WO2009110024A1 - Apparatus structure information updating method and information processing apparatus - Google Patents

Apparatus structure information updating method and information processing apparatus Download PDF

Info

Publication number
WO2009110024A1
WO2009110024A1 PCT/JP2008/000442 JP2008000442W WO2009110024A1 WO 2009110024 A1 WO2009110024 A1 WO 2009110024A1 JP 2008000442 W JP2008000442 W JP 2008000442W WO 2009110024 A1 WO2009110024 A1 WO 2009110024A1
Authority
WO
WIPO (PCT)
Prior art keywords
configuration information
device configuration
encrypted
data
difference
Prior art date
Application number
PCT/JP2008/000442
Other languages
French (fr)
Japanese (ja)
Inventor
院田佳治
Original Assignee
富士通株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富士通株式会社 filed Critical 富士通株式会社
Priority to PCT/JP2008/000442 priority Critical patent/WO2009110024A1/en
Publication of WO2009110024A1 publication Critical patent/WO2009110024A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user

Definitions

  • the present invention relates to a method for updating apparatus configuration information of an information processing apparatus that performs license management and the like and an information processing apparatus.
  • License management has been performed to check and manage whether hardware and software sold to users are operating on a computer system specified in a contract. License management is performed by comparing the device configuration information of the computer system defined in the contract with the actual configuration of the computer system. For example, a license check is performed when the computer system is activated, and the computer system becomes operable when the device configuration information corresponding to the contract matches the actual configuration of the computer system.
  • FIG. 1 is a schematic diagram of a manufacturing process of a computer system that performs license management using apparatus configuration information.
  • FIG. 2 is a detailed configuration diagram of the server of FIG.
  • FIG. 3 is a detailed block diagram of the computer system of FIG.
  • the computer system 101 is manufactured at a production factory 120, and a server 111 is installed in the production factory 120.
  • the server 111 includes a configuration information management unit 112 that creates and manages device configuration information, an encryption key 113 used for encryption, and an encryption unit 114 that performs encryption using the encryption key.
  • the configuration information management unit 112 is input with the configuration specifications of the computer system 101, such as the type of CPU and the capacity of the memory, and indicates what device configuration the computer system 101 has based on the input data.
  • Device configuration information 109 is created.
  • the configuration information management unit 112 stores device configuration information 109 of each computer system 101.
  • the encryption unit 114 encrypts the management information including the device unique number and the device configuration information 109 using the encryption key 113 to create encrypted data 115.
  • the encrypted data 115 is stored in the storage means 102 of the computer system 101 and shipped to the user.
  • the encrypted data 115 includes management information including device unique numbers and device configuration information.
  • the encrypted data 115 is encrypted by a public key cryptosystem so that only decryption is possible in the computer system 101. Therefore, the server 111 is provided with the encryption key 113 (secret key), and the computer system 101 is provided with the decryption key 106 (public key).
  • the computer system 101 includes a storage unit 102, a data processing unit 103, a device configuration check unit 104 that compares device configuration information with the actual device configuration of the computer system 101, checks consistency, and controls to control them. Means 105 is provided.
  • the storage means 102 stores encrypted data 115 and a decryption key 106 used for decrypting the encrypted data 115.
  • the data processing unit 104 includes a decrypting unit 107 that decrypts the encrypted data.
  • the computer system 101 stores a device unique number 108 in a ROM (Read Only Memory) or the like.
  • the device unique number 108 is information indicating a device to be applied, and stores different numbers for each computer system 101 and is given at the time of manufacture in the production factory 120.
  • FIG. 4 is a flowchart when the computer system is turned on.
  • step S401 the computer system 101 is turned on.
  • step S ⁇ b> 402 the decryption unit 107 decrypts the encrypted data 115 using the decryption key 106.
  • step S403 the data processing unit 103 compares the device unique number 108 of the computer system 101 with the device unique number included in the decrypted data (decoded data). If they match, the process proceeds to step S404. If not, the process proceeds to step S407.
  • step S404 the decoded data is employed as the device configuration information 109.
  • the control unit 105 investigates the configuration of the computer system 101, and obtains the device configuration information 110 based on the actual configuration of the computer system 101 from the actual configuration of the computer system 101, for example, the type of CPU and the memory capacity. create. Then, the device configuration check unit 104 compares the device configuration information 109 with the device configuration information 110 based on the actual configuration of the computer system 101. If they match, the process proceeds to step S406. If they do not match, step S407 is performed. Proceed to Specifically, the control unit 105 creates device configuration information 110 in the same manner as the server 111 from the configuration of the computer system 101, for example, the type of CPU and the memory capacity. Then, the apparatus configuration information 110 based on the actual configuration of the actual computer system 101 is compared with the apparatus configuration information 109 of the decoded data.
  • step S406 the control unit 104 shifts the computer system 101 to the operating state.
  • step S407 the control unit 104 disables the computer system 101.
  • the computer system 101 can be used only when the device configuration information 109 matches the actual device configuration of the computer system 101. Therefore, when the configuration of the computer system 101 is changed, the device configuration information 109 needs to be updated. In that case, in the server 111 of the production factory 120, device configuration information based on the new device configuration is created, encrypted, encrypted data is created, and the encrypted data is newly encrypted in the computer system 101. The data was 115.
  • Patent Document 1 An example of the configuration of the backup system described in Patent Document 1 is shown in FIG.
  • the client 501 first encrypts the original data to be backed up and transmits it to the backup server 502.
  • the backup server 502 stores the received encrypted data.
  • the client 501 calculates a difference with respect to the original data already transmitted to the backup server, encrypts the difference, and transmits the encrypted difference data to the backup server 502.
  • the backup server 502 stores the encrypted differential data. JP 2005-301464 A
  • An object of the present invention is to provide an apparatus configuration information update method and an information processing apparatus that can reduce management costs and prevent differential data from being applied to an erroneous target apparatus.
  • This information processing device has a first device unique number unique to itself, encrypted data obtained by encrypting device configuration information indicating the device configuration of the information processing device, and difference device configuration information with respect to the device configuration information
  • storage means for storing encrypted differential data obtained by encrypting differential data including a second device unique number indicating a device to which the differential device configuration information is applied, and decryption for decrypting the encrypted data and the encrypted differential data
  • Means for checking whether the first device unique number of the information processing device and the second device unique number included in the difference data match, and the first and second device unique numbers are The control unit that enables the information processing apparatus to operate when they match, and disables the information processing apparatus when they do not match, and the first and second device unique numbers match.
  • updating means for rewriting the device configuration information based on the difference device configuration information, a is a
  • the management cost can be reduced. Further, it is possible to prevent the difference data from being applied to the wrong target device.
  • FIG. 6 is a schematic diagram of creating encrypted differential data in a computer system according to an embodiment.
  • FIG. 7 is a detailed configuration diagram of the server of FIG. First, before describing the apparatus configuration information difference update processing in the computer system (information processing apparatus), the configuration of a server that creates encrypted data and encrypted differential data, and the configuration of the computer system will be described.
  • the server 801 includes a configuration information management unit 802 that creates and manages device configuration information, an encryption key 803 used for encryption, an encryption unit 804 that performs encryption using an encryption key, and a difference that extracts a difference between device configuration information Extraction means 805 is provided.
  • the configuration information management unit 802 is input with the configuration specifications of the computer system 901, such as the type of CPU and the capacity of the memory, and indicates what device configuration the computer system 901 has based on the input data.
  • Device configuration information 902 is created.
  • the configuration information management unit 802 stores device configuration information 902 of each computer system 901.
  • the device configuration information 902 1 is device configuration information created based on the initial device configuration of the first computer system 901 1.
  • the device configuration information 902 1 is the initial information when the computer system is shipped from the factory. 1 shows an apparatus configuration of a computer system. In such a case, the device configuration information 902 1 is created when the first computer system 901 1 is shipped or manufactured.
  • the device configuration information 902 2 is device configuration information created based on the initial device configuration of the second computer system 901 2 .
  • the device configuration information 902 3 is device configuration information created based on a new device configuration when the device configuration of the first computer system 901 1 is changed.
  • the device configuration information 902 3 is appropriately created after the first computer system 901 1 is shipped from the factory.
  • the configuration information management unit 802 also stores and manages the device unique numbers assigned to the computer systems 901 1 to 901 3 .
  • the encryption unit 804 uses the encryption key 803 to encrypt the management information including the device unique number and the device configuration information 902 to create encrypted data 1001.
  • the encryption unit 804 uses the difference information and management information obtained from the difference extraction unit 805 as difference data when the device configuration information is created based on the change in the device configuration, and encrypts the entire difference data to encrypt the difference.
  • Data 1005 is created. Details of the encrypted data 1001 and the encrypted differential data 1005 will be described later.
  • the difference extraction unit 805 compares the device configuration information before and after the device configuration change, extracts the difference, and outputs the difference to the encryption unit 804 as difference information.
  • the device configuration information 902 1 and the device configuration information 902 3 each targeting the first computer system are compared, the difference between them is extracted, and the difference information is output to the encryption unit 804.
  • the encrypted data 1001 is stored in the storage unit 904 of the computer system 901, and the computer system 901 is shipped to the user.
  • the encrypted data 1001 is encrypted by a public key cryptosystem so that only decryption is possible in the computer system 901. Therefore, the server 801 is provided with an encryption key 803 (secret key), and the computer system 901 is provided with a decryption key (public key).
  • FIG. 8 is a configuration example of encrypted data and encrypted differential data.
  • the encrypted data 1001 includes management information 1002 and device configuration information 1003, and these are all encrypted data.
  • the management information 1002 includes a device unique number 1004 of a computer system having a device configuration corresponding to the device configuration information 1003.
  • the encrypted difference data 1005 is data obtained by encrypting the entire difference data including the management information 1006 and the difference information 1007.
  • the management information 1006 includes a serial number 1008, a device unique number 1009, and an error detection code 1010.
  • the serial number 1008 indicates the order in which the difference data for a certain device is created, and is used to prevent the application of a plurality of difference data to the computer system in the reverse order. For example, the serial number of differential data created first for a certain device is 1, and the serial number of differential data created next for the device is 2.
  • the device unique number of the computer system to which the difference data is to be applied is stored.
  • the device unique number 1009 is used to confirm that it matches the device unique number of the computer system when the difference data is applied.
  • the difference information 1007 is obtained when the encrypted difference data 1005 is decrypted. And data for checking whether the device unique number 1009 can be correctly decoded. By detecting an error in the decrypted data, it is possible to check for data corruption or falsification.
  • the difference information 1007 is a position on the device configuration information 1003 in which data (update data) of a part updated with respect to the device configuration information 1003 created before the device configuration change and configuration information to be rewritten with the update data are stored. Is stored.
  • FIG. 9 is a detailed block diagram of the computer system of FIG.
  • the computer system 901 includes a storage unit 904, a first data processing unit 905, a second data processing unit 906, an apparatus configuration check unit 907, and a control unit 908 that controls each part of the computer system 901.
  • the storage unit 904 stores encrypted data 1001, encrypted differential data 1005, and a decryption key 908 used to decrypt the encrypted data.
  • the computer system 901 stores its own device unique number 903 in a ROM (Read Only Memory) or the like.
  • the device unique number 903 is information indicating a device to be applied, and stores different numbers for each computer system 901 and is given at the time of manufacture in the production factory 701.
  • the first data processing unit 905 includes a decrypting unit 909 that decrypts the encrypted data 1001 stored in the storage unit 904 using the decryption key 908, and an updating unit 910 that updates the device configuration information.
  • the second data processing unit 906 includes a decryption unit 911 that decrypts the encrypted differential data 1005 stored in the storage unit using the decryption key 908, and a check unit 912 that checks the consistency of the decrypted differential data. ing.
  • the check unit 912 checks whether the device unique number 1009 included in the encrypted differential data 1005 matches the device unique number 903 included in the computer system 901.
  • the device configuration check means 907 compares the device configuration information received from the outside with the actual device configuration of the computer system 901, and checks the consistency of the device configuration information.
  • the computer system 901 holds encrypted data 1001 obtained by encrypting device configuration information in the storage unit 904.
  • the computer system 901 is manufactured in the production factory 701, and the server 801 is installed in the production factory 701.
  • the configuration information management unit 802 receives the configuration specifications of the computer system 901, and device configuration information indicating what device configuration the computer system 901 has based on the input data. 902 1 is created.
  • the configuration management information unit 802 outputs management information including a device unique number, which is a number unique to the computer system 901, and the device configuration information 902 1 to the encryption unit 804.
  • the encryption unit 804 encrypts the management information and the device configuration information 902 1 to create encrypted data 1001.
  • the encrypted data 1001 is stored in the storage unit 904 of the computer system 901. Next, creation of encrypted differential data and storage of the encrypted differential data in the computer system when the apparatus configuration of the computer system is changed will be described.
  • the device configuration information needs to be changed according to the device configuration change of the computer system 901.
  • the new device configuration of the first computer system 901 1 is input to the configuration information management unit 802, and the device configuration information is transmitted by the configuration information management unit 802. 902 3 is created.
  • the difference extraction unit 805 includes the device configuration information 902 1 of the first computer system 901 1 based on the initial device configuration stored in the configuration information management unit 802, and a new first after the device configuration is changed.
  • the apparatus configuration information 902 3 of one computer system 901 1 is compared, a difference is extracted, and the difference information is output to the encryption unit 804.
  • the component device management means 802 encrypts the serial number indicating the number of the encrypted differential data of the computer system 901 1 created this time and the encrypted differential data, and the device unique number of the computer system 901 1 . Output to the means.
  • the encryption unit 804 uses the management information 1006 including the serial number and the device unique number and the difference information 1007 as difference data, encrypts the entire difference data, and creates encrypted difference data 1005.
  • the encrypted differential data 1005 is stored in the storage unit of the computer system 901 using a portable recording medium such as an FD (flexible disk). As described above, it is assumed that the encrypted data 1001 and the encrypted differential data 1005 are registered in advance in the computer system before the power is turned on.
  • a portable recording medium such as an FD (flexible disk).
  • FIG. 10 is a flowchart when the computer system according to this embodiment is turned on.
  • step S1101 the computer system 901 is powered on.
  • step S1102 the decryption unit 909 decrypts the encrypted data 1001 using the decryption key 908.
  • the data processing unit 905 compares the device unique number 903 of the computer system 901 with the device unique number 1004 included in the decrypted data (decoded data). The process proceeds to step S1104, and if they do not match, it is determined that decoding has failed and the process proceeds to step S1113.
  • step S1104 the control processing unit 908 checks whether the encrypted difference data 1005 already exists in the storage unit 904. If the encrypted differential data 1005 exists in the storage unit 904, the process proceeds to step S1105, and if the encrypted differential data 1005 does not exist, the process proceeds to step S1111.
  • step S1105 the decryption unit 911 decrypts the encrypted differential data 1005 using the decryption key 908, and obtains differential data including the management information 1006 and the differential information 1007.
  • decryption is performed from the oldest encrypted differential data among the currently stored encrypted differential data. That is, the decrypting unit 911 decrypts the encrypted differential data 1005 in the order registered in the computer system 901.
  • the control unit 908 stores the time when the encrypted differential data is registered in the storage unit 904 as data, and whether the encrypted differential data is new or old is determined based on the registered time data.
  • step S1106 the decryption unit 911 checks whether the decryption of the encrypted differential data 1005 is successful using the error detection code 1010, that is, whether decryption is correctly performed. If the decryption of the encrypted differential data is successful, the process proceeds to step S1107. If the decryption fails, the process proceeds to step S1113.
  • step S1107 the check unit 912 checks whether the device unique number 903 of the computer system matches the device unique number 1009 included in the difference data management information 1006. If the device unique numbers match, the check unit 912 outputs the management information 1006 and the difference information 1007 to the update unit 910 and proceeds to step S1108. If not matched, the check unit 912 proceeds to step S1113.
  • step S1108 the update unit 910 checks the serial number 1008 included in the management information 1006 received from the check unit 912, and checks whether the encrypted difference data 1005 is decrypted in the order in which it was created, that is, not in reverse order. To do. For example, the serial number decoded last time and the serial number decoded this time are compared to check whether each serial number is in a continuous ascending order. The serial number decoded last time is held by the updating unit 910. If not, the process proceeds to step S1109. If the order is not reversed, the process proceeds to step S1113.
  • step S 1109 the update unit 910 updates the device configuration information 1003 obtained as a result of decrypting the encrypted data with the difference information 1007 received from the check unit 912. That is, of the device configuration information 1003, rewrites the portion of the the device configuration information 1003 specified by the position information recorded in the difference information in the difference information 1007, a new device configuration information 1003 1.
  • step S1110 the control unit 908 checks whether there is unencrypted encrypted differential data 1005. When it exists, it returns to step S1105, and when it does not exist, it progresses to step S1111.
  • step S1111 device configuration check unit 907 compares the device configuration information 912 based on the actual configuration of the device configuration information 1003 1 and the computer system 901, if it match the process proceeds to step S1112, she does not match In the case, the process proceeds to step S1113.
  • step S1112 the control unit 908 shifts the computer system 901 to the operating state. For example, a signal that enables the computer system 901 to operate is output.
  • step S1113 the control unit 908 disables the computer system 901 from being activated. For example, a signal indicating that the computer system 901 cannot be stopped or started is output.
  • the difference information is applied even if decrypted by a non-target device. For this reason, if the device-specific number is not included in the encrypted difference data, it is necessary to prepare a different decryption key for each device so that it is not decrypted by a non-target device, which increases the management cost.
  • the difference update method can identify the target device to which the difference information is to be applied from the device unique number included in the encrypted difference data. It is possible to prevent the difference information from being applied to a non-target device.
  • the encrypted differential data is encrypted in its entirety including management information, it is possible to prevent data from being altered or damaged.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

When apparatus structure information a computer system has is to be differential-updated, a unique number the target computer system has is incorporated into a differential data as a part thereof and the whole differential data including the differential information and accompanying information is encrypted. Then, before the differential data is applied, it is compared with the unique number of the apparatus so as to check whether the apparatus is the correct target apparatus.

Description

装置構成情報の更新方法および情報処理装置Apparatus configuration information updating method and information processing apparatus
 本発明は、ライセンス管理等を行う情報処理装置の装置構成情報の更新方法および情報処理装置に関する。 The present invention relates to a method for updating apparatus configuration information of an information processing apparatus that performs license management and the like and an information processing apparatus.
 従来、ユーザに販売したハードウェアやソフトウェアが契約で定めたコンピュータシステムで運用が行われているかをチェックおよび管理するライセンス管理が行われている。ライセンス管理は、契約で定めたコンピュータシステムの装置構成情報と実際のコンピュータシステムの構成とを比較することにより行われる。例えば、コンピュータシステムの起動時にライセンスチェックが行われ、契約に対応する装置構成情報とコンピュータシステムの実構成が一致したとき、コンピュータシステムは動作可能となる。 Conventionally, license management has been performed to check and manage whether hardware and software sold to users are operating on a computer system specified in a contract. License management is performed by comparing the device configuration information of the computer system defined in the contract with the actual configuration of the computer system. For example, a license check is performed when the computer system is activated, and the computer system becomes operable when the device configuration information corresponding to the contract matches the actual configuration of the computer system.
 したがって、コンピュータシステムの構成を変更した場合、装置構成情報も更新する必要がある。
 図1は、装置構成情報を用いてライセンス管理を行うコンピュータシステムの製造過程の概略図である。
Therefore, when the configuration of the computer system is changed, the device configuration information needs to be updated.
FIG. 1 is a schematic diagram of a manufacturing process of a computer system that performs license management using apparatus configuration information.
 図2は、図1のサーバの詳細な構成図である。
 図3は、図1のコンピュータシステムの詳細な構成図である。
 コンピュータシステム101は、生産工場120で製造され、生産工場120には、サーバ111が設置されている。
FIG. 2 is a detailed configuration diagram of the server of FIG.
FIG. 3 is a detailed block diagram of the computer system of FIG.
The computer system 101 is manufactured at a production factory 120, and a server 111 is installed in the production factory 120.
 サーバ111は、装置構成情報を作成および管理する構成情報管理手段112、暗号化に用いる暗号鍵113、および暗号鍵を用いて暗号化を行う暗号化手段114を備える。
 構成情報管理手段112には、コンピュータシステム101の構成仕様、例えばCPUの種類やメモリの容量等が入力され、入力されたデータに基づき、コンピュータシステム101がどのような装置構成となっているかを示す装置構成情報109が作成される。構成情報管理手段112には、各コンピュータシステム101の装置構成情報109が格納される。
The server 111 includes a configuration information management unit 112 that creates and manages device configuration information, an encryption key 113 used for encryption, and an encryption unit 114 that performs encryption using the encryption key.
The configuration information management unit 112 is input with the configuration specifications of the computer system 101, such as the type of CPU and the capacity of the memory, and indicates what device configuration the computer system 101 has based on the input data. Device configuration information 109 is created. The configuration information management unit 112 stores device configuration information 109 of each computer system 101.
 そして、暗号化手段114は、暗号鍵113を用いて装置固有番号からなる管理情報、および装置構成情報109を暗号化して暗号化データ115を作成する。
 暗号化データ115は、コンピュータシステム101の記憶手段102に格納されて、ユーザに出荷される。暗号化データ115は、装置固有番号からなる管理情報と装置構成情報を含んでいる。暗号化データ115は、コンピュータシステム101において、復号のみ可能とするため、公開鍵暗号方式で暗号化される。したがって、サーバ111には暗号鍵113(秘密鍵)、コンピュータシステム101には復号鍵106(公開鍵)が備えられる。
The encryption unit 114 encrypts the management information including the device unique number and the device configuration information 109 using the encryption key 113 to create encrypted data 115.
The encrypted data 115 is stored in the storage means 102 of the computer system 101 and shipped to the user. The encrypted data 115 includes management information including device unique numbers and device configuration information. The encrypted data 115 is encrypted by a public key cryptosystem so that only decryption is possible in the computer system 101. Therefore, the server 111 is provided with the encryption key 113 (secret key), and the computer system 101 is provided with the decryption key 106 (public key).
 コンピュータシステム101は、記憶手段102、データ処理手段103、装置構成情報と実際のコンピュータシステム101の装置構成を比較して、整合性のチェック等を行う装置構成チェック手段104、およびそれらを制御する制御手段105を備える。記憶手段102には、暗号化データ115および暗号化データ115を復号するのに用いる復号鍵106が格納されている。データ処理手段104は、暗号化データを復号する復号手段107を備えている。 The computer system 101 includes a storage unit 102, a data processing unit 103, a device configuration check unit 104 that compares device configuration information with the actual device configuration of the computer system 101, checks consistency, and controls to control them. Means 105 is provided. The storage means 102 stores encrypted data 115 and a decryption key 106 used for decrypting the encrypted data 115. The data processing unit 104 includes a decrypting unit 107 that decrypts the encrypted data.
 また、コンピュータシステム101は、ROM(Read Only Memory)等に装置固有番号108を格納している。装置固有番号108は、適用対象の装置を示す情報であり、コンピュータシステム101毎に異なる数字が格納されており、生産工場120において製造時に与えられる。 Further, the computer system 101 stores a device unique number 108 in a ROM (Read Only Memory) or the like. The device unique number 108 is information indicating a device to be applied, and stores different numbers for each computer system 101 and is given at the time of manufacture in the production factory 120.
 次にライセンス管理の処理動作について説明する。
 図4は、コンピュータシステムの電源投入時のフローチャートである。
 ステップS401において、コンピュータシステム101の電源が投入される。
Next, a license management processing operation will be described.
FIG. 4 is a flowchart when the computer system is turned on.
In step S401, the computer system 101 is turned on.
 ステップS402において、復号手段107は復号鍵106を用いて暗号化データ115を復号する。
 ステップS403において、データ処理手段103は、コンピュータシステム101の装置固有番号108と復号したデータ(復号データ)に含まれている装置固有番号とを比較し、一致していた場合はステップS404に進み、一致していない場合はステップS407に進む。
In step S <b> 402, the decryption unit 107 decrypts the encrypted data 115 using the decryption key 106.
In step S403, the data processing unit 103 compares the device unique number 108 of the computer system 101 with the device unique number included in the decrypted data (decoded data). If they match, the process proceeds to step S404. If not, the process proceeds to step S407.
 ステップS404において、復号データを装置構成情報109として採用する。
 ステップS405において、制御手段105は、コンピュータシステム101の構成を調査し、コンピュータシステム101の実際の構成、例えばCPUの種類やメモリの容量等からコンピュータシステム101の実際の構成に基づく装置構成情報110を作成する。そして装置構成チェック手段104は、装置構成情報109とコンピュータシステム101の実際の構成に基づく装置構成情報110とを比較し、一致していた場合はステップS406に進み、一致していない場合はステップS407に進む。具体的には、制御手段105は、コンピュータシステム101の構成、例えばCPUの種類やメモリの容量等からサーバ111と同様に装置構成情報110を作成する。そして、作成された実際のコンピュータシステム101の構成に基づく装置構成情報110と復号データの装置構成情報109とを比較する。
In step S404, the decoded data is employed as the device configuration information 109.
In step S405, the control unit 105 investigates the configuration of the computer system 101, and obtains the device configuration information 110 based on the actual configuration of the computer system 101 from the actual configuration of the computer system 101, for example, the type of CPU and the memory capacity. create. Then, the device configuration check unit 104 compares the device configuration information 109 with the device configuration information 110 based on the actual configuration of the computer system 101. If they match, the process proceeds to step S406. If they do not match, step S407 is performed. Proceed to Specifically, the control unit 105 creates device configuration information 110 in the same manner as the server 111 from the configuration of the computer system 101, for example, the type of CPU and the memory capacity. Then, the apparatus configuration information 110 based on the actual configuration of the actual computer system 101 is compared with the apparatus configuration information 109 of the decoded data.
 ステップS406において、制御手段104はコンピュータシステム101を運用状態に移行する。
 ステップS407において、制御手段104はコンピュータシステム101を起動不可とする。
In step S406, the control unit 104 shifts the computer system 101 to the operating state.
In step S407, the control unit 104 disables the computer system 101.
 上記のように、装置構成情報109と実際のコンピュータシステム101の装置構成が一致した場合のみ、コンピュータシステム101は使用可能となる。
  そのため、コンピュータシステム101の構成を変更した場合、装置構成情報109も更新する必要がある。その場合、生産工場120のサーバ111おいて、新たな装置構成に基づく装置構成情報を作成し、暗号化を行い、暗号化データを作成し、その暗号化データをコンピュータシステム101の新たな暗号化データ115としていた。
As described above, the computer system 101 can be used only when the device configuration information 109 matches the actual device configuration of the computer system 101.
Therefore, when the configuration of the computer system 101 is changed, the device configuration information 109 needs to be updated. In that case, in the server 111 of the production factory 120, device configuration information based on the new device configuration is created, encrypted, encrypted data is created, and the encrypted data is newly encrypted in the computer system 101. The data was 115.
 次にその他の従来技術について説明する。その他の従来技術は、例えば特許文献1に記載されている。特許文献1記載のバックアップシステムの構成例を図5に示す。
 クライアント501は、最初に、バックアップする元データを暗号化し、バックアップサーバ502に送信する。バックアップサーバ502は、受信した暗号化データを格納する。クライアント501は、再度データをバックアップするときは、すでにバックアップサーバに送信した元データに対する差分を算出し、該差分を暗号化して、暗号化差分データとしてバックアップサーバ502に送信する。そして、バックアップサーバ502は暗号化差分データを格納する。
特開2005-301464号公報
Next, other conventional techniques will be described. Other conventional techniques are described in Patent Document 1, for example. An example of the configuration of the backup system described in Patent Document 1 is shown in FIG.
The client 501 first encrypts the original data to be backed up and transmits it to the backup server 502. The backup server 502 stores the received encrypted data. When the data is backed up again, the client 501 calculates a difference with respect to the original data already transmitted to the backup server, encrypts the difference, and transmits the encrypted difference data to the backup server 502. Then, the backup server 502 stores the encrypted differential data.
JP 2005-301464 A
 本発明の課題は、管理コストを低くし、差分データが誤った対象装置に適用されるのを防ぐことが可能な装置構成情報の更新方法および情報処理装置を提供することである。
 この情報処理装置は、自身に固有の第1の装置固有番号を有し、前記情報処理装置の装置構成を示す装置構成情報を暗号化した暗号化データ、および前記装置構成情報に対する差分装置構成情報と該差分装置構成情報を適用する装置を示す第2の装置固有番号を含む差分データを暗号化した暗号化差分データを格納する記憶手段と、前記暗号化データおよび暗号化差分データを復号する復号手段と、前記情報処理装置の有する第1の装置固有番号と前記差分データに含まれる第2の装置固有番号とが一致するかチェックするチェック手段と、前記第1および第2の装置固有番号が一致したときに前記情報処理装置を動作可能にし、一致しなかったときは前記情報処理装置を動作不可とする制御手段と、前記第1および第2の装置固有番号が一致したときに前記差分装置構成情報に基づき前記装置構成情報を書き換える更新手段と、を要件とする。
An object of the present invention is to provide an apparatus configuration information update method and an information processing apparatus that can reduce management costs and prevent differential data from being applied to an erroneous target apparatus.
This information processing device has a first device unique number unique to itself, encrypted data obtained by encrypting device configuration information indicating the device configuration of the information processing device, and difference device configuration information with respect to the device configuration information And storage means for storing encrypted differential data obtained by encrypting differential data including a second device unique number indicating a device to which the differential device configuration information is applied, and decryption for decrypting the encrypted data and the encrypted differential data Means for checking whether the first device unique number of the information processing device and the second device unique number included in the difference data match, and the first and second device unique numbers are The control unit that enables the information processing apparatus to operate when they match, and disables the information processing apparatus when they do not match, and the first and second device unique numbers match. And updating means for rewriting the device configuration information based on the difference device configuration information, a is a requirement when.
 開示の情報処理装置によれば、管理コストを削減することができる。また、差分データが誤った対象装置に適用されるのを防ぐことができる。 According to the disclosed information processing apparatus, the management cost can be reduced. Further, it is possible to prevent the difference data from being applied to the wrong target device.
装置構成情報を用いてライセンス管理を行う従来のコンピュータシステムの製造過程の概略図である。It is the schematic of the manufacturing process of the conventional computer system which performs license management using apparatus structure information. 図1のサーバの詳細な構成図である。It is a detailed block diagram of the server of FIG. 図1のコンピュータシステムの詳細な構成図である。It is a detailed block diagram of the computer system of FIG. 図1のコンピュータシステムの電源投入時のフローチャートである。It is a flowchart at the time of power activation of the computer system of FIG. 従来の暗号データの差分更新を行うバックアップシステムの概略図である。It is the schematic of the backup system which performs the difference update of the conventional encryption data. 一実施の形態に係るコンピュータシステムの暗号化差分データ作成の概略図である。It is the schematic of encryption difference data creation of the computer system which concerns on one embodiment. 図6のサーバの詳細な構成図である。It is a detailed block diagram of the server of FIG. 暗号化データと暗号化差分データの構成例である。It is an example of a structure of encryption data and encryption difference data. 図6のコンピュータシステムの詳細な構成図である。It is a detailed block diagram of the computer system of FIG. 実施の形態に係るコンピュータシステムの電源投入時のフローチャートである。It is a flowchart at the time of power-on of the computer system concerning an embodiment.
 以下、図面を参照しながら実施の形態を説明する。
 図6は、一実施形態によるコンピュータシステムの暗号化差分データ作成の概略図である。
Hereinafter, embodiments will be described with reference to the drawings.
FIG. 6 is a schematic diagram of creating encrypted differential data in a computer system according to an embodiment.
 図7は、図6のサーバの詳細な構成図である。
 先ず、コンピュータシステム(情報処理装置)における装置構成情報差分更新処理の説明の前に、暗号化データおよび暗号化差分データの作成を行うサーバと、コンピュータシステムの構成について説明する。
FIG. 7 is a detailed configuration diagram of the server of FIG.
First, before describing the apparatus configuration information difference update processing in the computer system (information processing apparatus), the configuration of a server that creates encrypted data and encrypted differential data, and the configuration of the computer system will be described.
 ここで、コンピュータシステム901は生産工場701で製造され、生産工場701にはサーバ801が設置されているものとする。
 サーバ801は、装置構成情報を作成および管理する構成情報管理手段802、暗号化に用いる暗号鍵803、暗号鍵を用いて暗号化を行う暗号化手段804、および装置構成情報の差分を抽出する差分抽出手段805を備える。
Here, it is assumed that the computer system 901 is manufactured in a production factory 701 and a server 801 is installed in the production factory 701.
The server 801 includes a configuration information management unit 802 that creates and manages device configuration information, an encryption key 803 used for encryption, an encryption unit 804 that performs encryption using an encryption key, and a difference that extracts a difference between device configuration information Extraction means 805 is provided.
 構成情報管理手段802には、コンピュータシステム901の構成仕様、例えばCPUの種類やメモリの容量等が入力され、入力されたデータに基づき、コンピュータシステム901がどのような装置構成となっているかを示す装置構成情報902が作成される。構成情報管理手段802には、各コンピュータシステム901の装置構成情報902が格納される。図7において、装置構成情報902は、第1のコンピュータシステム901の初期の装置構成に基づいて作成された装置構成情報であり、例えばコンピュータシステムが工場から出荷される時点における、初期的なコンピュータシステムの装置構成を示すものである。このような場合、装置構成情報902は、第1のコンピュータシステム901の出荷時あるいは製造時に作成される。また、装置構成情報902は、第2のコンピュータシステム901の初期の装置構成に基づいて作成された装置構成情報である。一方、装置構成情報902は、第1のコンピュータシステム901の装置構成が変更されたときに、新たな装置構成に基づいて作成された装置構成情報である。装置構成情報902は、第1のコンピュータシステム901が工場から出荷された後などに、適宜作成される。また、構成情報管理手段802は、コンピュータシステム901~901毎に割り当てられた装置固有番号についても格納および管理している。 The configuration information management unit 802 is input with the configuration specifications of the computer system 901, such as the type of CPU and the capacity of the memory, and indicates what device configuration the computer system 901 has based on the input data. Device configuration information 902 is created. The configuration information management unit 802 stores device configuration information 902 of each computer system 901. In FIG. 7, the device configuration information 902 1 is device configuration information created based on the initial device configuration of the first computer system 901 1. For example, the device configuration information 902 1 is the initial information when the computer system is shipped from the factory. 1 shows an apparatus configuration of a computer system. In such a case, the device configuration information 902 1 is created when the first computer system 901 1 is shipped or manufactured. The device configuration information 902 2 is device configuration information created based on the initial device configuration of the second computer system 901 2 . On the other hand, the device configuration information 902 3 is device configuration information created based on a new device configuration when the device configuration of the first computer system 901 1 is changed. The device configuration information 902 3 is appropriately created after the first computer system 901 1 is shipped from the factory. The configuration information management unit 802 also stores and manages the device unique numbers assigned to the computer systems 901 1 to 901 3 .
 暗号化手段804は、暗号鍵803を用いて装置固有番号を含む管理情報、および装置構成情報902を暗号化して暗号化データ1001を作成する。また暗号化手段804は、装置構成の変更に基づいて装置構成情報が作成されたとき、差分抽出手段805から得た差分情報および管理情報を差分データとし、差分データ全体を暗号化して暗号化差分データ1005を作成する。尚、暗号化データ1001および暗号化差分データ1005の詳細については後述する。 The encryption unit 804 uses the encryption key 803 to encrypt the management information including the device unique number and the device configuration information 902 to create encrypted data 1001. The encryption unit 804 uses the difference information and management information obtained from the difference extraction unit 805 as difference data when the device configuration information is created based on the change in the device configuration, and encrypts the entire difference data to encrypt the difference. Data 1005 is created. Details of the encrypted data 1001 and the encrypted differential data 1005 will be described later.
 差分抽出手段805は、装置構成変更前後の装置構成情報を比較し、その差分を抽出、差分情報として暗号化手段804に出力する。図7においては、それぞれ第1のコンピュータシステムを対象とした装置構成情報902と装置構成情報902を比較し、両者の差分を抽出し、差分情報として暗号化手段804に出力している。 The difference extraction unit 805 compares the device configuration information before and after the device configuration change, extracts the difference, and outputs the difference to the encryption unit 804 as difference information. In FIG. 7, the device configuration information 902 1 and the device configuration information 902 3 each targeting the first computer system are compared, the difference between them is extracted, and the difference information is output to the encryption unit 804.
 暗号化データ1001は、コンピュータシステム901の記憶手段904に格納されて、コンピュータシステム901がユーザに出荷される。暗号化データ1001は、コンピュータシステム901において復号のみ可能とするために、公開鍵暗号方式で暗号化される。したがって、サーバ801には暗号鍵803(秘密鍵)が、コンピュータシステム901には復号鍵(公開鍵)が備えられる。 The encrypted data 1001 is stored in the storage unit 904 of the computer system 901, and the computer system 901 is shipped to the user. The encrypted data 1001 is encrypted by a public key cryptosystem so that only decryption is possible in the computer system 901. Therefore, the server 801 is provided with an encryption key 803 (secret key), and the computer system 901 is provided with a decryption key (public key).
 図8は、暗号化データと暗号化差分データの構成例である。
 暗号化データ1001は、管理情報1002および装置構成情報1003を含んでおり、これら全体が暗号化されたデータである。管理情報1002は、装置構成情報1003に対応する装置構成を有するコンピュータシステムの装置固有番号1004を有する。
FIG. 8 is a configuration example of encrypted data and encrypted differential data.
The encrypted data 1001 includes management information 1002 and device configuration information 1003, and these are all encrypted data. The management information 1002 includes a device unique number 1004 of a computer system having a device configuration corresponding to the device configuration information 1003.
 暗号化差分データ1005は、管理情報1006および差分情報1007を含む差分データ全体を暗号化したデータである。
 管理情報1006は、シリアル番号1008、装置固有番号1009、誤り検出符号1010を有する。
The encrypted difference data 1005 is data obtained by encrypting the entire difference data including the management information 1006 and the difference information 1007.
The management information 1006 includes a serial number 1008, a device unique number 1009, and an error detection code 1010.
 シリアル番号1008は、ある装置に対する差分データが作成された順番を示すものであり、複数の差分データをコンピュータシステムに適用する場合に、逆順に適用されるのを防止するために用いる。例えば、ある装置に対して最初に作成された差分データのシリアル番号は1、該装置に対して次に作成された差分データのシリアル番号は2となる。 The serial number 1008 indicates the order in which the difference data for a certain device is created, and is used to prevent the application of a plurality of difference data to the computer system in the reverse order. For example, the serial number of differential data created first for a certain device is 1, and the serial number of differential data created next for the device is 2.
 装置固有番号1009の領域には、差分データが適用されるべきコンピュータシステムの装置固有番号が格納される。装置固有番号1009は、差分データ適用時にコンピュータシステムが持つ装置固有番号と一致することを確認するために用いる
 誤り検出符号1010の領域には、暗号化差分データ1005を復号したときに、差分情報1007や装置固有番号1009が正しく復号できているかをチェックするためのデータが格納される。復号されたデータの誤り検出を行うことにより、データの破損や改ざんをチェックすることが可能となる。
In the area of the device unique number 1009, the device unique number of the computer system to which the difference data is to be applied is stored. The device unique number 1009 is used to confirm that it matches the device unique number of the computer system when the difference data is applied. In the area of the error detection code 1010, the difference information 1007 is obtained when the encrypted difference data 1005 is decrypted. And data for checking whether the device unique number 1009 can be correctly decoded. By detecting an error in the decrypted data, it is possible to check for data corruption or falsification.
 差分情報1007は、装置構成変更前に作成された装置構成情報1003に対して更新された部分のデータ(更新データ)と、更新データで書き換える構成情報が格納されている装置構成情報1003上の位置を示す位置情報が格納されている。 The difference information 1007 is a position on the device configuration information 1003 in which data (update data) of a part updated with respect to the device configuration information 1003 created before the device configuration change and configuration information to be rewritten with the update data are stored. Is stored.
 図9は、図6のコンピュータシステムの詳細な構成図である。
 コンピュータシステム901は、記憶手段904、第1のデータ処理手段905、第2のデータ処理手段906、装置構成チェック手段907、およびコンピュータシステム901の各部を制御する制御手段908を備える。記憶手段904には、暗号化データ1001、暗号化差分データ1005、および暗号化されたデータ復号するのに用いる復号鍵908が格納されている。
FIG. 9 is a detailed block diagram of the computer system of FIG.
The computer system 901 includes a storage unit 904, a first data processing unit 905, a second data processing unit 906, an apparatus configuration check unit 907, and a control unit 908 that controls each part of the computer system 901. The storage unit 904 stores encrypted data 1001, encrypted differential data 1005, and a decryption key 908 used to decrypt the encrypted data.
 コンピュータシステム901は、ROM(Read Only Memory)等に自身の装置固有番号903を格納している。装置固有番号903は、適用対象の装置を示す情報であり、コンピュータシステム901毎に異なる数字が格納されており、生産工場701において製造時に与えられる。 The computer system 901 stores its own device unique number 903 in a ROM (Read Only Memory) or the like. The device unique number 903 is information indicating a device to be applied, and stores different numbers for each computer system 901 and is given at the time of manufacture in the production factory 701.
 第1のデータ処理手段905は、復号鍵908を用いて記憶手段904に格納された暗号化データ1001を復号する復号手段909および、装置構成情報を更新する更新手段910を備えている。 The first data processing unit 905 includes a decrypting unit 909 that decrypts the encrypted data 1001 stored in the storage unit 904 using the decryption key 908, and an updating unit 910 that updates the device configuration information.
 第2のデータ処理手段906は、復号鍵908を用いて記憶手段に格納された暗号化差分データ1005を復号する復号手段911および、復号された差分データの整合性をチェックするチェック手段912を備えている。チェック手段912は、暗号化差分データ1005に含まれる装置固有番号1009が、コンピュータシステム901の有する装置固有番号903と一致するかをチェックする。 The second data processing unit 906 includes a decryption unit 911 that decrypts the encrypted differential data 1005 stored in the storage unit using the decryption key 908, and a check unit 912 that checks the consistency of the decrypted differential data. ing. The check unit 912 checks whether the device unique number 1009 included in the encrypted differential data 1005 matches the device unique number 903 included in the computer system 901.
 装置構成チェック手段907は、外部から受け取った装置構成情報と実際のコンピュータシステム901の装置構成を比較して、装置構成情報の整合性のチェック等を行う。
 コンピュータシステム901は、装置構成情報を暗号化した暗号化データ1001を記憶手段904に保持している。
The device configuration check means 907 compares the device configuration information received from the outside with the actual device configuration of the computer system 901, and checks the consistency of the device configuration information.
The computer system 901 holds encrypted data 1001 obtained by encrypting device configuration information in the storage unit 904.
 次にコンピュータシステムの電源投入時の動作について説明するが、電源投入時の動作の説明の前に、コンピュータシステムに暗号化データおよび暗号化差分データが格納されるまでの処理について説明する。 Next, the operation of the computer system when the power is turned on will be described. Before the description of the operation when the power is turned on, the processing until the encrypted data and the encrypted differential data are stored in the computer system will be described.
 先ず、暗号化データの作成およびコンピュータシステムへの格納について説明する。
 上述のように、コンピュータシステム901は生産工場701で製造され、生産工場701にはサーバ801が設置されているものとする。
First, creation of encrypted data and storage in a computer system will be described.
As described above, the computer system 901 is manufactured in the production factory 701, and the server 801 is installed in the production factory 701.
 コンピュータシステム901の製造時に、構成情報管理手段802には、コンピュータシステム901の構成仕様が入力され、入力されたデータに基づき、コンピュータシステム901がどのような装置構成となっているかを示す装置構成情報902が作成される。 When the computer system 901 is manufactured, the configuration information management unit 802 receives the configuration specifications of the computer system 901, and device configuration information indicating what device configuration the computer system 901 has based on the input data. 902 1 is created.
 構成管理情報手段802は、コンピュータシステム901に固有の番号である装置固有番号を含む管理情報と、装置構成情報902を暗号化手段804に出力する。
 暗号化手段804は、管理情報および装置構成情報902を暗号化し、暗号化データ1001を作成する。
The configuration management information unit 802 outputs management information including a device unique number, which is a number unique to the computer system 901, and the device configuration information 902 1 to the encryption unit 804.
The encryption unit 804 encrypts the management information and the device configuration information 902 1 to create encrypted data 1001.
 そして、暗号化データ1001は、コンピュータシステム901の記憶手段904に格納される。
 次に、コンピュータシステムの装置構成が変更になった場合の暗号化差分データの作成と、コンピュータシステムへの暗号化差分データの格納について説明する。
The encrypted data 1001 is stored in the storage unit 904 of the computer system 901.
Next, creation of encrypted differential data and storage of the encrypted differential data in the computer system when the apparatus configuration of the computer system is changed will be described.
 契約の変更等によりコンピュータシステム901の装置構成が変更になった場合は、コンピュータシステム901の装置構成変更に応じて装置構成情報も変更する必要がある。
 例えば、第1のコンピュータシステム901の装置構成が変更になった場合、第1のコンピュータシステム901の新たな装置構成が構成情報管理手段802に入力され、構成情報管理手段802によって装置構成情報902が作成される。
When the device configuration of the computer system 901 is changed due to a contract change or the like, the device configuration information needs to be changed according to the device configuration change of the computer system 901.
For example, when the device configuration of the first computer system 901 1 is changed, the new device configuration of the first computer system 901 1 is input to the configuration information management unit 802, and the device configuration information is transmitted by the configuration information management unit 802. 902 3 is created.
 そして、差分抽出手段805は、それぞれ構成情報管理手段802に格納された初期の装置構成に基づく第1のコンピュータシステム901の装置構成情報902と、装置構成が変更された後の新たな第1のコンピュータシステム901の装置構成情報902とを比較し、差分を抽出し、差分情報として暗号化手段804に出力する。 Then, the difference extraction unit 805 includes the device configuration information 902 1 of the first computer system 901 1 based on the initial device configuration stored in the configuration information management unit 802, and a new first after the device configuration is changed. The apparatus configuration information 902 3 of one computer system 901 1 is compared, a difference is extracted, and the difference information is output to the encryption unit 804.
 また、構成装置管理手段802は、今回作成するコンピュータシステム901の暗号化差分データが何番目に作られたか暗号化差分データかを示すシリアル番号と、コンピュータシステム901の装置固有番号を暗号化手段に出力する。 The component device management means 802 encrypts the serial number indicating the number of the encrypted differential data of the computer system 901 1 created this time and the encrypted differential data, and the device unique number of the computer system 901 1 . Output to the means.
 暗号化手段804は、シリアル番号および装置固有番号などを含む管理情報1006、および差分情報1007を差分データとし、差分データ全体を暗号化して暗号化差分データ1005を作成する。 The encryption unit 804 uses the management information 1006 including the serial number and the device unique number and the difference information 1007 as difference data, encrypts the entire difference data, and creates encrypted difference data 1005.
 暗号化差分データ1005は、FD(フレキシブルディスク)等の可搬記録媒体を用いて、コンピュータシステム901の記憶手段に格納される。
 上記のように、電源投入前にあらかじめコンピュータシステムには暗号化データ1001および暗号化差分データ1005が登録されているものとする。
The encrypted differential data 1005 is stored in the storage unit of the computer system 901 using a portable recording medium such as an FD (flexible disk).
As described above, it is assumed that the encrypted data 1001 and the encrypted differential data 1005 are registered in advance in the computer system before the power is turned on.
 図10は、本実施の形態のコンピュータシステムの電源投入時のフローチャートである。
 ステップS1101において、コンピュータシステム901の電源が投入される。
FIG. 10 is a flowchart when the computer system according to this embodiment is turned on.
In step S1101, the computer system 901 is powered on.
 ステップS1102において、復号手段909は、復号鍵908を用いて暗号化データ1001を復号する。
 ステップS1103において、データ処理手段905は、コンピュータシステム901の装置固有番号903と、復号したデータ(復号データ)に含まれている装置固有番号1004とを比較し、一致していた場合は復号成功と判断してステップS1104に進み、一致していない場合は復号失敗と判断してステップS1113に進む。
In step S1102, the decryption unit 909 decrypts the encrypted data 1001 using the decryption key 908.
In step S1103, the data processing unit 905 compares the device unique number 903 of the computer system 901 with the device unique number 1004 included in the decrypted data (decoded data). The process proceeds to step S1104, and if they do not match, it is determined that decoding has failed and the process proceeds to step S1113.
 ステップS1104において、制御処理手段908は、暗号化差分データ1005が記憶手段904にすでに存在するかをチェックする。暗号化差分データ1005が記憶手段904に存在する場合はステップS1105に進み、暗号化差分データ1005が存在しない場合はステップS1111に進む。 In step S1104, the control processing unit 908 checks whether the encrypted difference data 1005 already exists in the storage unit 904. If the encrypted differential data 1005 exists in the storage unit 904, the process proceeds to step S1105, and if the encrypted differential data 1005 does not exist, the process proceeds to step S1111.
 ステップS1105において、復号手段911は、復号鍵908を用いて暗号化差分データ1005を復号し、管理情報1006と差分情報1007からなる差分データを得る。複数の暗号化差分データ1005が記憶手段904に格納されている場合は、現在格納されている暗号化差分データのうちで最も古い暗号化差分データから復号する。すなわち、復号手段911は、コンピュータシステム901に登録された順番に暗号化差分データ1005を復号していく。尚、制御手段908は、暗号化差分データが記憶手段904に登録された時間をデータとして記憶しており、暗号化差分データの新旧の判断は、登録時間データに基づいて行われる。 In step S1105, the decryption unit 911 decrypts the encrypted differential data 1005 using the decryption key 908, and obtains differential data including the management information 1006 and the differential information 1007. When a plurality of pieces of encrypted differential data 1005 are stored in the storage unit 904, decryption is performed from the oldest encrypted differential data among the currently stored encrypted differential data. That is, the decrypting unit 911 decrypts the encrypted differential data 1005 in the order registered in the computer system 901. Note that the control unit 908 stores the time when the encrypted differential data is registered in the storage unit 904 as data, and whether the encrypted differential data is new or old is determined based on the registered time data.
 ステップS1106において、復号手段911は、誤り検出符号1010を用いて暗号化差分データ1005の復号が成功したか、すなわち正しく復号できているかをチェックする。暗号化差分データの復号が成功の場合はステップS1107に進み、復号に失敗した場合はステップS1113に進む。 In step S1106, the decryption unit 911 checks whether the decryption of the encrypted differential data 1005 is successful using the error detection code 1010, that is, whether decryption is correctly performed. If the decryption of the encrypted differential data is successful, the process proceeds to step S1107. If the decryption fails, the process proceeds to step S1113.
 ステップS1107において、チェック手段912は、コンピュータシステムが持つ装置固有番号903と、差分データの管理情報1006に含まれる装置固有番号1009とが一致するかをチェックする。装置固有番号が一致する場合は、チェック手段912は管理情報1006および差分情報1007を更新手段910に出力してステップS1108に進み、一致しない場合はステップS1113に進む。 In step S1107, the check unit 912 checks whether the device unique number 903 of the computer system matches the device unique number 1009 included in the difference data management information 1006. If the device unique numbers match, the check unit 912 outputs the management information 1006 and the difference information 1007 to the update unit 910 and proceeds to step S1108. If not matched, the check unit 912 proceeds to step S1113.
 ステップS1108において、更新手段910は、チェック手段912から受け取った管理情報1006に含まれるシリアル番号1008をチェックし、暗号化差分データ1005が作成された順番で復号されているか、すなわち逆順でないかをチェックする。例えば、前回復号したシリアル番号と今回復号したシリアル番号とを比較して、それぞれのシリアル番号が連続した昇順になっているかをチェックする。尚、前回復号したシリアル番号は、更新手段910が保持している。逆順でない場合はステップS1109に進み、逆順の場合はステップS1113に進む。 In step S1108, the update unit 910 checks the serial number 1008 included in the management information 1006 received from the check unit 912, and checks whether the encrypted difference data 1005 is decrypted in the order in which it was created, that is, not in reverse order. To do. For example, the serial number decoded last time and the serial number decoded this time are compared to check whether each serial number is in a continuous ascending order. The serial number decoded last time is held by the updating unit 910. If not, the process proceeds to step S1109. If the order is not reversed, the process proceeds to step S1113.
 ステップS1109において、更新手段910は、暗号化データを復号した結果得られた装置構成情報1003を、チェック手段912から受け取った差分情報1007で更新する。すなわち、装置構成情報1003のうち、差分情報中に記録された位置情報で指定された装置構成情報1003の部分を差分情報1007で書き換え、新たな装置構成情報1003とする。 In step S 1109, the update unit 910 updates the device configuration information 1003 obtained as a result of decrypting the encrypted data with the difference information 1007 received from the check unit 912. That is, of the device configuration information 1003, rewrites the portion of the the device configuration information 1003 specified by the position information recorded in the difference information in the difference information 1007, a new device configuration information 1003 1.
 ステップS1110において、制御手段908は、未復号の暗号化差分データ1005が存在するかをチェックする。存在した場合はステップS1105に戻り、存在しない場合はステップS1111に進む。 In step S1110, the control unit 908 checks whether there is unencrypted encrypted differential data 1005. When it exists, it returns to step S1105, and when it does not exist, it progresses to step S1111.
 ステップS1111において、装置構成チェック手段907は、装置構成情報1003とコンピュータシステム901の実際の構成に基づく装置構成情報912とを比較し、一致していた場合はステップS1112に進み、一致していない場合はステップS1113に進む。 In step S1111, device configuration check unit 907 compares the device configuration information 912 based on the actual configuration of the device configuration information 1003 1 and the computer system 901, if it match the process proceeds to step S1112, she does not match In the case, the process proceeds to step S1113.
 ステップS1112において、制御手段908はコンピュータシステム901を運用状態に移行する。例えば、コンピュータシステム901を動作可能とする信号を出力する。
 ステップS1113において、制御手段908はコンピュータシステム901を起動不可とする。例えば、コンピュータシステム901を停止または起動不可である旨を表示する信号を出力する。
In step S1112, the control unit 908 shifts the computer system 901 to the operating state. For example, a signal that enables the computer system 901 to operate is output.
In step S1113, the control unit 908 disables the computer system 901 from being activated. For example, a signal indicating that the computer system 901 cannot be stopped or started is output.
 暗号化差分データに装置固有番号が含まれない場合、対象でない装置で復号されても、差分情報は適用されてしまう。そのため、暗号化差分データに装置固有番号が含まれない場合は、対象でない装置で復号されないように、装置ごとに異なる復号鍵を用意する必要があるため、管理コストが増大する。 If the device-specific number is not included in the encrypted difference data, the difference information is applied even if decrypted by a non-target device. For this reason, if the device-specific number is not included in the encrypted difference data, it is necessary to prepare a different decryption key for each device so that it is not decrypted by a non-target device, which increases the management cost.
 しかしながら、本実施の形態に係る差分更新方法は、暗号化差分データに含まれる装置固有番号から差分情報を適用すべき対象装置を特定可能となるため、差分更新対象でない装置で復号されても、差分情報が対象でない装置に適用されるのを防ぐことできる。 However, the difference update method according to the present embodiment can identify the target device to which the difference information is to be applied from the device unique number included in the encrypted difference data. It is possible to prevent the difference information from being applied to a non-target device.
 したがって、復号鍵を対象装置ごとに用意する必要はなく、管理コストが低減される。
 また、差分データに含まれる装置固有番号をチェックすることで、差分データが誤った対象装置に適用されるのを防ぐことができる。
Therefore, it is not necessary to prepare a decryption key for each target device, and the management cost is reduced.
Further, by checking the device unique number included in the difference data, it is possible to prevent the difference data from being applied to the wrong target device.
 また、暗号化差分データは管理情報を含めた全体を暗号化しているため、データの改ざん、破損を防ぐことができる。 Also, since the encrypted differential data is encrypted in its entirety including management information, it is possible to prevent data from being altered or damaged.

Claims (5)

  1.  自身に固有の第1の装置固有番号を有する情報処理装置において、
     前記情報処理装置の装置構成を示す装置構成情報を暗号化した暗号化データ、および前記装置構成情報に対する差分装置構成情報と該差分装置構成情報を適用する装置を示す第2の装置固有番号とを含む差分データを暗号化した暗号化差分データを格納する記憶手段と、
     前記暗号化データおよび暗号化差分データを復号する復号手段と、
     前記情報処理装置の有する第1の装置固有番号と、前記差分データに含まれる第2の装置固有番号とが一致するかチェックするチェック手段と、
     前記第1および第2の装置固有番号が一致したときに、前記情報処理装置を動作可能にし、一致しなかったときは前記情報処理装置を動作不可とする制御手段と、
     前記第1および第2の装置固有番号が一致したときに前記差分装置構成情報に基づき前記装置構成情報を書き換える更新手段と、
     を備えることを特徴とする情報処理装置。
    In the information processing device having the first device unique number unique to itself,
    Encrypted data obtained by encrypting device configuration information indicating the device configuration of the information processing device, difference device configuration information for the device configuration information, and a second device unique number indicating a device to which the difference device configuration information is applied Storage means for storing encrypted differential data obtained by encrypting differential data including:
    Decryption means for decrypting the encrypted data and the encrypted differential data;
    Checking means for checking whether the first device unique number of the information processing device and the second device unique number included in the difference data match;
    Control means for enabling the information processing device to operate when the first and second device specific numbers match, and for disabling the information processing device when they do not match;
    Updating means for rewriting the device configuration information based on the difference device configuration information when the first and second device unique numbers match;
    An information processing apparatus comprising:
  2.  前記暗号化差分データは、前記暗号化差分データが作成された順番を示すシリアル番号をさらに含み、
     前記更新手段は、前記シリアル番号をチェックし、作成された順番で復号されているかをチェックすることを特徴とする請求項1記載の情報処理装置。
    The encrypted differential data further includes a serial number indicating the order in which the encrypted differential data was created,
    The information processing apparatus according to claim 1, wherein the updating unit checks the serial number and checks whether the serial number is decrypted in the created order.
  3.  自身に固有の第1の装置固有番号と、
     情報処理装置の装置構成を示す装置構成情報を暗号化した暗号化データ、および前記装置構成情報に対する差分装置構成情報と該差分装置構成情報を適用する装置の第2の装置固有番号とを含む差分データを暗号化した暗号化差分データを格納する記憶手段と、
     前記暗号化データおよび暗号化差分データを復号する復号手段と、
     を備える情報処理装置における前記装置構成情報の差分更新方法おいて、
     前記情報処理装置の有する第1の装置固有番号と前記差分データに含まれる第2の装置固有番号とが一致するかチェックし、
     前記第1および第2の装置固有番号が一致したときに前記情報処理装置を動作可能にし、一致しなかったときは前記情報処理装置を動作不可とし、
     前記第1および第2の装置固有番号が一致したときに前記差分装置構成情報に基づき前記装置構成情報を書き換える差分更新方法。
    A first device unique number unique to itself, and
    Encrypted data obtained by encrypting the device configuration information indicating the device configuration of the information processing device, and a difference including the difference device configuration information for the device configuration information and the second device unique number of the device to which the difference device configuration information is applied Storage means for storing encrypted differential data obtained by encrypting data;
    Decryption means for decrypting the encrypted data and the encrypted differential data;
    In the apparatus configuration information difference update method in the information processing apparatus comprising:
    Check whether the first device unique number of the information processing device and the second device unique number included in the difference data match,
    Enabling the information processing device to operate when the first and second device unique numbers match, and disabling the information processing device when they do not match,
    A difference update method for rewriting the device configuration information based on the difference device configuration information when the first and second device unique numbers match.
  4.  前記暗号化差分データは、前記暗号化差分データが作成された順番を示すシリアル番号をさらに含み、
     前記シリアル番号をチェックし、作成された順番で復号されているかをチェックするステップをさらに含むことを特徴とする請求項3記載の差分更新方法。
    The encrypted differential data further includes a serial number indicating the order in which the encrypted differential data was created,
    4. The difference update method according to claim 3, further comprising a step of checking the serial number and checking whether the serial number is decrypted in the created order.
  5.  第1の装置固有番号を有する情報処理装置において、
     前記情報処理装置の初期状態における装置構成を示す初期装置構成情報を暗号化した暗号化データ、および前記初期装置構成情報に対する装置構成の差分を示す差分装置構成情報と該差分装置構成情報を適用する情報処理装置を示す第2の装置固有番号とを含む差分データを暗号化した暗号化差分データを格納する記憶手段と、
     前記暗号化データおよび暗号化差分データを復号する復号手段と、
     前記情報処理装置の有する第1の装置固有番号と、復号された差分データに含まれる第2の装置固有番号とが一致するかチェックするチェック手段と、
     前記第1および第2の装置固有番号が一致したときに、前記差分装置構成情報に基づき自身の装置構成情報を書き換える更新手段とを備えることを特徴とする情報処理装置。
    In the information processing device having the first device unique number,
    Encrypted data obtained by encrypting initial device configuration information indicating the device configuration in the initial state of the information processing device, differential device configuration information indicating a difference in device configuration with respect to the initial device configuration information, and the differential device configuration information are applied. Storage means for storing encrypted differential data obtained by encrypting differential data including a second device unique number indicating an information processing device;
    Decryption means for decrypting the encrypted data and the encrypted differential data;
    Check means for checking whether the first device unique number of the information processing device and the second device unique number included in the decoded difference data match;
    An information processing apparatus comprising: an updating unit that rewrites its own device configuration information based on the difference device configuration information when the first and second device unique numbers match.
PCT/JP2008/000442 2008-03-04 2008-03-04 Apparatus structure information updating method and information processing apparatus WO2009110024A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2008/000442 WO2009110024A1 (en) 2008-03-04 2008-03-04 Apparatus structure information updating method and information processing apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2008/000442 WO2009110024A1 (en) 2008-03-04 2008-03-04 Apparatus structure information updating method and information processing apparatus

Publications (1)

Publication Number Publication Date
WO2009110024A1 true WO2009110024A1 (en) 2009-09-11

Family

ID=41055606

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2008/000442 WO2009110024A1 (en) 2008-03-04 2008-03-04 Apparatus structure information updating method and information processing apparatus

Country Status (1)

Country Link
WO (1) WO2009110024A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002519781A (en) * 1998-06-30 2002-07-02 イーエムシー コーポレーション Method and apparatus for authenticating a connection to a storage system connected to a network
JP2003058238A (en) * 2001-08-21 2003-02-28 Nissin Electric Co Ltd Monitoring and controlling method
JP2005275494A (en) * 2004-03-23 2005-10-06 Hitachi Ltd Storage system and remote copy method for storage system
JP2006139489A (en) * 2004-11-11 2006-06-01 Nippon Telegr & Teleph Corp <Ntt> Method for restoring environment of common use personal computer system and common use personal computer

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002519781A (en) * 1998-06-30 2002-07-02 イーエムシー コーポレーション Method and apparatus for authenticating a connection to a storage system connected to a network
JP2003058238A (en) * 2001-08-21 2003-02-28 Nissin Electric Co Ltd Monitoring and controlling method
JP2005275494A (en) * 2004-03-23 2005-10-06 Hitachi Ltd Storage system and remote copy method for storage system
JP2006139489A (en) * 2004-11-11 2006-06-01 Nippon Telegr & Teleph Corp <Ntt> Method for restoring environment of common use personal computer system and common use personal computer

Similar Documents

Publication Publication Date Title
US8411863B2 (en) Full volume encryption in a clustered environment
JP4620146B2 (en) Information processing apparatus and authentication method
CN100380274C (en) Method and system for backup and restore of a context encryption key
EP3190543A1 (en) Method of dynamically encrypting fingerprint data and related fingerprint sensor
US8195956B2 (en) Re-keying data in place
EP1855281A2 (en) Apparatus for writing data to a medium
US20090245522A1 (en) Memory device
CN102262721B (en) Data encryption for independent agency is changed
US8650654B2 (en) Memory device, memory system, and authentication method
CN101118773A (en) Storage device and storage method, and information-processing device and information-processing method
CN101231622A (en) Data storage method and equipment base on flash memory, as well as data fetch method and apparatu
JP2009111687A (en) Storage device, and encrypted data processing method
CN102982265B (en) Authentication method for storing basic input and output system (BIOS) setting
WO2019142307A1 (en) Semiconductor device, update data-providing method, update data-receiving method, and program
US20080205654A1 (en) Method and Security System for the Secure and Unequivocal Encoding of a Security Module
KR101503581B1 (en) Processing device, processing method, and computer-readable recording medium storing processing program
US10540298B2 (en) Protected datasets on tape cartridges
KR100963417B1 (en) RFID Security Apparatus for comprising Security Function and Method thereof
JP2007282064A (en) Device and method for processing data, storage medium and program
WO2009110024A1 (en) Apparatus structure information updating method and information processing apparatus
US20150249467A1 (en) Storage device, controller, and data writing method
US20080002826A1 (en) Copyright protection system, copyright protection device and video processing apparatus
CN113127814B (en) Software anti-copying method and device, electronic equipment and readable storage medium
JP5370695B2 (en) Storage device control system and storage device management method for storage device control system
US20080075282A1 (en) Data recording device, and data management method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08720328

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08720328

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP