化子機公開鍵送信手段と、を備え、  The handset terminal includes an encrypted handset public key storage means, a handset secret key storage means, and an encrypted handset public key transmission means,
前記暗号化子機公開鍵記憶手段によって、子機公開鍵を検証サーバ公開鍵で暗 号ィ匕した暗号ィ匕子機公開鍵を記憶する暗号ィ匕子機公開鍵記憶ステップと、 前記子機秘密鍵記憶手段によって、前記子機公開鍵と対をなす子機秘密鍵を記 憶する子機秘密鍵記憶ステップと、  An encryption slave unit public key storage step for storing an encryption slave unit public key obtained by encrypting a slave unit public key with a verification server public key by the encrypted slave unit public key storage unit; A handset secret key storage step for storing a handset secret key paired with the handset public key by means of a secret key storage means;
前記暗号化子機公開鍵送信手段によって、前記記憶した暗号化子機公開鍵を前 記端末機器に送信する暗号化子機公開鍵送信ステップと、  An encrypted slave device public key transmitting step of transmitting the stored encrypted slave device public key to the terminal device by the encrypted slave device public key transmitting means;
から構成されたことを特徴とする情報処理方法。  An information processing method comprising:
[9] ネットワークに接続し、検証サーバ秘密鍵を記憶した検証サーバと、子機公開鍵を 前記検証サーバ秘密鍵と対をなす検証サーバ公開鍵で暗号ィ匕した暗号ィ匕子機公開 鍵と、前記子機公開鍵と対をなす子機秘密鍵を記憶した子機端末と、前記ネットヮー クと接続すると共に前記子機端末と通信する端末機器と、ネットワークを介して前記 端末機器と通信する情報処理サーバと、を用いて構成された情報処理システムにお いて使用する情報処理サーバで行う情報処理方法であって、 前記情報処理サーバは、端末機器と子機端末の対応を記憶する対応記憶手段と、 暗号化子機公開鍵受信手段と、対応確認手段と、暗号化子機公開鍵送信手段と、を 備え、 [9] A verification server that is connected to the network and stores the verification server private key, and a cryptographic slave unit public key obtained by encrypting the slave unit public key with the verification server public key paired with the verification server private key; Communicating with the terminal device via a network, a handset device storing a handset private key paired with the handset public key, a terminal device connected to the network and communicating with the handset terminal And an information processing system configured using an information processing server. An information processing method performed by an information processing server used by the information processing server, wherein the information processing server stores correspondence between the terminal device and the handset terminal, encrypted handset public key receiving means, and correspondence checking means And an encryption handset public key transmission means,
前記暗号化子機公開鍵受信手段によって、端末機器から、子機端末に記憶されて いた暗号ィ匕子機公開鍵を受信する暗号ィ匕子機公開鍵受信ステップと、  An encryption slave unit public key receiving step of receiving, from the terminal device, the encryption slave unit public key stored in the slave unit terminal by the encrypted slave unit public key receiving unit;
前記対応確認手段によって、当該端末機器と当該子機端末が、前記対応記憶手 段で対応づけられているか否かを確認する対応確認ステップと、  A correspondence confirmation step of confirming whether or not the terminal device and the slave terminal are associated with each other by the correspondence storage means by the correspondence confirmation means;
前記対応確認ステップで、当該端末機器と当該子機端末が対応づけられて ヽる場 合に、前記暗号化子機公開鍵送信手段によって、前記受信した暗号化子機公開鍵 を前記検証サーバに送信する暗号ィ匕子機公開鍵送信ステップと、  When the terminal device and the slave terminal are associated with each other in the correspondence checking step, the encrypted slave unit public key transmission means sends the received encrypted slave unit public key to the verification server. A cipher machine public key sending step for sending;
から構成されたことを特徴とする情報処理方法。  An information processing method comprising:
PCT/JP2006/302466 2006-02-13 2006-02-13 Information processing system WO2007094036A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2006/302466 WO2007094036A1 (en) 2006-02-13 2006-02-13 Information processing system
JP2008500353A JP4868322B2 (en) 2006-02-13 2006-02-13 Information processing system and information processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2006/302466 WO2007094036A1 (en) 2006-02-13 2006-02-13 Information processing system

Publications (1)

Publication Number Publication Date
WO2007094036A1 true WO2007094036A1 (en) 2007-08-23

Family

ID=38371232

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/302466 WO2007094036A1 (en) 2006-02-13 2006-02-13 Information processing system

Country Status (2)

Country Link
JP (1) JP4868322B2 (en)
WO (1) WO2007094036A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009140150A (en) * 2007-12-05 2009-06-25 Seiko Precision Inc Load distribution device
JP2017005712A (en) * 2015-06-12 2017-01-05 イーエム・ミクロエレクトロニク−マリン・エス アー Method for programming banking data in integrated circuit of watch
JP2021526328A (en) * 2018-06-11 2021-09-30 アンドゥリル・インダストリーズ・インコーポレーテッドAnduril Industries Inc. Lattice mesh

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102193711B1 (en) * 2018-05-29 2020-12-21 에스케이텔레콤 주식회사 Terminal device and computer program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09305661A (en) * 1996-05-10 1997-11-28 Hitachi Ltd Source authenticating method
JP2000312203A (en) * 1999-04-27 2000-11-07 Nippon Telegr & Teleph Corp <Ntt> Method and system for passing control in encryption communication
JP2002072876A (en) * 2000-08-30 2002-03-12 Hitachi Ltd Method and device for confirming validity of certificate

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09305661A (en) * 1996-05-10 1997-11-28 Hitachi Ltd Source authenticating method
JP2000312203A (en) * 1999-04-27 2000-11-07 Nippon Telegr & Teleph Corp <Ntt> Method and system for passing control in encryption communication
JP2002072876A (en) * 2000-08-30 2002-03-12 Hitachi Ltd Method and device for confirming validity of certificate

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009140150A (en) * 2007-12-05 2009-06-25 Seiko Precision Inc Load distribution device
JP2017005712A (en) * 2015-06-12 2017-01-05 イーエム・ミクロエレクトロニク−マリン・エス アー Method for programming banking data in integrated circuit of watch
JP2021526328A (en) * 2018-06-11 2021-09-30 アンドゥリル・インダストリーズ・インコーポレーテッドAnduril Industries Inc. Lattice mesh
US11350277B2 (en) 2018-06-11 2022-05-31 Anduril Industries, Inc. Lattice mesh
US11770707B2 (en) 2018-06-11 2023-09-26 Anduril Industries, Inc. Lattice mesh

Also Published As

Publication number Publication date
JP4868322B2 (en) 2012-02-01
JPWO2007094036A1 (en) 2009-07-02

Similar Documents

Publication Publication Date Title
US11743054B2 (en) Method and system for creating and checking the validity of device certificates
US11240222B2 (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
US10951630B2 (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
JP4671783B2 (en) Communications system
CN101340278B (en) License management system and method
US6393126B1 (en) System and methods for generating trusted and authenticatable time stamps for electronic documents
CN102696045B (en) System and method for performing serialization of devices
US20060206433A1 (en) Secure and authenticated delivery of data from an automated meter reading system
EP1505765A1 (en) Data processing system, data processing device, data processing method, and computer program
CN102246455A (en) Self-authentication communication equipment and equipment authentication system
JPWO2007094035A1 (en) Device, verification server, information processing server, device registration server, and information processing method
JP4918717B2 (en) Measuring device
JP4868322B2 (en) Information processing system and information processing method
JP5039931B2 (en) Information processing device
JP4918718B2 (en) Time stamp issuing device, time stamp issuing method, and time stamp issuing program
US20150295721A1 (en) Device authentication system and authentication method
JP3717848B2 (en) Electronic notary system and electronic notary method
JP3646055B2 (en) Time signature apparatus, signing method thereof, and time signature system
JP4541740B2 (en) Authentication key update system and authentication key update method
JP2007215104A (en) Terminal equipment
JP4499027B2 (en) Time audit server and time audit method
JP4671638B2 (en) COMMUNICATION DEVICE, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND PROGRAM
JP2005130449A (en) Communication apparatus, communication system, and fault detection method and program
JP2005130447A (en) Communication apparatus, communication system, and certificate setting method
JP5418507B2 (en) COMMUNICATION DEVICE, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND PROGRAM

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref document number: 2008500353

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06713608

Country of ref document: EP

Kind code of ref document: A1