WO2010061561A1 - 監視システム、プログラム実行装置、監視プログラム、記録媒体及び集積回路 - Google Patents
監視システム、プログラム実行装置、監視プログラム、記録媒体及び集積回路 Download PDFInfo
- Publication number
- WO2010061561A1 WO2010061561A1 PCT/JP2009/006260 JP2009006260W WO2010061561A1 WO 2010061561 A1 WO2010061561 A1 WO 2010061561A1 JP 2009006260 W JP2009006260 W JP 2009006260W WO 2010061561 A1 WO2010061561 A1 WO 2010061561A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- update
- monitoring
- module
- modules
- unit
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Definitions
- the present invention relates to a monitoring system and a program execution device for monitoring an illegal operation of a program operating inside a device.
- Patent Document 1 discloses a technique in which a large number of programs perform mutual monitoring for alterations and improve the certainty of alteration detection for one program. Specifically, as shown in FIG. 61, each of the monitoring modules A and B detects whether the program (main program A and B) to be protected from alteration by an attacker and other modules have been tampered with. Each check program includes information (check information A and B) necessary for detecting falsification, such as a program for checking (check programs A and B) and a hash value of a falsification detection target program.
- the check program A uses the check information A to detect falsification of the main body program B and the check program B of the monitoring module B.
- the check program B uses the check information B to detect falsification of the main body program A and the check program A of the monitoring module A.
- the invalidation of the monitoring module can be prevented by invalidating the monitoring module.
- the update module monitored by the module is not monitored by other modules, and the security strength of the system is lowered.
- one monitoring module is configured to be monitored by a plurality (for example, 10) of monitoring modules, if one of the plurality of monitoring modules is disabled, 9 monitoring modules monitor one monitoring module.
- the security strength as a system is not lowered and the security strength is sharply lowered as the number of monitoring modules to be invalidated increases thereafter.
- the present invention provides a monitoring system, a program execution device, a monitoring program, a recording medium, and an integration that can maintain the security strength even when an invalid update module is invalidated or a new update module is added.
- An object is to provide a circuit.
- a monitoring system is a monitoring system including a program execution device and a server device, and the program execution device includes a plurality of modules. And at least two of the plurality of modules are monitoring modules that monitor unauthorized operations of other modules, and each of the monitoring modules is monitoring destination information indicating one or more modules that are monitored for unauthorized operations.
- a monitoring device that collects the monitoring results of each of the monitoring modules, a specifying unit that specifies a module that performs an illegal operation among all the modules based on all the collected monitoring results, The monitoring destination information that is the same as the monitoring destination information that each holds is held, and the monitoring destination information is reconfigured so that each of the remaining modules excluding the identified module from all the modules is monitored from at least one monitoring module And a transmission means for transmitting the new monitoring destination information after the change to the monitoring module in which the monitoring destination information is changed by the reconfiguration.
- the monitoring system has the above-described configuration, and thus performs an illegal operation when a module that has been monitored or a module that is monitoring another module performs an illegal operation. Even if a module is invalidated, etc., by reconfiguring and updating the monitoring destination information, it is possible to prevent some modules from being monitored by other modules and to prevent the security strength of the system from decreasing. .
- FIG. 1 is an overall configuration diagram of a software update system 10 according to Embodiment 1 of the present invention.
- Configuration diagram of device 100 according to Embodiment 1 of the present invention Configuration diagram of update module group 130 in Embodiment 1 of the present invention Hardware configuration diagram according to Embodiment 1 of the present invention
- Configuration diagram of update server 200 in Embodiment 1 of the present invention Configuration diagram of update module according to Embodiment 1 of the present invention Configuration diagram of monitoring pattern information in Embodiment 1 of the present invention
- the block diagram of the protection control module 120 in Embodiment 1 of this invention Configuration diagram of access control module 140 according to Embodiment 1 of the present invention
- Configuration diagram of update software distribution unit 220 according to Embodiment 1 of the present invention The block diagram of the module invalidation part 230 in Embodiment 1 of this invention Configur
- FIG. 11 is a diagram showing the priority of processing at the time of recovery in the first embodiment of the present invention.
- Configuration diagram of update module according to Embodiment 2 of the present invention The figure of the monitoring pattern update verification example in Embodiment 2 of this invention
- Configuration diagram of monitoring pattern update unit 250 according to Embodiment 2 of the present invention Sequence diagram of monitoring pattern update processing in Embodiment 2 of the present invention Sequence diagram of update processing to new monitoring pattern in embodiment 2 of the present invention
- FIG. 10 is a diagram illustrating a configuration example of shared information held by the update module according to the third embodiment of the present invention.
- a program execution device is a program execution device including a plurality of monitoring modules that monitor other modules, and the first monitoring module indicates one or more monitoring modules to be monitored.
- Holding means for holding the destination information, and update means for updating the monitoring destination information held by the holding means to the new monitoring destination information when the new monitoring destination information for update is acquired from the server device,
- a second monitoring module configured to check whether or not the update has been normally performed when the monitoring destination information is updated by the first monitoring module; Transmitting means for transmitting to the apparatus.
- the second monitoring module checks whether or not the update has been normally performed. It is possible to reliably grasp the situation where the monitoring destination information is not normally updated, such as when the monitoring destination information is not updated properly intentionally due to falsification.
- the server device side can also know that the monitoring destination information has not been updated normally on the program execution device side.
- the server device tries to update the monitoring destination information again by retransmitting the monitoring destination information, or invalidates the first monitoring module that does not intentionally update the monitoring destination information. By doing so, it is possible to prevent the first monitoring module from operating according to monitoring destination information that is not in a normal state, and to prevent the security strength of the system from being lowered.
- the confirmation unit holds an expected value of the summary value to be generated from the monitoring destination information held by the first monitoring module in advance, and the monitoring destination held by the holding unit of the first monitoring module A summary value may be generated from the information, and the confirmation may be performed by comparing the generated summary value with the expected value.
- the first monitoring module when the first monitoring module acquires the new monitoring destination information, the first monitoring module stops monitoring the module indicated by the monitoring destination information before update, and issues an execution instruction based on transmission of the confirmation result from the server device. When received, the module indicated by the new monitoring destination information may be monitored.
- the monitoring operation by the first monitoring module can be stopped until an execution instruction is received from the server device.
- the monitoring operation can be started after confirming that the monitoring destination information has been successfully updated by the server device.
- the first monitoring module may further back up the monitoring destination information prior to the update, and discard the backup when the execution instruction is received.
- the first monitoring module may perform a rollback process using the backup when the execution instruction is not received.
- the program execution device when it is not possible to confirm that the monitoring destination information has been normally updated by the server device, the program execution device replaces the new monitoring destination information that has not been normally updated with the monitoring destination before the update.
- the unauthorized operation can be monitored using information.
- the second monitoring module further includes holding means for holding monitoring destination information indicating one or more modules to be monitored, and when the new monitoring destination information for update is acquired from the server device, Updating means for updating the monitoring destination information held by the holding means related to the second monitoring module to the new monitoring destination information, wherein the first monitoring module further relates to the second monitoring module
- the update unit includes a confirmation unit that confirms whether the update is normally performed, and a transmission unit that transmits the result of the confirmation to the server device. Also good.
- the new monitoring destination information may be configured such that each monitoring module is monitored from at least one other monitoring module.
- the updating unit acquires integrated monitoring destination information including monitoring destination information for updating for each of the one or more monitoring modules, and updates monitoring destination information to be held by the own monitoring module from the integrated monitoring destination information It is good also as extracting and acquiring.
- a monitoring program is a monitoring program including a plurality of monitoring modules that monitor other modules, and the first monitoring module is monitoring destination information indicating one or more monitoring modules to be monitored. And a updating step for updating the monitoring destination information held by the holding means to the new monitoring destination information when the new monitoring destination information for update is acquired from the server device.
- the monitoring module confirms whether or not the update has been normally performed, and sends the result of the confirmation to the server device.
- a transmission step of transmitting is a transmission step of transmitting.
- a recording medium is a computer-readable recording medium that stores a monitoring program, and the monitoring program includes a plurality of monitoring modules that monitor other modules, and the first monitoring module includes: A holding step for holding monitoring destination information indicating one or more monitoring modules to be monitored, and the monitoring destination information held by the holding means when the new monitoring destination information for update is acquired from the server device. An update step for updating to new monitoring destination information, and when the second monitoring module updates the monitoring destination information by the first monitoring module, it is determined whether or not the update has been normally performed. A confirmation step of confirming, and a transmission step of transmitting a result of the confirmation to the server device.
- An integrated circuit is an integrated circuit including a plurality of monitoring modules for monitoring other modules, and the first monitoring module is monitoring destination information indicating one or more monitoring modules to be monitored. And holding means for updating the monitoring destination information held by the holding means to the new monitoring destination information when the new monitoring destination information for update is acquired from the server device.
- the monitoring module includes a confirmation unit for confirming whether or not the updating is performed normally, and a result of the confirmation to the server device. Transmitting means for transmitting.
- the second monitoring module checks whether or not the update has been normally performed. It is possible to reliably grasp the situation where the monitoring destination information is not normally updated, such as when the monitoring destination information is not updated properly intentionally due to falsification.
- the server device side can also know that the monitoring destination information has not been updated normally on the program execution device side.
- the server device tries to update the monitoring destination information again by retransmitting the monitoring destination information, or invalidates the first monitoring module that does not intentionally update the monitoring destination information.
- FIG. 1 is an overall configuration diagram of a software update system 10 according to Embodiment 1 of the present invention.
- the software update system 10 includes a device 100 that is an information processing apparatus of the present invention and an update server 200 that is a management apparatus of the present invention. Connected through.
- the device 100 is an information processing apparatus that provides various functions using a network to a user. Specifically, the device 100 purchases and reproduces music content, video content, and the like via a network. Further, the device 100 uses a net banking service (balance inquiry, transfer, etc.) via the network.
- a net banking service balance inquiry, transfer, etc.
- the device 100 includes an application 110, an application 111, a protection control module 120, an update module group 130, and an access control module 140, as shown in FIG.
- the application 110 and the application 111 are software for providing various functions to a user who uses the device 100 via a network. For example, purchase music content and video content from a content distribution server (not shown), access software that plays back the purchased content, or a financial institution system (not shown), and perform online banking such as balance inquiry and transfer Software to do.
- the application 110 and the application 111 have secret data such as an authentication key for authenticating with a content distribution server or a financial institution system.
- the confidential data is data that needs to be protected from being illegally extracted and extracted from the application by a malicious third party (attacker).
- the protection control module 120 is a module that controls a function for protecting the application (110, 111) so that the attacker (100, 111) is analyzed and secret data such as an authentication key is not extracted. As a function to protect the application, it is encrypted and saved when not using the application, and it is decrypted and loaded into memory only when the application is used, and whether the application has been tampered with is checked. There is a falsification detection function that performs the analysis, and an analysis tool detection function that checks whether an analysis tool such as a debugger does not operate.
- the protection control module 120 controls the operation of these functions and checks whether the app (110, 111) has been analyzed by an attacker. When the protection control module 120 detects an attack on the application (110, 111), the operation of the application (110, 111) is stopped, and the memory used by the application (110, 111), particularly confidential data is recorded. The memory area is cleared to prevent leakage of confidential data.
- FIG. 3 is a configuration diagram of the update module group 130 according to the first embodiment.
- the update module group 130 includes an update module 131, an update module 132, and an update module 133.
- the update module 131, the update module 132, and the update module 133 receive update software from the update server 200 outside the device 100, and use the received update software to use software (application 110) inside the device 100. , App 111, protection control module 120, etc.).
- the update module group 130 detects each other's tampering with each other in order to prevent each update module from being tampered with by an attacker and using each update module illegally. Thereby, even when a part of the update module group 130 is attacked and tampered with, it can be detected and the attack can be dealt with.
- the configuration of each update module (131, 132, 133) will be described later.
- the access control module 140 holds access information necessary for the update modules (131, 132, 133) to delete other modules.
- the access information is information necessary for erasing a module to be erased (such as an address where the module is arranged and a procedure manual in which a procedure necessary for erasure is written).
- the access control module 140 holds access information encrypted with an individual access information acquisition key for each module to be erased.
- the access control module 140 and the update module group 130 are incorporated in the OS 150.
- the application 110 and the application 111 operate on the OS 150, and the protection control module 120 and the boot loader 160 are outside the management of the OS 150.
- the protection control module 120 and the update module group 130 are activated, and then the application is executed.
- the device 100 includes a CPU (Central Processing Unit) 171, a nonvolatile memory (for example, EEPROM (Electrically Erasable and Programmable Read Only Memory) 172, RAM (Random Access Memory IC 17 ⁇ / b> Mem ICN), RAM (Random Access Memory IC 17) Card) 174 and the like, which are communicably connected to each other via a bus.
- a CPU Central Processing Unit
- nonvolatile memory for example, EEPROM (Electrically Erasable and Programmable Read Only Memory) 172
- RAM Random Access Memory IC 17 ⁇ / b> Mem ICN
- RAM Random Access Memory IC 17
- the EEPROM 172 stores a protection control module 120, update modules (131, 132, 133), applications (110, 111), and the like.
- each functional unit of the various modules is realized.
- Each functional unit is specifically described by a computer program.
- the RAM 173 is used as a work area for the CPU 171.
- the update module (131, 132, 133) and the application (110, 111) are loaded in the RAM 173.
- the update module operating on the RAM 173 is subject to tampering check and invalidation by the protection control module 120.
- the NIC 174 is an expansion card for connecting to a network.
- the update server 200 is a device that distributes update software necessary for updating the software in the device 100.
- FIG. 5 is a configuration diagram of the update server 200 according to the first embodiment.
- the update server 200 includes a determination unit 210, an update software distribution unit 220, a module invalidation unit 230, a module addition unit 240, a monitoring pattern update unit 250, and a communication unit 260.
- the determination unit 210 should be executed next by the device 100 using a predetermined determination criterion according to the state of software (the applications 110 and 111, the protection control module 120, and the update module group 130) in the device 100. Determine processing. Then, it instructs each module (update software distribution unit 220, module invalidation unit 230, module addition unit 240, monitoring pattern update unit 250) inside the update server 200.
- the update software distribution unit 220 operates in cooperation with the update module group 130 in response to an update processing start instruction from the determination unit 210 when updating the software (applications 110 and 111 and the protection control module 120) inside the device 100. Then, the update software is securely transmitted to the device 100.
- the module invalidation unit 230 When the module invalidation unit 230 invalidates the update module of the update module group 130 of the device 100, the module invalidation unit 230 operates in cooperation with the update module group 130 in accordance with the module invalidation instruction of the determination unit 210, and acquires access information. The key is distributed to the update module that performs the invalidation process of the update module to be invalidated.
- the module addition unit 240 When the module addition unit 240 adds an update module to the update module group 130 of the device 100, the module addition unit 240 cooperates with the update module group 130 in accordance with the module addition instruction from the determination unit 210, and adds the update module for addition to the device 100. Send securely.
- the monitoring pattern update unit 250 updates the monitoring pattern of the update module group 130 of the device 100
- the monitoring pattern update unit 250 cooperates with the update module group 130 in accordance with the monitoring pattern update instruction of the determination unit 210, and Data necessary for updating the monitoring pattern of the update module is transmitted.
- the communication unit 260 transmits / receives information to / from the device 100.
- the communication unit 260 outputs the information received from the device 100 to each unit of the update server 200 according to the type of information.
- the communication unit 260 receives instructions and information from each unit of the update server 200 and transmits them to the device 100.
- the communication unit 260 transmits an instruction, a notification, or the like received from the update software distribution unit 220 to the device 100 during the update process, or the falsification detection result received from the device 100 is determined by the determination unit 210. Or send to.
- the communication unit 260 transmits and receives instructions and information between the module invalidation unit 230 and the device 100 in the invalidation process.
- the communication unit 260 transmits and receives instructions and information between the module addition unit 240 and the device 100 in the addition process, and instructions and information between the monitoring pattern update unit 250 and the device 100 in the monitoring pattern update process. Send and receive.
- the device 100 and the update server 200 are connected via a network, and when updating the software (applications 110 and 111, protection control module 120) in the device 100, the update module group 130 and the update software distribution unit 220 are updated. Operate in cooperation with each other and install update software in order to update the software in the device 100.
- the linking unit 230 operates in cooperation and erases the tampered software.
- the update modules that have not been tampered with and the module addition unit 240 operate in cooperation to add the update modules.
- the monitoring pattern update unit 250 and the update module group 130 operate in cooperation to change the monitoring pattern. Update.
- communication between the device 100 and the update server 200 may use a communication path that ensures security by encrypting data or the like.
- FIG. 6 is a configuration diagram of the update module 131.
- the update module 131 includes an update module main body, an update module verification certificate, a MAC (Message Authentication Code) value table, and monitoring pattern information.
- MAC Message Authentication Code
- the update module body is a program that performs software update processing. Details of the update module main body will be described later.
- the update module verification certificate is a certificate for verifying whether the update module itself has been tampered with.
- the module that verifies the update module body acquires the update module body and the verification certificate, and verifies whether the update module body has been tampered with.
- the MAC value table is a table used when the MAC value is used for verifying whether the module has been tampered with.
- a module identifier for identifying a module and a MAC value corresponding to the module are stored as a pair.
- Module tampering detection is performed by acquiring the target module, calculating the MAC value, and comparing the calculated MAC value with the MAC value of the target module stored in the MAC value table.
- the monitoring pattern information is information related to the monitoring target when the update module performs mutual monitoring.
- FIG. 7 is a configuration diagram of monitoring pattern information.
- the monitoring pattern information includes a monitoring pattern body, a monitoring frequency, and a verification value list.
- monitoring pattern body information (for example, module identifier, memory location, size, address, file name, etc.) related to the monitoring target module is described.
- a plurality of monitoring patterns can be described in the monitoring pattern body. When a plurality of monitoring patterns are described, each is distinguished by a monitoring pattern identifier.
- the number of monitoring patterns and the size of each monitoring pattern are described as header information at the beginning, and a set of monitoring pattern identifiers and monitoring patterns is described thereafter.
- the monitoring frequency is information related to the timing of monitoring the monitoring target described in the monitoring pattern body. Since the monitoring frequency can be arbitrarily adjusted by including the monitoring frequency in the monitoring pattern information, it is possible to appropriately verify that the update module has been tampered with.
- Information related to timing includes the time at which monitoring is performed, and the time interval when repeated monitoring is performed.
- the monitoring frequency may be described for each monitoring pattern. In that case, the monitoring frequency and the monitoring pattern identifier of the monitoring pattern using the monitoring frequency are described. Moreover, you may describe the timing which selects the monitoring pattern to be used among several monitoring patterns.
- the update modules 131, 132, 133 monitor the modules described in the monitoring pattern according to the timing information.
- the verification value list describes the verification value for verifying whether the monitoring pattern body and the monitoring frequency have been correctly acquired from the update server 200 and updated.
- FIG. 8 is a configuration diagram of the update module main body in the update module 131.
- the update module main body includes a reception unit 301, a transmission unit 302, a control unit 303, an update unit 304, a verification unit 305, a MAC value generation unit 306, a MAC value table update unit 307, and a monitoring pattern acquisition unit 308.
- the monitoring pattern update unit 309 and the distributed information holding unit 310 are configured.
- the receiving unit 301 receives various instructions, notifications, and update software from the update server 200.
- the receiving unit 301 receives an update module body and an update module verification certificate of other update modules necessary for mutual monitoring. Furthermore, the reception unit 301 receives the result of the processing requested to another module, or receives the monitoring result of the protection control module 120 by another update module.
- the transmission unit 302 transmits data such as various processing results and certificates to the update server 200, the protection control module 120, other update modules, and the access control module 140.
- the control unit 303 controls the update unit 304, the verification unit 305, and the monitoring pattern update unit 309 based on various instructions and notifications received by the reception unit 301, and updates the protection control module 120, the update module 132, and the update module 133. Processing, verification processing, and monitoring pattern update processing are performed.
- the update unit 304 updates the software (applications 110 and 111, the protection control module 120, the update modules 132 and 133) in the device 100 in cooperation with the update server 200.
- the verification unit 305 verifies whether or not the protection control module 120 and the update modules 132 and 133 are valid.
- a verification method there are a method using a verification certificate added to each module and a method using a pre-calculated message authentication code (MAC) value.
- MAC message authentication code
- the monitoring pattern information describes which module the verification unit 305 verifies at which timing.
- the verification unit 305 acquires the monitoring pattern body and the monitoring frequency from the monitoring pattern information, and performs verification according to the information.
- the monitoring pattern to be used and the monitoring frequency are changed according to an instruction from the update server 200.
- the update server 200 may instruct the monitoring pattern to be used and the monitoring frequency each time, or may be instructed by using a time chart describing which monitoring pattern and monitoring frequency are to be monitored at which time. May be.
- the state of the device 100 includes “protection control module update state”, “protection control module non-update state”, “verification processing”, “analysis / judgment processing”, “recovery processing”, and the like.
- the monitoring frequency is lowered with a rough monitoring pattern
- the state of the device 100 is “protection control module update state”
- monitoring is performed with a fine monitoring pattern. The frequency may be increased.
- the update module is more strictly verified at the time of recovery of the protection control module 120, so that it is possible to more effectively prevent the update module from being tampered with and preventing normal operation of the update module.
- the MAC value generation unit 306 generates a MAC value used by the verification unit 305.
- the MAC value generation unit 306 generates a MAC value using a verification key held in advance.
- the MAC value table update unit 307 updates the MAC value table in which the MAC value of each module is stored.
- the monitoring pattern acquisition unit 308 acquires a monitoring pattern in which a monitoring target module is described when the verification unit 305 performs the verification process.
- the identifier of the monitoring pattern to be acquired is instructed from the verification unit 305, and the monitoring pattern acquisition unit 308 acquires the instructed monitoring pattern from the monitoring pattern information.
- the monitoring pattern update unit 309 When the monitoring pattern update unit 309 receives a monitoring pattern update instruction from the update server 200, the monitoring pattern update unit 309 performs a process of updating the monitoring pattern held by the module (update module 131) to a new monitoring pattern received from the update server 200. .
- the shared information holding unit 310 distributes shared information (share) generated from the encryption / decryption key used when the protection control module 120 performs encryption / decryption processing of the application (110, 111), and the protection control module 120 distributes the shared information. Hold the placement information when The arrangement information is information describing which distributed information is distributed to which update module.
- FIG. 9 is a configuration diagram of the protection control module 120 of the device 100.
- the protection control module 120 includes a reception unit 401, a transmission unit 402, a control unit 403, a decryption load unit 404, a falsification detection unit 405, an analysis tool detection unit 406, an encryption / decryption key holding unit 407, an encryption / decryption.
- the key generation unit 408, the encryption / decryption key distribution unit 409, the certificate generation unit 410, and the encryption / decryption key restoration unit 411 are configured.
- the receiving unit 401 receives distributed information and various requests from the update modules 131, 132, and 133.
- the transmission unit 402 transmits various requests to the update modules 131, 132, and 133.
- the control unit 403 controls the decryption load unit 404, the falsification detection unit 405, and the analysis tool detection unit 406, and detects when the application (110, 111) is attacked by an attacker.
- the decryption load unit 404 performs a process of decrypting using the encryption / decryption key and loading it onto the memory when executing the application (110, 111) encrypted and held in the device 100. Further, when a context switch to another application occurs during execution of the application (110, 111), the data on the memory is encrypted using the encryption / decryption key. When the context is switched to the application (110, 111) again, the encrypted data is decrypted.
- the decryption load unit 404 decrypts the application (110, 111) using the restored encryption / decryption key input from the encryption / decryption key restoration unit 411 in the re-encryption process described later, and holds the encryption / decryption key.
- the application (100, 111) is encrypted using the new encryption / decryption key held by the unit 407.
- the falsification detection unit 405 executes a falsification detection process that detects whether the application (110, 111) has been falsified.
- the falsification detection unit 405 may perform falsification detection processing using a falsification detection certificate added to the application (110, 111), or may use a method of comparing MAC values.
- the analysis tool detection unit 406 detects an analysis tool such as a debugger when it is installed or operated. This is because it is assumed that an unauthorized attacker installs or operates an analysis tool in order to attack the application (110, 111).
- a detection method for example, a method of searching for a file name, a method of checking whether a special register used by the debugger is used, a method of detecting an interrupt set by the debugger, or the like is used.
- the encryption / decryption key holding unit 407 holds an encryption / decryption key for encrypting / decrypting the applications (110, 111).
- the encryption / decryption key generation unit 408 generates an encryption / decryption key for encrypting / decrypting the application (110, 111).
- the encryption / decryption key distribution unit 409 generates distributed information from the encryption / decryption key using the secret sharing method at the time of initial design and preparation for the next round.
- the certificate generation unit 410 generates a certificate used for verifying whether or not the distributed information generated from the encryption / decryption key has been correctly restored.
- the encryption / decryption key restoration unit 411 acquires shared information from each update module based on the configuration of the update module, and restores the encryption / decryption key from the acquired shared information.
- the configuration of the update module is arrangement information of shared information in the update module group 130.
- the encryption / decryption key restoration unit 411 outputs the restored encryption / decryption key to the decryption load unit 404.
- FIG. 10 is a configuration diagram of the access control module 140 of the device 100. As shown in the figure, the access control module 140 includes a receiving unit 501, a transmitting unit 502, and an access information holding unit 503.
- the receiving unit 501 receives, from the update modules (131, 132, 133), an access information acquisition request that is information necessary for deleting the altered update module.
- the transmission unit 502 transmits the access information to the update module that has requested the access information acquisition.
- the access information holding unit 503 holds, for each of the update modules 131, 132, and 133, access information for deleting the module.
- Each access information is given an identifier (update module identifier) of an update module to be erased, and is associated with the update module by the identifier.
- Each access information is encrypted with an access information acquisition key.
- the access information holding unit 503 transmits the access information with the identifier of the update module to be deleted to the update module via the transmission unit 502. To do.
- FIG. 11 is a configuration diagram of the determination unit 210 of the update server 200. As shown in the figure, the determination unit 210 includes a reception unit 601, an instruction unit 602, an instruction generation unit 603, an unauthorized module specification unit 604, a determination criterion reading unit 605, and a determination criterion storage unit 606.
- the reception unit 601 receives shared information, various requests, and the like from the update modules 131, 132, and 133, and outputs them to the instruction generation unit 603. Further, when the reception unit 601 receives a notification of completion of processing from each unit (update software distribution unit 220, module invalidation unit 230, module addition unit 240, monitoring pattern update unit 250) in the update server 200, the instruction is received. The data is output to the generation unit 603.
- the instruction unit 602 outputs the instruction generated by the instruction generation unit 603 to each unit in the update server 200.
- the instruction generation unit 603 determines the processing priority of the device 100 based on the determination criterion received from the determination criterion reading unit 605, and generates an instruction to be output to each unit in the update server 200.
- the instruction generation unit 603 instructs the module invalidation unit 230 to perform the update module invalidation process, and then performs the module addition unit 240 to perform the update module addition process. Then, the monitoring pattern update unit 250 is instructed to update the monitoring pattern.
- the instruction generation unit 603 instructs the update software distribution unit 220 to recover the protection control module 120, and then invalidates the update module to the module invalidation unit 230. Instruct processing. Thereafter, the module adding unit 240 is instructed to add an update module, and the monitoring pattern updating unit 250 is instructed to update the monitoring pattern.
- the unauthorized module identifying unit 604 determines whether the update module has been tampered with using the mutual monitoring results (tamper detection results) received from the update modules 131, 132, 133, and the update module has been tampered with. If it is determined, it identifies which update module has been tampered with. Furthermore, the unauthorized module specifying unit 604 determines whether or not the protection control module 120 has been tampered with, based on the tampering detection result for the protection control module 120 received from the update modules 131, 132, and 133.
- the determination criterion reading unit 605 reads the determination criterion stored in the determination criterion storage unit 606 and outputs the determination criterion to the instruction generation unit 603.
- the judgment criterion storage unit 606 stores judgment criteria given in advance.
- the determination criterion is a correspondence between the state of the device 100 and the processing priority.
- FIG. 12 is a configuration diagram of the update software distribution unit 220 of the update server 200.
- the update software distribution unit 220 includes a reception unit 701, a transmission unit 702, an encryption key generation unit 703, an encryption processing unit 704, an authentication unit 705, an update module selection unit 706, a control unit 707, a certificate.
- a generation unit 708, a signature private key holding unit 709, an update software holding unit 710, and an encryption key holding unit 711 are configured.
- the receiving unit 701 receives the falsification detection result of the protection control module 120 and the mutual monitoring result (falsification detection result) of other update modules from the update modules 131, 132, and 133.
- the transmission unit 702 When the transmission unit 702 needs to update the software (applications 110 and 111 and the protection control module 120) inside the device 100, the transmission unit 702 requests the update modules 131, 132, and 133 to start update processing, update software, and decryption. Send data such as keys necessary for.
- the encryption key generation unit 703 generates an encryption key used when transmitting the update software to the update modules 131, 132, and 133.
- the encryption processing unit 704 encrypts the update software using the encryption key generated by the encryption key generation unit 703. Further, the encryption key is encrypted using a key unique to each update module.
- the authentication unit 705 performs mutual authentication with the update modules 131, 132, 133 and the protection control module 120.
- the update module selection unit 706 selects which update module is used for the update process when the protection control module 120 is updated. Then, the update module selection unit 706 encrypts the encryption key used for encryption of the protection control module for update using a key unique to the selected update module, and transmits the encryption key to the selected update module.
- the control unit 707 controls each component in the update software distribution unit 220. Specifically, the control unit 707 performs multiple encryption of update software using multiple encryption keys, encryption of multiple encryption keys used for multiple encryption, and encrypted update software and encryption key Control transmission to the update module.
- the encryption key and the update software are not transmitted to the update modules 131, 132, and 133 at a time, but at the timing when each piece of data is required in the update process, 132 and 133.
- the certificate generation unit 708 generates an authentication certificate for the authentication public keys of the update modules 131, 132, and 133 using the signature private key. Also, the certificate generation unit 708 generates an update verification certificate for the new protection control module for update. The update verification certificate is used to verify whether or not the protection control module has been correctly updated.
- the signature private key holding unit 709 holds a signature private key used for certificate generation by the certificate generation unit 708.
- the update software holding unit 710 holds an update protection control module for updating when the protection control module 120 is attacked.
- the encryption key holding unit 711 holds the encryption key generated by the encryption key generation unit 703 and the encryption key encrypted by the encryption processing unit 704.
- FIG. 13 is a configuration diagram of the module invalidation unit 230 of the update server 200. As shown in the figure, the module invalidation unit 230 includes a reception unit 801, a transmission unit 802, an access information acquisition key holding unit 803, and an update module selection unit 804.
- the receiving unit 801 receives an instruction from the determining unit 210 to delete the update module that has been tampered with illegally.
- the receiving unit 801 receives an access information acquisition key acquisition request from the update modules 131, 132, and 133 of the device 100.
- the transmission unit 802 transmits the access information acquisition key to the requested update module.
- the access information acquisition key holding unit 803 holds an access information acquisition key for decrypting the access information held by the access control module 140.
- the update module selection unit 804 selects an update module that performs an invalidation process for erasing an invalidation target update module (an update module determined to have been tampered with), and instructs the selected update module to perform the invalidation process.
- an update module that performs invalidation process for erasing an invalidation target update module (an update module determined to have been tampered with)
- the update module selection unit 804 adds an access information acquisition key to which the identifier of the update module to be deleted is added. Is transmitted to the update module that performs the invalidation process.
- FIG. 14 is a configuration diagram of the module adding unit 240 of the update server 200.
- the module adding unit 240 includes a receiving unit 901, a transmitting unit 902, an update module selecting unit 903, an update module holding unit 904, an update module dividing unit 905, and a control unit 906.
- the receiving unit 901 receives an instruction to add an update module from the determination unit 210 and a list of update modules included in the update module group 130 at this time.
- the transmission unit 902 transmits to the device 100 an update module for addition and a verification value for verifying whether the update module has been added correctly. In addition, the transmission unit 902 notifies the determination unit 210 of the end of the update module addition processing.
- the update module selection unit 903 selects an update module for performing update module addition processing from the list of update modules received from the determination unit 210.
- the update module holding unit 904 holds an update module for addition.
- the update module dividing unit 905 acquires one update module for addition from the update module holding unit 904, and divides the update module for addition according to the number selected by the update module selecting unit 903.
- the update module dividing unit 905 transmits the divided update module to each update module selected by the update module selecting unit 903.
- the control unit 906 controls update module addition processing in cooperation with the determination unit 210 and the update modules 131, 132, and 133.
- FIG. 15 is a configuration diagram of the monitoring pattern update unit 250 of the update server 200.
- the monitoring pattern update unit 250 includes a receiving unit 1001, a transmitting unit 1002, a monitoring pattern generating unit 1003, a monitoring pattern dividing unit 1004, and a control unit 1005.
- the receiving unit 1001 receives the monitoring pattern update instruction and the list of update modules included in the update module group 130 at this time from the determination unit 210.
- the transmission unit 1002 transmits an update monitoring pattern to the device 100.
- the transmission unit 1002 notifies the determination unit 210 of the end of the monitoring pattern update process.
- the monitoring pattern generation unit 1003 determines which update module monitors which update module from the list of update modules received from the determination unit 210, and generates a monitoring pattern.
- each update module may monitor all other update modules.
- the monitoring pattern dividing unit 1004 divides the monitoring pattern generated by the monitoring pattern generation unit 1003 into monitoring patterns for each update module. Then, the monitoring pattern dividing unit 1004 transmits the divided monitoring patterns as update monitoring patterns to the respective update modules.
- the control unit 1005 controls the monitoring pattern generation unit 1003 and the monitoring pattern division unit 1004 to perform monitoring pattern update processing.
- the installation process roughly includes the following nine processes.
- the first is the initial setting process.
- shared information generated by using the secret sharing method from various key data required for software update and data required after software update is embedded in each update module 131, 132, 133.
- the second is detection processing. In the detection process, it is detected whether the software (applications 110 and 111, protection control module 120) inside the device 100 has been tampered with.
- the third is analysis / judgment processing.
- the analysis / judgment processing when tampering is detected, it is determined which module has been tampered with, the cause of tampering is analyzed, and it is determined whether to update the software including the tampered module.
- update software in which the altered portion is corrected is generated, and the update modules 131, 132, and 133 are notified of the execution of the update process.
- the fourth is mutual authentication processing.
- mutual authentication process in order to confirm whether or not the update modules 131, 132, and 133 and the update software distribution unit 220 are correct software, mutual authentication processes are performed.
- the fifth is recovery processing.
- update software is installed in the device 100, and the original data is restored from the distributed information embedded in the update modules 131, 132, and 133.
- the sixth is the next round preparation process.
- distributed information for the next software update is generated and embedded in each update module.
- the seventh is invalidation processing.
- the invalidation process when it is detected in the detection process, the mutual authentication process, and the recovery process that the update modules 131, 132, 133 or the protection control module 120 has been tampered with, the tampered module is deleted.
- the eighth is additional processing.
- an update module is added when the number of update modules is decreased due to the invalidation process or when it is desired to increase the number of update modules in order to perform the installation process with certainty.
- the ninth is monitoring pattern update processing.
- the monitoring pattern update processing if the configuration of the update module group 130 is changed by invalidation processing or addition processing, the monitoring pattern is updated if the monitoring pattern needs to be updated.
- FIG. 16 is a flowchart showing an overall operation flow of the software update system 10.
- the software update system 10 performs an initial design process when the device 100 is manufactured at the factory, and embeds distributed information in each of the update modules 131, 132, and 133. Thereafter, the device 100 is shipped from the factory and used by the user.
- the device 100 When the device 100 is used by the user, the device 100 performs detection processing. Specifically, the protection control module 120 protects the apps (110, 111) from attacks by attackers. At the same time, the update modules 131, 132, and 133 detect falsification of the protection control module 120, and check whether the protection control module 120 is attacked.
- the update server 200 When the update server 200 receives a notification that the protection control module has been tampered with from the update module that has performed the detection process, the update server 200 performs an analysis / determination process. If it is determined that the protection control module 120 has been tampered with, the mutual authentication process, the recovery process, and the next round preparation process are performed, and then the process returns to the detection process.
- the software update system of the present invention all the above processes are not essential.
- the software update system only needs to have an update trigger (recovery process) given an external trigger.
- FIG. 18 is a sequence diagram showing the operation of the initial design process by the software update system 10.
- an application 110, 111
- a protection control module 120 an update module (131, 132, 133), etc. are installed in the nonvolatile memory of the device 100 (S1000).
- FIG. 17 is a diagram schematically illustrating a key embedded in the device 100.
- the update module 131 is shown, and the update modules 132 and 133 are omitted.
- the encryption / decryption key is embedded in the protection control module 120, and the signature public key, the verification key, and the authentication key pair are embedded in the update modules 131, 132, and 133 (at this time, the update key is still updated).
- a set of distributed information is not embedded in the module).
- update module identifiers for identifying the update modules are embedded in the update modules 131, 132, and 133, respectively, and installed in that state.
- the encryption / decryption key is a key for encrypting and decrypting the application (110, 111).
- the applications (110, 111) are stored in the nonvolatile memory in an encrypted state using the encryption / decryption key, and are executed after being decrypted by the protection control module 120 using the encryption / decryption key at the time of execution.
- the encryption / decryption of data used by the applications (110, 111) is performed using the encryption / decryption key at the timing of context switching.
- an analysis tool such as a debugger.
- the signature public key is a common key for all the update modules.
- the verification key and the authentication key pair are different keys in each update module.
- the protection control module 120 and the update modules 131, 132, 133 are also initialized.
- the protection control module 120 generates shared information from the encryption / decryption key using a secret sharing method (S1002). Further, the protection control module 120 uses the signature private key to generate a certificate (encryption / decryption key certificate) for confirming whether or not the encryption / decryption key was correctly restored when the encryption / decryption key was restored ( S1003).
- the protection control module 120 transmits the generated shared information and encryption / decryption key certificate to the update modules 131, 132, and 133 (S1004).
- the protection control module 120 generates the same number of shared information as the update module including the shared information holding unit 310. Then, each update module 131, 132, 133 transmits so as to hold different sets of shared information. Further, the protection control module 120 transmits shared information arrangement information indicating which shared information is transmitted to which update module. The same information for the encryption / decryption key certificate and the arrangement information is transmitted to all the update modules 131, 132, and 133.
- Patent Document 2 A method for generating shared information from the encryption / decryption key using the secret sharing method and a method for transmitting the shared information to the update module are described in detail in pages 47 to 49 of Patent Document 2.
- the private key d in Patent Document 2 correspond to the encryption / decryption key of the present embodiment
- making the certificate authority device correspond to the protection control module 120
- making the shared information holding device correspond to the update modules 131, 132, 133
- the same method as in Patent Document 2 can be used.
- the update module group 130 that has received the distributed information, the arrangement information, and the encryption / decryption key certificate from the protection control module 120 proceeds to the update module initialization process.
- FIG. 19 is a flowchart showing the update module initialization process. Although the update module 131 will be described here, the operations of the other update modules 132 and 133 are basically the same.
- the update module 131 receives the shared information, the arrangement information, and the encryption / decryption key certificate from the protection control module 120, and holds each received information in the shared information holding unit 310 (S1005).
- the update module 131 verifies the alteration detection certificate of the other update modules 132 and 133 and the protection control module 120 that are the alteration detection targets (S1006). This verification is performed by generating a hash value from each module and comparing the generated hash value with the hash value described in each falsification detection certificate.
- each generated hash value matches the hash value described in each tampering detection certificate. If they match, each of the other update modules 132 and 133 and the protection control module 120 is checked. To generate a MAC value. Then, the generated MAC value is held as a MAC value table (S1007).
- the update module 131 If at least one hash value does not match the hash value described in the falsification detection certificate, the update module 131 outputs an error and stops (S1008).
- the device 100 is shipped from the factory after the initial design process and is sent to the user.
- the device 100 is used under the user.
- the protection control module 120 controls the functions such as the decryption load function, the falsification detection function, and the analysis tool detection function inside the device 100 to attack the application (110, 111). Protects against attacks by attackers.
- the update modules 131, 132, 133 carry out falsification detection of the protection control module 120 (S2000).
- the falsification detection is performed by calculating the MAC value of the protection control module 120 using the verification key, and comparing the calculated MAC value with the MAC value held in the MAC value table. If the MAC values match, it is determined that the protection control module 120 has not been tampered with, and if the MAC values do not match, the protection control module 120 determines that the tampering has occurred.
- the subsequent processing is also described mainly in the case where the update module 131 detects that the protection control module 120 has been tampered with. However, basically, when the update modules 132 and 133 detect tampering with the protection control module 120, basically. Similar processing is performed.
- the update module 131 indicates The determination unit 210 of the update server 200 and other update modules are notified (S2001).
- the update module 131 does not notify the determination unit 210 or other update modules, and returns to the tampering detection process of S2000.
- the update module that has received the notification that the protection control module 120 has been tampered with from another update module uses the verification key and the MAC value to detect the tampering of the protection control module 120 (S2002). Then, the falsification detection result is notified to the determination unit 210 and other update modules (S2003).
- the determination unit 210 receives the falsification detection result from the update modules 131, 132, and 133.
- FIG. 21 is a sequence diagram showing the flow of operation of analysis / determination processing.
- the processes individually performed by the update modules 131, 132, and 133 are collectively described as the processes performed by the update module group 130.
- the determination unit 210 is based on the falsification detection result notified from the update module. Then, it is determined whether the protection control module 120 is illegal or valid (whether it has been tampered with) (S3000).
- the protection control module 120 determines that the tampering has occurred (tampered), and fewer than a predetermined number of update modules have been tampered with. Is detected, the protection control module 120 determines that it is valid (not tampered with).
- the predetermined number may be a majority of the update modules included in the update module group 130.
- the determination unit 210 protects the update module in order to determine whether the protection control module 120 needs to be recovered.
- Request for notification of falsification information such as which part of the control module 120 has been falsified (S3001).
- the determination unit 210 determines whether it is necessary to recover the protection control module 120 based on the falsification information (S3002).
- a protection control module for update is prepared (S3003), and the update module is instructed to start update processing (S3004).
- revoking a request is made to the server providing the service to the application (110, 111) to revokes the device 100 (S3005).
- the protection control module 120 determines that it is valid (not tampered with)
- the process shifts to a normal determination process to determine whether or not the update module group 130 needs to be updated (S3006). .
- FIG. 22 is a sequence diagram of the normal time determination process (S3006) of the analysis / determination process.
- the determination unit 210 of the update server 200 transmits an instruction for mutual monitoring processing to the update module group 130, and the update module group 130 performs mutual monitoring processing (S3100).
- the update module group 130 notifies the determination unit 210 of the detection result of the mutual monitoring process.
- the determination unit 210 Upon receiving the notification of the detection result, the determination unit 210 performs a normal invalidation determination process (S3200), an additional determination process (S3300), and a monitoring pattern update determination process (S3400).
- S3200 normal invalidation determination process
- S3300 additional determination process
- S3400 monitoring pattern update determination process
- FIG. 23 is a detailed sequence diagram of the mutual monitoring process (S3100).
- the update modules 131, 132, and 133 in the update module group 130 perform a falsification detection process on each of the other update modules, and detect the falsification if it has been falsified by an attacker.
- the update module 131 detects falsification of the update module 132 (S3101)
- the update module 132 detects falsification of the update module 133 (S3102)
- the update module 133 detects falsification of the update module 131 (S3102). S3103).
- the falsification detection is performed by calculating the MAC value of each update module using the verification key and comparing the calculated MAC value with the MAC value held in the MAC value table.
- Each update module notifies the determination unit 210 and other update modules of the result of the falsification detection process.
- FIG. 24 is a detailed flowchart of the normal time invalidation determination process (S3200).
- the instruction generation unit 603 of the determination unit 210 determines that the update module group 130 An instruction to update the whole is generated, and the whole update module group 130 is updated (S3202).
- Updating the entire update module group 130 can prevent the normal operation of the update module from being hindered.
- the unauthorized module identification unit 604 determines any of the update module groups 130. It is determined whether or not the update module has been compromised (S3203), and invalidation processing for the update module that has been determined to be compromised is performed (S3204). Details of the invalidation processing will be described later.
- FIG. 26 is a detailed flowchart of the additional determination process (S3300) of the normal determination process.
- the determination unit 210 determines whether the number of update modules in the update module group 130 is equal to or smaller than a predetermined value (S3301), and performs additional processing when the number is smaller than the predetermined value (S3302). Details of the addition process will be described later. When the number of update modules is equal to or greater than the predetermined value, or when the addition process ends, the process returns to the normal time determination process.
- the number of update modules that perform the mutual monitoring process can be maintained at a constant number, so that the tampering of the update module can be stably self-verified inside the update module group 130. it can.
- the addition process is performed, so that the application (110, 111) is attacked via an unauthorized protection control module during the update module addition process. Can be prevented.
- an update module may be added even if the number of update modules is equal to or greater than a predetermined value.
- the “predetermined value” is a value determined at the time of system design, and for example, a specific numerical value such as “a majority of the number of update modules at the time of system design” or “four” can be considered.
- the update module group itself may be updated. For example, when the number of update modules is larger than a predetermined value, the update module may be added to the update module group, and when the number is less than the predetermined value, the update module group itself may be updated. By renewing the update module group, the normal operation of each update module can be prevented from being disturbed.
- FIG. 28 is a detailed flowchart of the monitoring pattern update determination process (S3400) of the normal time determination process.
- the determination unit 210 determines whether the monitoring pattern needs to be updated when the configuration of the update module group 130 is changed by the invalidation process or the addition process (S3401). When it is determined that the monitoring pattern needs to be updated, the monitoring pattern update unit 250 is instructed to update, and the monitoring pattern update unit 250 performs the monitoring pattern update process (S3402).
- the monitoring pattern is updated so that there is no unmonitored update module. This will be specifically described below.
- the update module B may not be monitored by any update module. Therefore, the update module B also generates a new monitoring pattern to be monitored by any one of the update modules, and updates the monitoring pattern of the update module excluding the update module A.
- the determination unit 210 of the update server 200 determines that the protection control module 120 needs to be recovered in the analysis / determination process, the determination unit 210 causes the update software distribution unit 220 to recover the protection control module 120. Instruct.
- the update software distribution unit 220 instructs the update modules 131, 132, and 133 to start the update process, and then performs a one-to-one mutual authentication process with each update module. This prevents the device 100 from connecting to an unauthorized server and the update server 200 from connecting to an unauthorized device.
- the update server 200 uses a signature private key and a signature public key, and each update module uses an authentication key pair (authentication private key and authentication public key).
- FIG. 29 is a sequence diagram when the update module 131 authenticates the update software distribution unit 220.
- the update modules 132 and 133 operate in the same manner as in FIG. 29 and authenticate the update software distribution unit 220.
- the update module 131 generates a random number using a random number generator (S4000), and transmits the generated random number as challenge data to the update software distribution unit 220 (S4001). At this time, an update module identifier for identifying the update module 131 is transmitted together with the challenge data.
- the update software distribution unit 220 generates signature data using the signature secret key for the received challenge data (S4002), and returns the generated signature data as response data to the update module 131 (S4003).
- the update module 131 receives the response data from the update software distribution unit 220 (S4004), and verifies whether the received response data is the signature data of the challenge data using the signature public key (S4005).
- the update module 131 continues processing. If the response data is not correct and the update software distribution unit 220 is not a valid module, the update module 131 outputs an error and stops processing (S4006).
- the update software distribution unit 220 authenticates the update modules 131, 132, and 133.
- FIG. 30 is a sequence diagram when the update software distribution unit 220 authenticates each update module.
- the update software distribution unit 220 generates a different random number by using a random number generator for each update module that has transmitted the challenge data (S4100), and individually transmits the challenge data to each update module (S4101). ).
- Each update module generates signature data using the authentication secret key for the received challenge data (S4102), and returns the generated signature data as response data to the update software distribution unit 220 (S4103).
- each update module transmits the authentication public key and the authentication key certificate to the update software distribution unit 220 together with the response data.
- the update software distribution unit 220 receives response data, an authentication public key, and an authentication key certificate from each update module (S4104).
- the update software distribution unit 220 verifies whether the authentication key certificate is a certificate issued by itself, and further verifies the validity of the authentication public key using the authentication key certificate (S4105). .
- the update software distribution unit 220 stops the processing (S4106).
- the update software distribution unit 220 verifies whether the received response data is the signature data of the challenge data using the authentication public key (S4107).
- the update software distribution unit 220 determines whether or not the number of update modules (legitimate update modules) that have returned correct response data is equal to or greater than a preset number required for recovery processing. If the number of valid update modules is less than the number necessary for the recovery process, the recovery software distribution unit 220 stops the process because the recovery process cannot be executed (S4106). If the number of valid update modules satisfies the number required for the recovery process, the mutual authentication process is terminated and the process proceeds to the recovery process.
- the number of update modules legitimate update modules
- the update software distribution unit 220 creates an authentication list in which the update module identifiers of all the update modules whose validity has been confirmed are described in the mutual authentication process. In subsequent recovery processing, only the update module whose identifier is described in the authentication list is used.
- FIG. 31 is a flowchart showing the overall flow of the recovery process. As shown in the figure, the recovery process is roughly composed of six processes.
- the first process is an update process (S5000) for updating the tampered protection control module 120 using the new protection control module.
- the second process is a mutual monitoring process during recovery (S5100) in which the update modules 131 and 132.133 perform the falsification detection process.
- the third process is a re-encryption process (S5300) for re-encrypting the encrypted application (110, 111).
- the fourth processing is recovery invalidation determination processing (S5400) for determining whether to perform invalidation processing when an update module in the update module group 130 is compromised.
- the fifth process is an addition determination process (S5500) in which it is determined whether to perform an update module addition process based on the number of update modules in the update module group 130 after the invalidation.
- the sixth process is a monitoring pattern update determination process (S5600) for determining whether to update the monitoring pattern when the update module is invalidated and / or added.
- the software update system receives an update trigger from the outside, uses the new protection control module to update the tampered protection control module 120 (S5000), and the update modules mutually detect tampering It suffices if there is a mutual monitoring process for recovery (S5100).
- the certificate generation unit 708 of the update software distribution unit 220 generates an update verification certificate using the signature private key (S5001).
- the update verification certificate is a certificate for each update module 131, 132, 133 to check whether the new protection control module has been correctly installed.
- the update software distribution unit 220 transmits the generated certificate to each update module (S5002).
- the encryption key generation unit 703 of the update software distribution unit 220 generates two encryption keys (first key and second key) for multiply encrypting the new protection control module (S5003).
- the decryption load unit 404 encrypts the new protection control module using the second key, and generates an encrypted new protection control module (S5004).
- the decryption loading unit 404 further encrypts the encrypted new protection control module using the first key, and generates a multiple encrypted new protection control module (S5005).
- the update software distribution unit 220 selects one valid update module from the update module group 130 (S5006), and notifies the determination unit 210 of the identifier of the selected update module.
- S5006 an update module other than the compromised update module stored in the unauthorized module specifying unit 604 in the determination unit 210 is selected.
- the update module 131 is selected.
- the update software distribution unit 220 transmits the multiple encryption new protection control module to the selected update module 131 (S5007), and further transmits the first key (S5008).
- the update module 131 receives the multiple encryption new protection control module and the first key (S5009).
- the update module 131 decrypts the multiple encrypted new protection control module using the first key, and acquires the encrypted new protection control module (S5010).
- the update software distribution unit 220 is notified to that effect (S5011).
- the update software distribution unit 220 selects one update module that is a valid module and different from the update module selected in S5006 from the update module group 130 (S5012).
- the update module 132 is selected.
- an update module other than the compromised update module stored in the unauthorized module specifying unit 604 in the determination unit 210 is selected in the same manner as described above.
- the update software distribution unit 220 transmits the second key to the selected update module 132 (S5013). Further, the update software distribution unit 220 requests the update module 131 to transmit the encrypted new protection control module acquired in S5010 to the update module 132 (S5014).
- the update module 131 receives the request from the update software distribution unit 220 and transmits the encrypted new protection control module to the update module 132 (S5015).
- the update module 132 receives the second key from the update software distribution unit 220 and receives the encrypted new protection control module from the update module 131 (S5016). Then, using the second key, the encrypted new protection control module is decrypted to obtain a new protection control module (S5017).
- the update module 132 overwrites the protection control module 120 with the new protection control module acquired in S5017 and updates it (S5018). Then, the update module 132 notifies the end of the update to other update modules (S5019).
- each of the update modules 131, 132, 133 verifies whether or not the protection control module has been correctly updated using the update verification certificate received in advance (S5020), and distributes the verification result to the update software distribution. Notification to the unit 220 (S5021).
- the update software distribution unit 220 determines whether the protection control module has been correctly updated (S5022). If it is determined that the update has not been performed correctly, the update software distribution unit 220 stops the device 100 (S5023).
- the update software distribution unit 220 notifies each update module of the end of the update process (S5024).
- Each update module receives the update process end notification, generates a MAC value of the new protection control module, and writes a set of the generated MAC value and the identifier of the protection control module in the MAC value table (S5025).
- the update software distribution unit 220 multiplexly encrypts the new protection control module for update using a plurality of keys, and transmits it to the update module group 130.
- the update module group 130 updates the protection control module 120 with the received new protection control module.
- the update software distribution unit 220 controls the timing at which a plurality of keys for decrypting the newly encrypted new protection control module are transmitted to the update module group 130 so that the attacker encrypts them. It makes it difficult to obtain new protection control modules that have not been done.
- the determining unit 210 transmits a mutual monitoring process instruction to the update module group 130, and the update module group 130 performs the mutual monitoring process (S5101).
- the details of S5101 are the same as the mutual monitoring process (S3100) of FIG.
- Each update module detects falsification and transmits the falsification detection result to the determination unit 210 (S5102). Note that if the tampered update module is not detected as a result of the mutual monitoring process, the determination unit 210 need not be notified. The determination unit 210 performs a recovery time determination process using the detection result (S5103).
- the update module group 130 performs the mutual monitoring process, so that even if some of the update modules are falsified during the recovery process, it is possible to detect falsification. Furthermore, by carrying out the mutual monitoring process at the time of recovery periodically, it is possible to detect tampering before all of the new protection control modules are completely leaked and prevent all of the new protection control modules from leaking. It becomes possible.
- the determination unit 210 determines whether any update module is compromised (S5110). If none of the update modules has been compromised, the recovery judgment process is terminated, and the process returns to the recovery mutual monitoring process of FIG.
- the determination unit 210 determines whether more than half of the update modules included in the update module group are compromised (S5111). If more than half have been compromised, the device 100 is stopped (S5112).
- the unauthorized module identification unit 604 identifies which update module is compromised and stores the identifier of the identified update module in the unauthorized module identification unit 604. (S5113).
- the unauthorized module specifying unit 604 determines whether the update module selected in the update process is compromised (S5114). If the update module selected in the update process is compromised, there is a possibility of fraud during the update process, so the update software distribution unit 220 and the update module group 130 are notified of the suspension of the update process (S5115). . After notifying the update software distribution unit 220 and the update module group 130, the process returns to the start of the recovery process.
- the process does not shift to the recovery invalidation determination process (S5300) or the additional determination process (S5400), so the update of the protection control module is performed by the invalidated update module addition process and the additional process. Processing can be performed preferentially. By preferentially performing the update process of the protection control module, it is possible to prevent the application (110, 111) from being attacked via an unauthorized protection control module.
- the mutual monitoring process at the time of recovery is not only linked with the update process, but is also periodically repeated from the start to the end of the update process.
- the mutual monitoring process at the time of recovery needs to be repeatedly performed at a time interval shorter than the time required for the new protection control module to be completely output to the outside via the network. For example, if it takes 1 second until the new protection control module is completely output to the outside, the mutual monitoring process at the time of recovery is executed at a shorter 500 millisecond interval. Details will be described below.
- the device 100 performs a mutual monitoring process during recovery (mutual monitoring 1) before the multiple encryption new protection control module is sent from the update server 200. This is because an invalid update module is selected so that update processing is not performed.
- the device 100 performs a mutual monitoring process during recovery (mutual monitoring 2), and the device 100 receives the first key. Make sure that you have not selected an incorrect update module.
- the update module 131 receives the first key and uses the first key to decrypt the multiple encryption new protection control module
- the decryption process by the update module 131 is periodically interrupted to recover.
- Mutual monitoring processing (mutual monitoring 3-1, 3-2) is performed.
- the subsequent processing is the same as above. That is, the device 100 performs the recovery mutual monitoring process (mutual monitoring 4) before the update module 132 receives the second key transmitted by the update server 200, and when the device 100 receives the key, Confirm that an invalid update module is not selected in the update process.
- the recovery mutual monitoring process (mutual monitoring 4)
- the update module 132 receives the second key and decrypts the encrypted new protection control module using the second key
- the decryption process by the update module 132 is periodically interrupted to perform mutual monitoring during recovery.
- the processing (mutual monitoring 5-1, 5-2) is performed.
- recovery mutual monitoring processing (mutual monitoring 6) is performed.
- the determination unit 210 of the update server 200 performs a recovery determination process (S5103).
- the update server 200 can cancel the transmission of the first key and the second key, and the attacker cannot obtain the key for decrypting the multiple encryption new protection control module. It becomes possible.
- the updated protection control module (hereinafter referred to as “protection control module 121”) holds the distributed information and encryption / decryption key certificate held by each of the update modules 131, 132, and 133. Is requested (S5201).
- Each update module 131, 132, 133 receives the request from the protection control module 121 and transmits the distributed information and the encryption / decryption key certificate (S5202).
- the protection control module 121 receives the shared information and the encryption / decryption key certificate from each of the update modules 131, 132, and 133 (S5203), and the encryption / decryption key used by the protection control module 120 before the update from the received distributed information. (Old encryption / decryption key) is restored (S5204). Further, the protection control module 121 verifies whether or not the old encryption / decryption key has been correctly restored using the encryption / decryption key certificate (S5205).
- the protection control module 121 reads out an unauthorized update module (identifies which update module has transmitted unauthorized distributed information) (S5206). The identified unauthorized update module is notified to the update server 200.
- the encryption / decryption key generation unit 408 of the protection control module 121 When the old encryption / decryption key is correctly restored, the encryption / decryption key generation unit 408 of the protection control module 121 generates a new encryption / decryption key (new encryption / decryption key) (S5207). Then, the decryption load unit 404 decrypts the application (110, 111) encrypted using the old encryption / decryption key, and re-encrypts the application (110, 111) using the new encryption / decryption key (S5208). .
- the protection control module 121 collects a set of shared information from each update module, and adds identification information for identifying each update module to the collected distributed information.
- the distributed information set and distributed at the initial design is grouped together. Then, the values of the shared information included in each group are compared, and the shared information having the same value is further combined into one subgroup. Then, all combinations for selecting subgroups one by one from all groups are generated.
- verification OK Verifies whether the correct old encryption / decryption key was generated.
- verification pass identification information representing verification OK is added to the subgroup included in the combination.
- the distributed information included in the subgroup with verification pass identification information is removed.
- the update module that has transmitted the distributed information having an invalid value can be specified by the identification information added to the distributed information.
- the update module specified by the identification information is specified as an unauthorized update module.
- Patent Document 2 The secret key d in Patent Document 2 is made to correspond to the encryption / decryption key of this embodiment, the certificate authority device is made to correspond to the protection control module 121 of this embodiment, and the distributed information holding device is made to correspond to the update modules 131, 132, 133. Thus, the same method as in Patent Document 2 can be used.
- the additional determination process (S5400) is the same as the additional determination process (S3300 in FIG. 22) performed in the normal determination process (S3006 in FIG. 21). The description is omitted here.
- the monitoring pattern update determination process (S5500) is the same as the monitoring pattern update determination process (S3400 in FIG. 22) performed in the normal time determination process (S3006 in FIG. 21). The description is omitted here.
- the protection control module 121 generates shared information from the new encryption / decryption key using the secret sharing method (S6000), and further generates a new encryption / decryption key certificate using the signature secret key (S6001). . Then, the protection control module 121 transmits the generated shared information and encryption / decryption key certificate to each of the update modules 131, 132, 133 (S6002).
- each update module is transmitted so as to hold a different pair of distributed information.
- the new encryption / decryption key certificate is transmitted to each of the update modules 131, 132, and 133.
- Each update module 131, 132, 133 receives the shared information and the new encryption / decryption key certificate from the protection control module 121, and holds the received shared information and the new encryption / decryption key certificate in the shared information holding unit 310. (S6003).
- the invalidation process is performed when the update module that has failed authentication at the time of mutual authentication is present, the update module that has been tampered with at the normal time determination process is detected, or the tampering of the protection control module 120 is detected. This is a process of invalidating an illegal (tampered) module existing inside.
- the determination unit 210 determines which update module has been tampered with based on the mutual monitoring result received from the update modules 131, 132, and 133 (S7001). As a determination method, for example, when it is determined that a predetermined number of update modules have been tampered with, it is determined that the update modules have been tampered with.
- the determination unit 210 outputs an invalidation instruction to the module invalidation unit 230 together with the identification information of the altered update module (S7002).
- the module invalidation unit 230 requests one of the update modules 131 and 132 determined to have not been tampered (herein, the update module 131) to invalidate the tampered update module 133 (S7003). .
- the update module 131 When receiving the invalidation request for the update module 133 from the module invalidation unit 230, the update module 131 requests the module invalidation unit 230 to send an access information acquisition key for invalidating the update module 133 ( S7004). Further, the update module 131 requests the access control module 140 to acquire access information for invalidating the update module 133 (S7005).
- the module invalidation unit 230 determines whether or not the update module 131 is a valid (not tampered) update module, and the requested access information acquisition key is invalid (tampered). It is confirmed whether or not the access information acquisition key is for invalidating the update module 133 (S7006). This confirmation is performed using the information of the update module notified from the determination unit 210 to the module invalidation unit 230.
- the update module 131 receives the access information acquisition key from the module invalidation unit 230, and further receives the encrypted access information from the access control module 140 (S7009).
- the update module 131 acquires access information from the access information acquisition key and the encrypted access information (S7010).
- the acquired access information is a dedicated driver for erasing the update module 133.
- the update module 131 uses the dedicated driver to delete the unauthorized update module 133 that has been tampered with (S7011).
- the update module 131 deletes the access information acquisition key, the encrypted access information, the access information, and the like, and transmits a completion notification to the module invalidation unit 230 (S7012).
- the module invalidation unit 230 transmits an invalidation completion notification to the determination unit 210 (S7013).
- the invalidation processing considering the deletion of the distributed information is described in detail as “withdrawal processing” from page 56 to page 64 of Patent Document 2.
- the private key d in Patent Document 2 correspond to the encryption / decryption key of the present embodiment
- the distributed information holding device correspond to the update modules 131, 132, and 133 of the present embodiment
- the same method as Patent Document 2 can be achieved. Is available.
- the protection control module 120 is used for the invalidation process, the distributed information may be generated and distributed again by the same method as in the initial design.
- the addition processing is details of S3302 in FIG. 26, and is processing for adding an update module in order to increase the number of update modules inside the device 100.
- the determination unit 210 determines that an update module needs to be added to the update module group 130, the determination unit 210 instructs the module addition unit 240 to add an update module. At this time, a list of valid update modules in the current device 100 is notified simultaneously with the addition instruction.
- the update module selection unit 903 selects an update module for performing additional processing from the list of valid update modules received from the determination unit 210 (S3310).
- a selection method for example, it may be selected at random, may be selected sequentially from the top of the list, or the update module monitored from the largest number of update modules may be selected.
- the number of update modules selected by the update module selection unit 903 may be one, half of the update modules may be selected, or all the update modules may be selected.
- the selection method and the number to be selected may be determined at the time of system design, or may be instructed by the determination unit 210 each time.
- the update module dividing unit 905 acquires the update module for addition from the update module holding unit 904, and divides the update module for addition into the same number as the number of update modules that perform the addition process (S3311).
- the update module dividing unit 905 transmits the divided update module for addition to each of the update modules selected by the update module selecting unit 903 (S3312). At this time, the update module dividing unit 905 also transmits information indicating an area in which the divided update module for addition is written. Further, a verification certificate for verifying the module is added to the additional update module acquired from the update module holding unit 904.
- Each update module that has received the divided additional update module writes the divided additional update module in the designated area (S3313).
- the update module that has finished writing notifies the module adding unit 240 of the end of the addition process (S3314).
- the added update module is added to all the update modules in the update module group 130.
- the verification information is sent and the verification is requested (S3315).
- the verification information is the start address and size of the area where the added update module is written.
- the update module that has received the verification information reads the update module based on the verification information, and performs verification using the verification certificate added to the update module (S3316).
- the update module that has been verified notifies the module adding unit 240 of the verification result (S3317).
- the control unit 906 determines whether the update module has been added correctly from the verification result notified from the update module (S3318). Then, the determination unit 210 is notified of the determination result and the end of the addition process (S3319).
- the number of update modules in the device 100 can be maintained at a constant number, and alteration of the update modules can be stably performed in the update module group 130. Can be verified. Thereby, the reliability of a software update system can be improved.
- the monitoring pattern update process is a process for updating the monitoring pattern of the update module group 130 in the device 100 when it is determined that the monitoring pattern needs to be updated after the update module invalidation process or the addition process. .
- the update module A is monitoring the update module B
- the update module B is monitoring the update module C
- the update module C is monitoring the update module A.
- update module A is invalidated and update module D is added in this state. Since the update module A is invalidated, the update module B is not monitored by any update module. Further, since the update module D is newly added, it is not monitored by any update module. Therefore, it is necessary to perform monitoring pattern update processing.
- a monitoring pattern to be updated for example, as shown in FIG. 40B, a monitoring pattern in which the update module B monitors the update module C, the update module C monitors the update module D, and the update module D monitors the update module B.
- the sequential monitoring pattern can be changed from the update server 200, it is possible to prevent the monitoring module from being overlooked and the update module from being tampered with. As a result, it is possible to prevent the protection control module 120 from being tampered with through an unauthorized update module, and to prevent an application (110, 111) from being attacked by the unauthorized protection control module.
- Judgment criteria held by the update server 200 In the first embodiment, the processing order of processing performed by the device 100 differs depending on the state of the device 100.
- the determination unit 210 of the management server 200 determines which process is given priority to the device 100 using a determination criterion.
- the determination unit 210 determines the priority of processing performed by the device 100 when the protection control module 120 has been tampered with, and the priority of processing performed by the device 100 when the protection control module 120 has not been tampered with. Is held.
- FIG. 41 is a diagram showing a processing order when the protection control module 120 has not been tampered with.
- the device 100 performs an update module invalidation process, an addition process, and a monitoring pattern update process in this order.
- the device 100 when it is determined in the normal time determination process that the update module 133 has been tampered with, the device 100 performs the invalidation process of the update module 133 and invalidates the update module 133, so that the number of update modules If the value is less than or equal to the predetermined value, the update module is added. In addition, in order to monitor the update module that has been monitored by the invalidated update module 133 and the newly added update module, the monitoring pattern update is updated.
- FIG. 42 is a diagram showing a processing order when the protection control module has been tampered with. If the protection control module 120 has been tampered with, even if it is detected that the update module 133 has been tampered with in the mutual monitoring process during recovery, the recovery of the protection control module 120 takes precedence over the invalidation process of the update module 133 Process.
- the protection control module 120 By performing the recovery process of the protection control module 120 in preference to the invalidation process of the update module 133, it should be protected originally through the altered protection control module 120 during the invalidation process of the update module 133.
- the application (110, 111) can be prevented from being attacked.
- the device 100 performs the invalidation process of the update module 133 after the recovery process of the protection control module 120 is completed. Furthermore, an update module addition process and a monitoring pattern update process are performed as necessary.
- monitoring pattern update processing (S3402) is performed so that an update module that is not monitored by another update module does not exist due to invalidation of a certain update module.
- the other update module verifies whether or not the monitoring pattern update process has been reliably performed in the monitoring module, and ensures that the updated monitoring pattern is always used. As a result, it is possible to avoid the operation of an update module that can perform an illegal operation, such as being not monitored by any other update module based on an old monitoring pattern.
- the monitoring pattern update unit 250 of the update server 200 generates an appropriate monitoring pattern according to the configuration of the update modules 131 to 133. Details of each will be described below.
- symbol shall be used about the same component as Embodiment 1, and description about the process already demonstrated in Embodiment 1 is abbreviate
- FIG. 43 is a diagram showing the configuration of the update modules 131 to 133 according to the second embodiment of the present invention.
- the update module main body includes a monitoring pattern update verification unit 311, a module function notification unit 312, and a function information holding unit 313 in addition to the components of the update module main body of the first embodiment shown in FIG.
- the monitoring pattern update verification unit 311 acquires the monitoring pattern body of the other module, and verifies whether the other module has been updated to the correct monitoring pattern using the acquired monitoring pattern.
- the monitoring target update module described in the main body of the monitoring pattern is to be verified.
- a verification value list included in the monitoring pattern information received from the update server 200 is used.
- the verification value list in the second embodiment stores a verification value for verifying its own monitoring pattern body and a verification value for verifying the monitoring pattern body related to the monitoring destination described in the monitoring pattern body. Yes.
- the verification value includes a hash value, a MAC value, and the like.
- a hash value is used as an example.
- the monitoring pattern body of the monitoring destination is acquired to calculate the hash value, and the calculated hash value and the monitoring destination included in the own monitoring pattern information This is done by comparing with the verification value. If they match as a result of the comparison, it is determined that the monitoring pattern has been updated to the correct one.
- the function information holding unit 313 holds function information indicating which of the three functions of each update module, ie, a verification (monitoring) function, an update function, and a distributed information holding function.
- the update module main body only needs to have at least one of the three functions.
- the module function notification unit 312 notifies the update server 200 of the function information held by the function information holding unit 313.
- FIG. 44 is a diagram schematically showing the correspondence between update modules for monitoring pattern update verification.
- FIG. 44 specifically shows a case where three update modules (update module 1, update module 2, and update module 3) exist in the device 100.
- Each update module first updates its own monitoring pattern to the monitoring pattern notified from the update server 200. Next, each monitoring module verifies whether other update modules have correctly updated the monitoring pattern. Which update module is the monitoring target is described in its own monitoring pattern body.
- the monitoring pattern after the update related to the update module 1 indicates that the update module 1 should monitor the update module 2 and the update module 3.
- the updated monitoring pattern related to the updating module 2 indicates that the updating module 2 should monitor the updating module 1.
- the updated monitoring pattern related to the updating module 3 indicates that the updating module 3 monitors the updating module 2. Indicates what to do.
- the verification value list transmitted from the update server 200 is used together with the monitoring pattern body.
- the verification value list stores verification values used for monitoring pattern verification.
- the verification value list of the update module 1 stores verification values for verifying the update of the monitoring pattern of the update module 2 and the update module 3.
- the verification value list of the update module 2 stores a verification value for verifying the update of the monitoring pattern of the update module 1
- the verification value list of the update module 3 stores the update of the monitoring pattern of the update module 2.
- a verification value for verification is stored.
- FIG. 45 is a block diagram showing a configuration of the monitoring pattern update unit 250.
- the monitoring pattern update unit 250 includes a function information acquisition unit 1006, in addition to the components of the monitoring pattern update unit 250 according to the first embodiment described with reference to FIG.
- An update completion determination unit 1007 is provided.
- the function information acquisition unit 1006 acquires information (function information) indicating what functions each of the update modules 131 to 133 in the device 100 has from each update module. Specifically, the function information indicates one or more of a verification (monitoring) function, an update function, and a distributed information holding function that can be provided by the update module.
- the monitoring pattern generation unit 1003 first generates a new monitoring pattern for the entire monitoring module group based on the function information acquired by the function information acquisition unit 1006.
- the monitoring pattern generation unit 1003 generates a monitoring pattern so that each monitoring module is monitored from at least one other monitoring module. An example of the monitoring pattern will be described with reference to FIG.
- FIG. 62 schematically shows which update module each update module monitors according to a new monitoring pattern.
- update module update modules 131 to 133
- seven update modules update modules 131 to 137
- those having a verification (monitoring) function have a monitoring unit for realizing the function described in the figure, and those having an update function are realizing the function.
- the update part is described.
- both the monitoring unit and the update unit are described.
- each update module has been described as having a monitoring unit and an updating unit.
- monitoring pattern of FIG. 62 is configured according to the following rules.
- the update modules 131, 132, 135, and 137 having only the monitoring unit are monitored from at least one or more other update modules having the monitoring unit. Further, the update modules 133 and 136 having only the update unit are monitored from two or more update modules having the monitoring unit. And the update module 134 which has both a monitoring part and an update part is monitored from all the monitoring parts other than a self-module. According to this rule, an updating unit that updates other modules needs to be managed more strictly than a monitoring unit that monitors unauthorized operation of other modules, and a monitoring module having both a monitoring unit and an updating unit is It is based on the fact that it should be managed more strictly than those having only an update unit.
- an update module having the update function is monitored from many update modules as a monitoring pattern used during the recovery process, and has a verification (monitoring) function and an update function.
- the update module may generate a monitoring pattern that does not monitor other update modules.
- the monitoring pattern is not limited to one pattern, and a plurality of patterns may be held, and the monitoring pattern corresponding to each process, scene, or the like may be used properly.
- the monitoring pattern division unit 1004 divides the new monitoring pattern (whole) generated by the monitoring pattern generation unit 1003 into monitoring patterns for each update module, and generates a new monitoring pattern for each update module.
- the update module 131 monitors the update modules 133 and 134, and therefore, an identifier for identifying the update modules 133 and 134 is described in the new monitoring pattern related to the update module 131.
- the update module 134 monitors the update modules 133, 136, and 137, an identifier for identifying each of the update modules 133, 136, and 137 is described in the new monitoring pattern related to the update module 134.
- the update completion determination unit 1007 receives the mutual monitoring results (such as monitoring pattern update verification results) of the update modules 131 to 133, and determines whether or not the monitoring pattern has been correctly updated in all the update modules. If it can be determined that the update was successful, the monitoring pattern update process ends. If it has not been updated correctly, the monitoring pattern update process is performed again. Here, each of the update modules 13x may back up the update pattern before the update in the monitoring pattern update process. Then, when it is confirmed that the monitoring pattern has been correctly updated in all the update modules, the backed up update pattern may be deleted.
- the mutual monitoring results such as monitoring pattern update verification results
- the monitoring pattern update unit 250 of the update server 200 and the update modules 131 to 133 inside the device 100 update the monitoring pattern. Processing begins.
- the function information acquisition unit 1006 in the monitoring pattern update unit 250 of the update server 200 acquires all the update modules in the device 100 in order to acquire the function information of the update modules necessary for generating the monitoring pattern. Then, a function information notification request is made (S8001).
- the module function notification unit 311 acquires the function information held in the function information holding unit 312 and notifies the monitoring pattern update unit 250 (S8002).
- the monitoring pattern update unit 250 Upon receiving the notification of the function information, the monitoring pattern update unit 250 generates a new monitoring pattern (whole) by the monitoring pattern generation unit 1003 based on the function information.
- the monitoring pattern division unit 1004 divides the new monitoring pattern (entire) generated by the monitoring pattern generation unit 1003 into monitoring patterns for each update module, and generates a new monitoring pattern for each update module (S8004). ). The generated new monitoring pattern is sent to each update module (S8005).
- Each update module that has received the new monitoring pattern updates its own monitoring pattern, further verifies whether other updating modules have updated the monitoring pattern correctly (S8006), and displays the result (mutual monitoring result) as the monitoring pattern.
- the update unit 250 is notified (S8007). Details of the monitoring pattern update processing (S8006) in each update module will be described later.
- the monitoring pattern update unit 250 determines whether or not the updating process of the monitoring pattern is correctly completed from the mutual monitoring result by the update end determination unit 1007. As a result, if there is an unauthorized update module that has not correctly updated the monitor pattern, a new monitor pattern (entire) that targets an update module other than the unauthorized update module is generated (S8003). If there is no illegal update module, the update module 131 to 133 is notified of the end of the monitoring pattern update process (S8009).
- the update modules 131 to 133 that have received the monitoring pattern update process completion notification update the monitoring values of the other update modules, so that the corresponding MAC values are recalculated and the MAC value table is updated ( S8010).
- a new monitoring pattern is notified from the monitoring pattern update unit 250 to each update module.
- Each update module that has received the new monitoring pattern uses the monitoring pattern update unit 309 to update its own monitoring pattern information to the received new monitoring pattern (S8101).
- the verification list is used to verify whether or not the own monitoring pattern has been correctly updated, and the update server 200 is notified of the end of reflection of the monitoring pattern (S8102).
- the monitoring pattern update unit 250 receives the notification of the monitoring pattern reflection end from the update module, and requests each update module for update verification (S8103).
- the update module that has received the update verification request verifies the monitoring pattern body of the updating module described in the updated new monitoring pattern body (S8104). For example, if the monitoring pattern is updated as shown in FIG. 44, the updating module 1 verifies the updating of the monitoring pattern of the updating module 2 and the updating module 3, and the updating module 2 updates the monitoring pattern of the updating module 1.
- the update module 3 verifies the update of the monitoring pattern of the update module 2.
- the verification value in the verification value list of the monitoring pattern information received from the update server 200 is used for verification. When the verification is completed, each update module notifies the update server 200 of the verification result.
- the update module for which the monitoring pattern update verification has been completed next verifies the update module body of the update module described in the updated new monitoring pattern body (S8105).
- An update module verification certificate is used to verify the update module body.
- each update module notifies the update server 200 of the verification result.
- the monitoring pattern update unit 250 receives the update verification result of the monitoring pattern and the verification result of the update module body as the mutual monitoring result, and the update completion determination unit 1007 performs a process of determining the completion of the update. Do.
- each update module is added with a function for holding not only the shared information assigned to each update module itself but also the shared information of other update modules. With this function, even if some of the update modules are invalidated, the encryption / decryption key can be restored from the remaining update modules. Therefore, even if the update module is tampered with to restore the encryption / decryption key, the operation can be continued only with the normal update module without invalidating the tampered update module. Details of the processing in the third embodiment will be described below.
- FIG. 48 is a configuration diagram of the update module group 130.
- FIG. 49 is a diagram for explaining the sharing of shared information when not only the shared information of itself but also the shared information of adjacent update modules is held.
- the initial design process (FIG. 18) described in the first embodiment is performed.
- the protection control module 120 generates shared information from the encryption / decryption key using a secret sharing method ( S1002) is different from the first embodiment.
- S1002 a secret sharing method
- the distribution information of each update module and the distribution information of the adjacent update module are transmitted to each update module.
- the update module 131 holds the shared information 1 that is the shared information of the update module 131, the shared information 2 of the adjacent update module 2, and the shared information 7 of the update module 7.
- the encryption / decryption key can be restored because the update module 131 holds the shared information 2.
- FIG. 50 is a flowchart of the normal time invalidation determination process of the normal time determination process.
- FIG. 51 shows that more than half of the update module group 130 is compromised.
- the determination unit 210 determines whether or not the update module has been compromised by more than half (S3201).
- the instruction generation unit 603 in 210 generates an instruction to update the entire update module group 130 and updates the entire update module (S3202).
- the determination unit 210 determines whether three consecutive update modules are compromised (S320A), and when three consecutive modules are compromised, the instruction generation unit 603 in the determination unit 210 performs the entire update module group 130. Generates an instruction to update and updates the entire update module.
- FIG. 52 is a diagram illustrating an example in which three of the update modules 131, 132, and 137 in the update module group 130 are compromised.
- the three consecutive modules are update modules that hold the same shared information in the configuration of the update modules that hold the shared information, such as the relationship where the update module 131, the update module 132, and the update module 137 have the same shared information 1. Represents the relationship.
- the update module 131, the update module 132, and the update module 137 are tampered with and compromised, the shared information 1 of the update module 131 cannot be acquired, and the encryption / decryption key cannot be restored. Therefore, it is necessary for the protection control module 120 to update the entire update module and redistribute the encryption / decryption key.
- the determination unit 210 notifies the protection control module 120 of update of the encryption / decryption key and redistribution. Then, the protection control module 120 decrypts the application (110, 111) with the current encryption / decryption key, updates the encryption / decryption key, and encrypts the application with the new encryption / decryption key. Further, the protection control module 120 generates shared information from the encryption / decryption key by using a secret sharing method, and further uses a signature (encryption code) to confirm whether the encryption / decryption key has been correctly restored using the signature private key. Decryption key certificate). The generated shared information and the encryption / decryption key certificate are transmitted to the update modules 131 to 137, respectively.
- FIG. 53 is a diagram illustrating an example in which the update modules 132 and 137 adjacent to the update module 131 in the update module group 130 are compromised.
- FIG. 54 is a flowchart showing the recovery time judgment process of the recovery time mutual monitoring process.
- the same reference numerals are used for the same processes as the determination process at the time of recovery (FIG. 36) of the first embodiment, and a duplicate description is omitted.
- the determination unit 210 determines whether more than half of the update modules have been compromised (S5111). If the number of update modules compromised is less than half, the determination unit 210 determines whether three consecutive update modules have been compromised (S511A). ). If three consecutive update modules are compromised, the encryption / decryption key cannot be restored, and the device 100 is stopped.
- the shared information of the update module A is The encryption / decryption key of the protection control module can be restored by obtaining it from the update module. Also, it is determined whether or not three consecutive update modules have been compromised, and if they have been compromised, the encryption / decryption key of the protection control module 120 cannot be restored by updating the shared information of the entire update module Can be prevented in advance. Thereby, the update process of the protection control module can be correctly performed.
- the present invention has been described based on the above embodiment, it is needless to say that the present invention is not limited to the above embodiment.
- the following cases are also included in the present invention.
- the update process of the update module will be described by taking the case of updating the update module 133 as an example.
- the update software distribution module 210 encrypts the new update module 133 using a plurality of keys, and updates included in the update module group 130 A module (excluding the update module 133) is transmitted as a transmission destination.
- the update module included in the update module group 130 updates the update module 133 to the new update module 133.
- the update software distribution unit 220 controls the timing of transmitting a plurality of keys for decrypting the multiple encrypted new update module 133 to the update modules included in the update module group 130, so that the attack is performed. It becomes impossible for the user to obtain the update module 133 for update which is not encrypted.
- 55 to 56 are flowcharts showing an example of update processing of the update module.
- the update module 133 is updated as described above.
- 55 to 56 are basically the same as FIGS. 33 to 34. The difference is that an update verification certificate, a decryption end notification, and an update end notification are not transmitted to the update module 133 to be updated.
- update module update process will be described in detail by taking as an example the process in which the update modules 131 and 132 update the update module 133.
- the update software distribution unit 220 generates a certificate (update verification certificate) of the new update module 133 using the certificate generation unit 408 (S9001), and transmits it to each of the update modules 131 to 132 (S9002). Using this certificate, the update modules 131 to 132 can confirm whether or not the new update module 133 has been correctly installed. A signature private key is used to generate an update verification certificate. Each update module receives an update verification certificate.
- the update software distribution unit 220 uses the encryption key generation unit 403 to generate two encryption keys (first key and second key) for multiply encrypting the new update module 133. (S9003). Then, using the encryption unit 404, the new update module 133 is encrypted using the second key to generate the encrypted new update module 133 (S9004). Further, the encrypted new update module 133 is further encrypted using the first key to generate a multiple encrypted new update module 133 (S9005).
- the update software distribution unit 220 selects one update module (in this case, the update module 131) from the update module group 130 (S9006). In the selection of the update module, an update module other than the compromised update module stored in the unauthorized module identification unit 604 in the determination unit 210 is selected. In addition, the identifier of the selected update module is transmitted to the determination unit 210. The update software distribution unit 220 transmits the multiple encrypted new update module 133 to the selected update module (S9007). Further, the first key is transmitted to the update module 131 (S9008).
- the update module 131 receives the multiple encrypted new update module 133 and the first key (S9009), decrypts the multiple encrypted new update module 133 by using the first key, and installs the encrypted new update module 133. Obtain (S9010). When the decryption ends, the update software distribution unit 220 is notified to that effect (S9011).
- the update software distribution unit 220 selects one update module (in this case, the update module 132) different from the above from the update module group 130 (S9012). For the selection of the update module, an update module other than the compromised update module stored in the unauthorized module specifying unit 604 in the determination unit 210 is selected in the same manner as described above.
- the update software distribution unit 220 transmits the second key to the selected update module (S9013). Further, the update module 131 is requested to transmit the encrypted new update module 133 to the update module 132 (S9014).
- the update module 131 receives the request from the update software distribution unit 220 and transmits the encrypted new update module 133 to the update module 132 (S9015).
- the update module 132 receives the second key from the update software distribution unit 220 and receives the encrypted new update module 133 from the update module 131 (S9016). Then, the encrypted new update module 133 is decrypted using the second key, and the new update module 133 is acquired (S9017).
- the update module 132 overwrites the acquired new update module 133 on the update module 133 and updates it to the new update module 133 (S9018). Then, the update completion is notified to other update modules other than the update module 133 (S9019).
- Each of the update modules 131 to 132 verifies whether the update module 133 has been correctly updated using the update verification certificate received in advance (S9020), and notifies the update software distribution unit 220 of the verification result (S9021). .
- the update software distribution unit 220 determines whether the update module 133 is correctly updated from the verification result (S9022). It stops (S9023).
- Each of the update modules 131 to 132 receives the notification of the end of the update process, generates the MAC value of the update module 133, and stores the set of the identifier and MAC value of the update module 133 in the MAC value table (S9025).
- update module is overwritten
- present invention is not limited to this, and it may be overwritten after invalidating the tampered update module.
- the update module is overwritten, the present invention is not limited to this, and a module other than the update module, such as the protection control module 120 or an application, may be overwritten.
- the applications 100 and 110 may be software that provides functions other than the functions described above.
- the update module that has not been tampered with may update or overwrite all the update modules and the protection control module 120.
- the update software distribution unit 220 determines whether the update module 133 has been updated correctly from the verification result (S9022). 100 is stopped (S9023), but the present invention is not limited to this, and the update module update process may be performed again.
- the update module 13x (x is 1 to 7) includes the reception unit 301, transmission unit 302, control unit 303, update unit 304, verification unit 305, MAC value generation unit 306, MAC value table.
- the update unit 307, the monitoring pattern acquisition unit 308, the monitoring pattern update unit 309, and the distributed information holding unit 310 are included, the configuration is not limited thereto.
- control unit 303 may be configured only by constituent elements (the control unit 303, the verification unit 305, the monitoring pattern acquisition unit 308, and the monitoring pattern update unit 309) necessary for the monitoring process. Further, it may be configured only by components (control unit 303, update unit 304) necessary for the update process. Further, it may be configured only by the components (the control unit 303 and the update unit 304) necessary for the invalidation process. Furthermore, it may be configured from the above combinations.
- the entire update module included in the update module group 130 may be configured to include components necessary for the monitoring process and the update process.
- the verification module 305 performs the alteration check of the other update modules and the protection control module 120 in the update module 13x, but the alteration check target is not limited to the entire module, For example, data such as a specific function, function, or key may be used. Further, it is not necessary to check all the alteration targets at once, but only to check whether the alteration targets are partly altered. In this case, the tampering check may be performed for each part obtained by dividing the alteration target into a certain size, or the tampering check may be performed for each part divided in units of functions or functions.
- a part of the alteration target may be checked in order for each alteration check, or the part to be checked for alteration may be randomly determined for each alteration check, and which part is to be checked for alteration. It may be specified from another module or the outside of the device 100.
- a highly important module may be operated in a region protected from an attack by an attacker, such as a tamper resistant region.
- the update module 13x and the protection control module 120 may be operated in the protected area as described above.
- the other update modules and the determination unit 210 are in the protected area.
- the notification When receiving a notification from the update module that it has detected that another update module or protection control module 120 has been attacked, the notification may be accepted unconditionally, and update processing or invalidation processing may be performed. Good. In addition, the notification may be treated as more important than the notification from another module, and the update process or the invalidation process may be determined.
- the protection control module may operate in a protection mode (such as a tamper resistant area), and the update module may operate in a normal mode (such as a non-tamper resistant area).
- a protection mode such as a tamper resistant area
- a normal mode such as a non-tamper resistant area
- the module invalidation unit 230 is in the update server 200 and the access control module 140 is in the device 100 in the above embodiment, the present invention is not limited to this.
- the module invalidation unit 230 and the access control module 140 may be in the device 100, the update server 200, or in each update module.
- the access information acquisition key distribution module 220 and the access control module 140 may be one module instead of separate modules.
- the access information may be directly transmitted instead of transmitting the access information acquisition key and the encrypted access information to the update module.
- the module invalidation unit 230 or the access control module 140 is in the device 100, it may be in an area protected from attacks by tamper resistance or the like.
- the update server 200 includes the determination unit 210, the update software distribution unit 220, the module invalidation unit 230, the module addition unit 240, the monitoring pattern update unit 250, and the communication unit 260.
- the present invention is not limited to this, and the determination unit 210, the update software distribution unit 220, the module invalidation unit 230, the module addition unit 240, the monitoring pattern update unit 250, and the communication unit 260 are one module. Alternatively, it may be configured by only one of the modules, or may be configured by a combination of the above.
- the software update system 10 performs the initial design process when the device 100 is manufactured at the factory. However, the present invention is not limited to this. The software update system 10 is initialized somewhere after the factory shipment, such as after sales. Processing may be performed. Further, the initialization process may be performed not only once but also twice or more.
- the verification certificate and the authentication key certificate are certificates generated using the signature private key held by the update software distribution unit 220.
- the present invention is not limited to this, and may be generated using different keys, or may be a certificate issued by a certificate issuing device other than the update software distribution unit 220.
- the shared information generated from the encryption / decryption key is transmitted to the update module 13x, and the update module 13x holds the shared information.
- the application may be held instead of the update module, or the update module 13x and the application may hold.
- the detection processing operation when the update module 13x detects falsification of the protection control module 120, the falsification detection processing is performed using the MAC value calculated using the verification key.
- the present invention is not limited to this, and verification may be performed using the tampering detection certificate of the protection control module 120. Further, instead of performing falsification verification using a hash value like a MAC value or a certificate, falsification verification may be performed by checking a log.
- the determination unit 210 and other update modules are notified. However, the present invention is not limited to this.
- any one or more of the determination unit 210 and other update modules may be notified.
- the update module may be stopped, or the device 100 and the protection control module 120 may be stopped. Furthermore, the protection control module that has been tampered with may be deleted. Further, when the update modules 131 to 133 do not detect the falsification of the protection control module 120, the update software distribution module 210 is not notified.
- the present invention is not limited to this, and the falsification detection process is performed. As a result, it may be notified that no alteration has been detected. (12) In the above embodiment, as an operation of the detection process, the update module 13x does not transmit the detection result of falsification of the protection control module to other update modules.
- each update module shares the detection result. Also good. Further, when there is an update module that does not share the detection result, the update module may be determined to be an invalid update module and invalidated. (13)
- the operation of the analysis / determination process it is determined whether or not to update the protection control module 120 based on the falsification information. However, the present invention is not limited to this, and notification is made that the falsification has occurred. Whether or not to update may be determined according to the number of update modules that have been updated. Further, as the operation at the time of analysis / determination, it is determined whether or not the protection control module 120 is updated and whether or not the protection control module 120 is invalidated. However, the present invention is not limited to this, and the device 100 is stopped.
- the update modules 131 to 133 authenticate the update software distribution unit 220, and then the update software distribution unit 220 authenticates the respective update modules 131 to 133.
- the present invention is not limited to this, and the update software distribution unit 220 may authenticate the respective update modules 131 to 133, and then the update modules 131 to 133 may authenticate the update software distribution unit 220.
- Each of the update modules 131 to 133 and the update software distribution unit 220 may perform authentication processing individually.
- the update software distribution unit 220 uses different values for the challenge data in the process of authenticating each update module 13x.
- the challenge data may be set to the same value for all the update modules, or may be set to different values for each group when the update module 13x is divided into a plurality of grooves.
- each update module 13x individually uses the update software distribution unit 220. Authentication is performed, but this is not restrictive. The result of signature verification is notified to other update modules, the verification result is shared between the update modules, and the authentication result of the self-update module and the other update module are received. Whether the update software distribution unit 220 is valid or not may be determined from the authentication result.
- the update server 200 performs the mutual authentication process using the signature private key and the signature public key.
- An authentication key pair used for mutual authentication may be used separately from the private key and the signature public key.
- the authentication public key of the authentication key pair of the update server 200 may be held in advance by the update module 13x, or may be transmitted from the update server 200 to the update module 13x during mutual authentication processing.
- the update software distribution module 210 authenticates each of the update modules 131 to 133
- the update modules 131 to 133 together with the response data And the authentication key certificate are transmitted to the update software distribution unit 220.
- the present invention is not limited to this and may be transmitted at different timings.
- the authentication public key and the authentication key certificate may be transmitted only when requested by the update software distribution unit 220.
- the update software distribution unit 220 may receive the authentication public keys and authentication key certificates of all the update modules, or more than the preset number necessary for the recovery process or set in advance.
- the authentication public keys and authentication key certificates of update modules that are less than the allowable number of unauthorized update modules may be received.
- the monitoring process is performed twice during one decoding (monitoring 3-1, 3-2, 5-1, 5-2).
- the monitoring process may be performed three times or more in accordance with the time of the decryption process, and even during a process other than the decryption process, during the reception process or detection process of the key or the protection control module for update, A monitoring process may be performed during the mutual authentication process.
- the update process may be divided into a plurality of blocks and performed each time the process of the process block is completed. It may be performed at random time intervals, or may be performed at time intervals designated by the update server 200.
- each update module may acquire synchronization information indicating the timing of executing the monitoring process from an external server, and execute the monitoring process according to the acquired synchronization information. Thereby, each update module can execute the monitoring process at the same timing as the other update modules, so that it is possible to improve the detection accuracy of unauthorized update modules.
- the detection frequency at the normal time and during the recovery process may be changed. For example, by making the detection frequency at the time of recovery processing higher than normal, it is possible to ensure the protection of the protection control module during the recovery processing.
- the detection frequency may be changed during the recovery process.
- the monitoring process pattern includes the update module 131 detecting falsification of the update module 132 and the update module 132 detecting falsification of the update module 133.
- the update module 133 detects falsification of the update module 131.
- the present invention is not limited to this.
- the update module 131 detects falsification of the update module 133
- the update module 132 detects falsification of the update module 131
- the update module 133 detects falsification of the update module 132. Then, it may be determined at random which update module tampering detection is to be performed, or may be given from another module or the outside of the device 100.
- Each update module may verify whether or not the update module (own update module) has been tampered with. Further, when the alteration of the self-update module is detected, the self-update module itself may be invalidated.
- the plurality of update modules may transmit the result of falsification detection to the update server 200 in the order specified by the update server 200.
- the update module 131 detects falsification of the update module 132 and the update module 132 detects falsification of the update module 133 during the monitoring process. All the update modules perform the monitoring process such that the update module 133 detects the falsification of the update module 131.
- the present invention is not limited to this, and one update module performs the update process.
- the update module may perform the monitoring process. As a monitoring pattern at this time, one update module may monitor an update module that is performing update processing, or a plurality or all of the update modules may monitor.
- the update module 131 detects falsification of the update module 132
- the update module 132 detects falsification of the update module 133
- the update module 133 performs update processing.
- the monitoring process can also be performed without interrupting the update process.
- the update module 131 detects falsification of the update module 132
- the update module 132 detects falsification of the update module 133
- the update module 133 detects falsification of the update module 131.
- the loop method is used as the monitoring configuration, but each of the plurality of update modules may monitor each other or may be combined. By adopting a configuration in which each of the plurality of update modules monitors each other, tampering verification accuracy can be further increased. (23)
- the update module 132 overwrites the acquired protection control module 121 on the protection control module 120 and updates the protection control module 120.
- the present invention is not limited to this.
- the difference between the protection control module 120 and the update protection control module 121 may be acquired from the update software distribution module 210, and only the difference may be updated, or the update protection control module 121 may be changed to the protection control module.
- the update protection control module 121 may be executed instead of the protection control module 120 by writing to an area different from 120.
- the recovery process may be performed using a normal update module without using a tampered update module.
- the update software distribution unit 220 selects one update module to be used for decryption in the update process from the update module group 130.
- a predetermined update module may be selected, may be determined randomly, may be determined based on information notified from the device 100, or may be selected according to the order of authentication during mutual authentication You may do that.
- the update software distribution unit 220 encrypts the update protection control module 121 using a plurality of keys in the update process.
- the present invention is limited to this. Instead of generating a split module in which the update protection control module 121 is divided into a plurality of parts, each of the split modules is individually encrypted and transmitted to the update module in a one-to-one correspondence with the update module. Good.
- the encrypted split module may be transmitted to the update module at a time, and only the transmission timing of the key for decrypting them may be controlled, or the key may be transmitted to the update module at a time. Only the transmission timing of the encrypted divided module may be controlled, or all the keys and the encrypted divided module may be transmitted at a time. Further, the division module may not be encrypted with one key, but may be encrypted in multiple using a plurality of keys.
- the transmission control of the key and the multiplex-encrypted split module is the same as when the update protection control module 121 is multiplex-encrypted using a plurality of keys.
- the encrypted division module and the key for decrypting it may be transmitted to one update module, or may be transmitted to different update modules, and the update modules may cooperate in the apparatus 100.
- the monitoring process may be performed before and after the division module is received. Further, when an unauthorized update module that has been tampered with is detected by the monitoring process, the update process may be stopped at the timing of transmitting the next division module.
- the plurality of update modules may notify the update server, and the update server may not transmit the decryption key to the tampered update modules.
- the division modules may be encrypted with different encryption keys.
- the old encryption / decryption key may be used without generating a new encryption / decryption key, or the old encryption / decryption key and the new encryption / decryption key may be retained and the key used by the application may be changed. Alternatively, when the old encryption / decryption key becomes necessary, it may be generated again from the shared information. When the old encryption / decryption key is continuously used, the old encryption / decryption key increases every time the protection control module 120 is updated. In addition, it is necessary for each update module to hold the shared information of the new encryption / decryption key and the old encryption / decryption key.
- the device 100 is stopped when the protection control module 121 is not updated correctly.
- the present invention is not limited to this, and the mutual authentication process and the recovery process may be performed again. good.
- the access information is a dedicated driver for erasing the update module.
- the access information is for erasing the update module. It may be a dedicated program, a procedure manual that describes the procedure for deleting the update module, an address of the update module to be deleted, or a program for deleting the update module. It may be an address, or a register or memory address for operating a function for erasing the update module, or a value set in the register or memory.
- the access information may be information describing that the code portion is to be erased.
- the code position is stored in the header, and the code portion to be deleted may be determined with reference to the header.
- the access control module itself may be encrypted with an encryption key.
- the update module that has not been tampered with obtains a decryption key corresponding to the encryption key obtained by encrypting the access control module from the update server, decrypts the access control module using the obtained decryption key, and performs tampering.
- Access information corresponding to the updated update module may be acquired from the access control module, and the altered update module may be invalidated based on the acquired access information.
- the entire update module that has been tampered with is deleted.
- the present invention is not limited to this, and a part of the unauthorized update module that has been tampered with, for example, other Data such as specific functions and functions for reading modules, keys, information for accessing other modules (tickets, tokens, sockets), etc. may be deleted, or accessed from other programs It may be eliminated, inactivated, or updated.
- the update module that has performed the invalidation process may delete the access information corresponding to the invalidated update module stored in the access control module.
- the unauthorized update module that has been tampered with is invalidated.
- the present invention is not limited to this, and the unauthorized update module that has been tampered with may not be invalidated. At this time, it may be determined whether or not to invalidate depending on how many parts have been tampered with, which parts have been tampered with, etc., and the number of update modules to be invalidated based on the number of unauthorized update modules that have been tampered with You may decide. (32) In Embodiment 1 and Embodiment 2 described above, the number of update modules is three. However, the present invention is not limited to this, and there may be a plurality of update modules. (33) In the above embodiment, the access control module 140 and the update module group 130 are incorporated in the OS 150.
- the update module has a function for updating the OS
- the module may be stored as a program outside the management of the OS.
- a protection control module may be incorporated in the OS.
- the device 100 may be any device capable of bidirectional data communication, such as a mobile terminal such as a mobile phone or a digital television.
- the access information is encrypted with an individual access information acquisition key for each update module.
- the access information may be encrypted with the same access information acquisition key.
- a normal update module accesses the update server, acquires a decryption key corresponding to the access information acquisition key, decrypts the access control module using the acquired decryption key, and performs falsification from the access control module.
- the access information corresponding to the updated update module may be acquired, and the altered update module may be invalidated based on the acquired access information.
- the protection control module when the protection control module has been tampered with, the protection control module is updated. At this time, each of the plurality of update modules included in the update module group is replaced with another update module. Although the tampering verification is performed, the tampering verification may be performed, for example, when upgrading the version of the protection control module regardless of whether or not tampering has occurred.
- the protection control module for update is encrypted with a plurality of encryption keys, but may be encrypted with one encryption key.
- the decryption key corresponding to the encryption key is divided into a plurality of parts, all of the divided decryption keys are transmitted using the update module that has not been tampered with as the transmission destination, and using all the divided decryption keys,
- the update module that has not been tampered with may decrypt the protection control module for update.
- the update modules 131, 132, and 133 perform falsification detection of the protection control module 120. Furthermore, even if the protection control module 120 performs falsification detection of each update module. Good.
- the protection control module 120 verifies whether or not the update modules 131, 132, and 133 have been tampered with using a tampering detection certificate. If any of the update modules 131, 132, and 133 is detected as being altered, the protection control module 120 notifies the determination unit 210 to that effect. When tampering is not detected, the determination unit 210 is not notified.
- the determination unit 210 checks the protection control module 120 itself to determine whether the protection control module 120 has been tampered with. Request falsification detection processing.
- Each update module that has received a request from the determination unit 210 performs falsification detection of the protection control module 120 and notifies the determination unit 210 of the falsification detection result. Even if the protection control module 120 has been tampered with, it is not notified to other update modules. Since the subsequent processing is the same as the detection processing in the first embodiment, the description thereof is omitted.
- the protection control module 120 detects falsification of the update modules 131, 132, and 133.
- the protection control module 120 detects falsification of the update module, the protection control module 120 notifies the determination unit 210 to that effect.
- the determination unit 210 Upon receiving the notification, the determination unit 210 requests the update modules 131, 132, and 133 to perform mutual monitoring, and the update modules mutually detect tampering.
- the determination unit 210 determines whether the update module detected by the protection control module 120 is falsified from the result of mutual monitoring.
- the determination unit 210 determines that the protection control module 120 is valid. On the other hand, when it is determined from the result of mutual monitoring that the update module has not been tampered with, the determination unit 210 determines that the protection control module 120 is illegal.
- the protection control module 120 detects that the update module 132 has been tampered with
- the detection result by the protection control module 120 is also determined when the update module 132 is determined to have been tampered by mutual monitoring. Since it is proved that it was correct, it can be seen that the protection control module 120 has not been tampered with.
- the function for updating the protection control module 120 is held in advance in each update module.
- the present invention is not limited to this, and it is detected that the protection control module has been tampered with.
- a function for updating the protection control module 120 may be added to the update module by acquiring access information for updating the protection control module 120.
- the module invalidation unit 230 holds an access information acquisition key for updating the protection control module 120.
- the access control module 140 holds encrypted access information of the protection control module 120 in addition to access information of each update module.
- the update software distribution unit 220 multiplexly encrypts the update protection control module 121 using a plurality of keys, and the multiple encryption update protection control module and the first key are stored in the update module group 130. It is transmitted to the included update module 131 (S5001 to S5009).
- the update module included in the update module group 130 receives the second key from the update software distribution unit 220, decrypts the multi-encrypted update protection control module, and acquires the update protection control module (S5012). To S5016).
- the update module 132 After obtaining the update protection control module, the update module 132 obtains access information for updating the protection control module 120 to the module invalidating unit 230 in order to update the protection control module 120 to the update protection control module 121. Ask to send the key. Further, it requests the access control module 140 to transmit access information for updating the protection control module 120.
- the module invalidation unit 230 inquires of the update software distribution unit 220 whether or not the requesting update module is an update module for updating the protection control module 120, and performs protection control.
- the module 120 is an update module for updating the module 120
- an access information acquisition key for updating the protection control module 120 is sent to the request source update module 132.
- the access information module 140 When the access information module 140 receives an access information transmission request from the update module 132, the access information module 140 transmits encrypted access information corresponding to the protection control module 120 to the update module 132.
- the update module 132 When the update module 132 receives the access information acquisition key from the module invalidation unit 230 and receives the encrypted access information from the access control module 140, the update module 132 decrypts the encrypted access information using the received access information acquisition key, Get access information.
- the acquired access information is a dedicated driver for updating the protection control module 120.
- the update module 132 updates the protection control module 120 to the update protection control module 121 using the driver. Then, the end of the update is notified to other update modules.
- Each update module included in the update module group 130 verifies whether or not the protection control module 120 has been correctly updated to the update protection control module 121. If the update control module 120 has been correctly updated, the MAC value of the protection control module 121 is generated. . (40)
- the criterion is stored in the criterion storage unit 606 in the determination unit 210.
- the present invention is not limited to this, and the criterion may be a device external to the update server 200, It may be stored in a server, or may be acquired from the outside each time a judgment criterion is read. (41)
- the determination criterion is stored in advance in the determination criterion storage unit 606 in the determination unit 210.
- the present invention is not limited to this, and the determination criterion stored in advance is used as the update server. 200 may be changed, or a determination criterion may be acquired from an external device or server and changed.
- the update module has one piece of monitoring pattern information, but it may have a plurality of pieces of monitoring pattern information. Further, when a plurality of pieces of monitoring pattern information are provided, the monitoring patterns may be switched simultaneously by the update module group 130, or each update module may individually determine and switch.
- the switching timing may be determined within the device 100, may be notified from the update server 200, or an algorithm for determining the switching timing is notified in advance from the update server 200, and the device 100 is used using the algorithm.
- the switching timing may be determined by Further, together with a plurality of pieces of monitoring pattern information, information on when to switch the monitoring pattern and information on when to use which monitoring pattern may be included. As a result, even in a situation where the device 100 and the update server 200 cannot communicate with each other, it is possible to perform monitoring by combining various monitoring patterns by the device 100 alone. Further, when the monitoring pattern needs to be updated, only the switching instruction needs to be given from the update server 200, so that the amount of communication between the device 100 and the update server 200 can be reduced. (43)
- the monitoring target is composed of information related to the monitoring timing as the monitoring frequency of the monitoring pattern information.
- the present invention is not limited to this. The timing of using the monitoring pattern and the selection algorithm of the monitoring pattern may be included.
- the structure of the monitoring pattern main body is described with the number of monitoring patterns and the size of each monitoring pattern as header information at the beginning, and thereafter, a set of monitoring pattern identifiers and monitoring patterns is arranged.
- the present invention is not limited to this, and it is possible to simply describe one monitoring pattern, or to set the monitoring pattern size to a fixed length and not to describe the size in the monitoring pattern body. .
- the number of monitoring patterns may be described as header information, and the size, monitoring pattern identifier, and monitoring pattern group may be arranged thereafter.
- the arrangement order of the plurality of monitoring patterns may be arranged in the order corresponding to the information (module identifier, memory location, size, address, file name, etc.) related to the monitoring target module. They may be arranged in an order according to the order, may be arranged in an order according to the monitoring pattern identifier, or may be arranged irrespective of the information.
- the size is described as the header information
- the order of the size and the order of the set of the monitoring pattern identifier and the monitoring pattern corresponding to the size need to match.
- the update module dividing unit 905 divides into the same number as the number of update modules that perform the additional process as the operation of the additional process.
- the present invention is not limited to this, and the update process is performed.
- the number of update modules may be smaller than the number of update modules to be divided, or may be divided more.
- a part of the divided additional update module (additional update module part) is transmitted to two or more multiple update modules.
- the update module part may be received.
- the number of update modules that perform the addition process and the number of divisions of the update module for addition can be made different.
- the update module part is transmitted to a plurality of update modules and one of the update modules is attacked and becomes illegal, the update module that has received the same additional update module part
- the additional update module portion is subdivided and a plurality of non-continuous additional update module portions are transmitted to the respective update modules. This makes it difficult for an attacker to analyze.
- the update module holding unit 904 may hold the update module for addition divided in advance. Even if held in this way, the module addition unit can perform the addition process regardless of the number of update modules in the device 100. Further, even when the division method and the number of divisions are determined in advance, the additional process can be performed regardless of the number of update modules that perform the additional process. (46)
- each update module that has received the divided addition update module performs the addition process independently.
- the present invention is not limited to this, and each update module cooperates.
- the additional processing may be performed in order. In this case, in the sequence diagram of the addition process in FIG. 27, when the addition process is completed in each update module, the “addition process end notification” is notified only to the module addition unit. By notifying other update modules, it is possible to recognize how many additional processes have been completed by other update modules, or to notify the next update module of "addition process end notification”. Therefore, it is necessary to enable processing in order.
- a priority for performing the addition processing is added to each update module, and the update modules selected by the update server 200 execute the addition processing in order according to the priority. Also good.
- the priority order may be determined at the time of system design, the priority order may be notified from the server in advance, or may be determined at random within the device each time. Further, instead of the priority order, when the divided additional update module is transmitted to each update module, the processing order may be transmitted together.
- the order of the additional processing may be determined according to the order when the update module selection unit 903 selects, a random order may be used, or monitoring may be performed from many modules.
- the order may be determined so that the processing order of the update modules being processed is later.
- the order may be determined so that the processing order of the part including the information important for security is later, or the part having the larger size is sequentially started.
- the order may be determined so that additional processing is performed.
- FIG. 57 is a diagram illustrating an example of a dividing method when a plurality of update modules are added simultaneously.
- each update module for addition is divided into the same number of three as the update modules to be added, and a writing order is added to each. .
- the additional update module 1 part 1 and the additional update module 2 part 1 are added to the update module 131, the additional update module 1 part 2 and the additional update module 2 part 2 are sent to the update module 132, and the additional update module 1 part. 3 and the additional update module 2 part 3 are transmitted to the update module 133.
- Each update module performs an addition process according to the write order added to the received update module part for addition.
- the plurality of additional update modules are each divided into the same number.
- the present invention is not limited to this, and all the additional update modules may be divided into a predetermined number.
- a plurality of update modules are added simultaneously, the present invention is not limited to this, and an update module and a dummy module may be added.
- the device 100 receives the update module for addition from the update server 200.
- the present invention is not limited to this, and the update module part for addition is added to each update module in advance during the initial design process. It may be stored.
- a program for generating an additional update module portion instead of the additional update module portion may be stored in advance, and each update module may generate an additional update module portion when additional processing is required.
- the module adding unit 240 does not require the update module holding unit 904 and the update module dividing unit 905, and it is only necessary to select an update module to be added and send a process start instruction to the selected update module. . (49)
- the addition process is performed when the device 100 receives the update module for addition.
- the present invention is not limited to this.
- the update module for addition and the update module verification information divided from the update server 200 are not limited thereto.
- the number of normal update modules is less than a predetermined value such as a majority from the result of mutual monitoring by the update module group 130 and the result of check of the update module by the protection control module 120.
- the addition process may be performed using the update module for addition received in advance without communicating with the update server 200. Thereby, even when the device 100 is disconnected from the network, the update module can be added, and the security strength can be maintained.
- the monitoring pattern update unit 250 generates the monitoring pattern.
- the present invention is not limited to this, and the monitoring pattern may be stored in advance. The monitoring pattern may be given from a device or server outside the update server 200. As a result, the processing of the monitoring pattern update unit 250 can be reduced, so that the monitoring pattern update processing can be performed quickly.
- the monitoring pattern update unit 250 sends the generated new monitoring pattern to the device 100.
- the present invention is not limited to this, and the monitoring pattern generation program may be sent to the device 100. Good.
- the device 100 that has received the monitoring pattern generation program executes the monitoring pattern generation program to generate a monitoring pattern, and monitors according to the generated monitoring pattern. This makes it possible to generate an optimal monitoring pattern according to the internal state of the device 100, and to easily detect unauthorized update modules.
- a monitoring pattern may be installed in advance or obtained from the update server 200 when the device 100 is manufactured at the factory. If no monitoring pattern is installed, a default monitoring pattern may be used.
- the update module 131 monitors the update module 132, and the update module 132 is updated.
- a monitoring pattern such as a ring may be used so that the module 133 is monitored and the update module 133 monitors the update module 131.
- the user may set the security level as the operation of the initialization design process.
- the number of update modules and the monitoring frequency may be set according to the set security level.
- the update modules may be obtained from the update server 200. Further, a monitoring pattern may be obtained according to the security level.
- the security level can be set appropriately and the security strength can be maintained.
- an operation of the update module initialization process it may be verified whether or not there is a monitoring pattern of its own. Further, when there is no monitoring pattern, an inquiry may be made to the update server 200 to obtain the monitoring pattern.
- an inquiry may be made to the update server 200 to obtain the monitoring pattern.
- the protection control module 120 of the third device similar to the device 100 may be determined to restore the protection control module 120 based on the falsified information. Information may be acquired.
- the protection control module compromise information includes, for example, information that the protection control module of the same mounting method has been tampered with.
- 56 In Embodiment 3 described above, when the update module determines that more than half of the update modules are compromised as the operation of the invalidation determination process at normal time, the entire update module is updated. However, the present invention is not limited to this. The device may be stopped.
- the update module determines that more than half of the update modules are compromised as the normal invalidation determination process, the entire update module group 130 is updated. However, the present invention is not limited to this.
- the invalidation process may be performed on all of the compromised update modules, and the update module addition process may be performed after the invalidation process is completed.
- the addition process is performed when the update module is equal to or smaller than the predetermined value.
- the present invention is not limited to this, and whether or not the invalidation process has been performed.
- the additional process may be performed.
- the additional processing is not limited to once and may be performed a plurality of times.
- the predetermined value may be increased and added so as to be larger than the number of initial update modules.
- the entire update module may be updated instead of performing the additional processing. As a result, the number of update modules can be maintained at a fixed number, and the security strength in the device 100 can be maintained.
- the present invention is not limited to this, and it may be determined whether the monitoring pattern is updated when a certain period of time has elapsed, or monitoring may be performed according to the internal state of the device 100 such as normal time and recovery time. It may be determined whether to update the pattern. Further, information on the updated monitoring pattern of the third device may be obtained to determine whether to update the monitoring pattern, or information may be obtained from a device or server external to the update server 200 to update the monitoring pattern. May be judged.
- the update module that has received the verification information of the update module performs verification of the update module for addition (S3316), and the control unit 960 of the module addition unit 240 From the verification result, it is determined whether or not the additional update module has been added correctly (S3318).
- the present invention is not limited to this, and is different from the verification information of the update module added by the control unit 960 of the module addition unit 240.
- the update module dividing unit 905 divides an incorrect update module and transmits it to the update module, and the control unit 960 transmits the correct update module verification information, so that the verification result notified from the update module is incorrect.
- the control unit 960 transmits the correct update module verification information, so that the verification result notified from the update module is incorrect.
- the entire update module is updated.
- the present invention is not limited to this. It may be determined whether the limit of the function has been exceeded, and if so, the entire update module may be updated. As a case where the limit of the monitoring function is exceeded, for example, when a predetermined threshold value of more than half is exceeded, it may be determined that the limit of the monitoring function is exceeded. If there are update modules that do not have monitoring functions, the number of update modules is less than half, but if more than half of update modules with monitoring functions are compromised, it is determined that the limit of the monitoring function has been exceeded. .
- the present invention is not limited to this, and it may be determined that the monitoring pattern is updated when any fraud is detected in the mutual monitoring process. As a result, it is possible to confirm fraud in detail, such as which update module is fraudulent and what fraud. (63)
- the update modules 131 to 133 in the update module group 130 execute the falsification detection process for each of the other update modules, and are altered by the attacker.
- the present invention is not limited to this.
- the monitoring pattern may be updated to exclude an update module that does not return correct response data.
- the mutual monitoring can be performed only by the update module group that has returned the correct response data.
- the monitoring pattern update processing operation the monitoring pattern dividing unit 1004 divides the new monitoring pattern (whole) and sends it to the respective update modules. Instead, the new monitoring pattern (whole) may be sent to the device 100, and the update module may acquire and update its own monitoring pattern from the new monitoring pattern (whole).
- the monitoring pattern update processing operation the monitoring pattern body of the update module described in the updated new monitoring pattern body is verified.
- a predetermined update module may be verified in the device 100, the update server 200 may be notified of which update module is to be verified, or all update modules may be verified. If it is verified, it may be determined at random.
- the monitoring pattern dividing unit 1004 divides the new monitoring pattern (whole) and sends it to the respective update modules. Not what you want.
- the monitoring pattern may be acquired as follows. First, the update server 200 transmits a new monitoring pattern (whole) to an update module, and the updating module that has received the new monitoring pattern (whole) acquires only its own monitoring pattern from the new monitoring pattern (whole). , Transfer to other update module.
- the other update module that has received the new monitoring pattern (entire) acquires only its own monitoring pattern from the new monitoring pattern (entire) and transmits it to other update modules that have not acquired the new monitoring pattern. . By repeating this for all the update modules, each update module can acquire its own monitoring pattern.
- the update server encrypts the new monitoring pattern related to the update module so that only the respective update module can be decrypted, and transmits the encrypted new monitoring pattern (whole) to a certain update module.
- the update module that has received the new monitoring pattern (whole) may obtain its own monitoring pattern by decoding only its own new monitoring pattern and update the old monitoring pattern.
- the distributed information of adjacent update modules is held as the operation of the initial design processing.
- the present invention is not limited to this, and only the distributed information of adjacent update modules is used. Instead, adjacent update modules may hold the distribution information of update modules other than the adjacent update modules.
- the update module A may also hold the distribution information of the update module C adjacent to the update module B adjacent to one of the update modules A.
- the update module A holds four pieces of shared information including its own shared information.
- sharing of shared information is performed.
- the shared information verification process of Patent Document 2 is performed to check whether the shared information held by the uncompromised update module is correct.
- the compromised update module may be invalidated and the entire update module may not be updated.
- the shared information 1 held by the update module 131 is not held by other update modules, so additional processing is required.
- the additional determination process in this case will be described with reference to FIG. It is determined whether an adjacent update module has been compromised and only invalidation processing has been performed (S330A). If invalidation processing has been invalidated, additional processing is performed.
- the update module 132 and the update module 137 adjacent to the update module 131 are invalidated, the update module holding the shared information 1 is only the update module 131.
- the encryption / decryption key Cannot be restored.
- the protection control module 120 may update the shared information of the entire update module.
- the method of updating the shared information of the entire update module is the same as the method of updating the shared information of the entire update module in the normal invalidation determination process, and is therefore omitted here.
- the shared information 1 can be held by a plurality of update modules, it is possible to prevent the encryption / decryption key from being unable to be restored even when the update module 131 is falsified.
- the update module may be added so as to be adjacent to the update module 13A.
- the update module adjacent to the update module 13A is added after the process of verifying whether the application that should be protected has not been tampered with.
- priority is given to the additional work of the update module adjacent to the one to prevent the predetermined application from being attacked during the additional work.
- all the update modules hold the distribution information of the adjacent update modules.
- Information may be held by an adjacent update module and another update module.
- shared information 1 is held by the update modules 131, 132, and 137 in order to hold shared information of adjacent update modules. For this reason, as the operations of the invalidation determination process at normal time and the determination process at recovery time, if three consecutive update modules 131, 132, and 137 are compromised, the shared information 1 cannot be restored. I was going. As shown in FIG. 59, the distribution information 1 is held in the update modules 131, 132, 133, and 137, so that the update module 131, 132, and 137 are continuously connected in the normal invalidation determination process and the recovery determination process. Even if one of them is compromised, the shared information 1 cannot be restored.
- the decryption key may be divided, and the shared information may be generated by using the secret sharing method for one of the divided encryption / decryption keys.
- the protection control module 120 divides the encryption / decryption key into two, that is, a split key 1 and a split key 2.
- the shared information is generated so that the split key 1 becomes the shared information 1 from the shared information 1 and the split key 2 becomes the shared information 10 from the shared information 6 using the secret sharing method.
- the shared information of the split key 1 is transmitted from the update modules 1301 to 1305, and the shared information of the split key 2 is transmitted from the update modules 1306 to 1310.
- the shared information is received from each update module, the split key is restored, and the encryption / decryption key is restored from the restored split key. Further, in the operations of the invalidation determination process at normal time and the determination process at recovery time, it is determined whether or not three consecutive update modules are compromised in the configuration of the update module having shared information for the split key. Further, the withdrawal process and the addition process of Patent Document 2 used for the invalidation process and the addition process are performed by the configuration of the update module having the split key distribution information. (73) In the third embodiment of the present invention, the protection control module 120 generates the allocation information of the encryption / decryption key shared information, but the present invention is not limited to this, and the update server 200 generates the allocation information.
- the data may be transmitted to the protection control module 120 or may be obtained from an external device or server. Further, the number of shared information held may be input from the update server 200. At this time, even if the number of crossings is determined within the update server 200, it is determined how many of the update modules in the normal invalidation determination process and the recovery determination process are to be compromised by the update module configuration. Good. (74) In Embodiment 3 of the present invention, the protection control module 120 stores the distribution information allocation information of the encryption / decryption key. However, the present invention is not limited to this, and the protection control module 120 allocates the distribution information.
- each update module that has received the new monitoring pattern in S8101 uses the monitoring pattern update unit 309 to update its monitoring pattern information to the received new monitoring pattern. However, the monitoring pattern before update may be held.
- the monitoring pattern update unit 250 receives notification of the end of reflection of monitoring patterns from all the update modules, that is, when the update of all update patterns is completed, the monitoring pattern update unit 250 Sends an instruction to discard the monitoring pattern before update to the module. Then, each update module discards the monitoring pattern before update when receiving an instruction to discard the monitoring pattern. If the update of all update patterns is not completed, the new monitoring pattern is discarded.
- whether or not the update of all the monitoring patterns is completed may be performed on the monitoring pattern updating unit 250 side or on the updating module side.
- the monitoring pattern update unit 250 performs the process, when the monitoring pattern update unit 250 does not receive a reflection completion notification from all the update modules within a predetermined time after transmitting the new monitoring pattern to each update module. It is determined that the update of all update patterns has not been completed. In this case, the monitoring pattern update unit 250 instructs each update module to discard the monitoring pattern before update.
- each update module uses the MAC value stored in the MAC value table to detect whether or not another update module has been tampered with.
- the MAC value table itself is falsified, there is a possibility that the falsification detection of the update module may not be performed correctly.
- the update module has been tampered with, if the MAC value stored in the MAC value table has also been tampered with by the same attacker, the update module has not been tampered with, even though it has been tampered with Is detected.
- each update module verifies whether or not the monitoring pattern and the monitoring frequency have been correctly updated using the verification value stored in the verification value list.
- the verification value list itself is falsified, there is a possibility that the monitoring pattern and the monitoring frequency are not correctly verified.
- each update module implements a protection program for protecting the MAC value table and the verification value list, and protects the MAC value table and the verification value list. You may do that.
- each update module may mutually detect falsification of the protection program installed in each update module.
- the update module If no alteration of the protection program is detected, the update module considers that the MAC value table and the verification value list have not been altered, and if an alteration of the protection program is detected, the update module uses the MAC value table. And the verification value list can be regarded as being falsified.
- the protection program for protecting the MAC value table and the verification value list may be, for example, a program for encrypting / decrypting the MAC value table and the verification value list, or a signature generation program.
- padding data may be added to the MAC value table and the verification value list. Accordingly, it is possible to detect whether the MAC value table and the verification value list have been tampered with by determining whether the padding data is correct at the time of decryption or signature verification.
- the verification of the MAC value table and the verification value list may be performed regularly or irregularly. If it is performed irregularly, it may be performed before the mutual monitoring process by the update module group 130, for example.
- Each of the above modules may specifically be an individual computer program, a module incorporated in an operating system, or a driver called from the operating system. It may be an application program.
- Each of the above devices is specifically a computer system including a microprocessor, ROM, RAM, a hard disk unit, a display unit, a keyboard, a mouse, and the like. A computer program is stored in the RAM or hard disk unit. Each device achieves its functions by the microprocessor operating according to the computer program.
- the computer program is configured by combining a plurality of instruction codes indicating instructions for the computer in order to achieve a predetermined function.
- a part or all of the constituent elements included in each of the above devices may be configured by one system LSI (Large Scale Integration).
- the system LSI is a super multifunctional LSI manufactured by integrating a plurality of components on one chip, and specifically, a computer system including a microprocessor, a ROM, a RAM, and the like. .
- a computer program is stored in the RAM.
- the system LSI achieves its functions by the microprocessor operating according to the computer program.
- each part of the constituent elements constituting each of the above devices may be individually made into one chip, or may be made into one chip so as to include a part or all of them.
- the system LSI is used here, it may be called IC, LSI, super LSI, or ultra LSI depending on the degree of integration. Further, the method of circuit integration is not limited to LSI's, and implementation using dedicated circuitry or general purpose processors is also possible.
- An FPGA Field Programmable Gate Array
- a reconfigurable processor that can reconfigure the connection and setting of circuit cells inside the LSI may be used.
- a part or all of the components constituting each of the above devices may be configured as an IC card that can be attached to and detached from each device or a single module.
- the IC card or the module is a computer system including a microprocessor, a ROM, a RAM, and the like.
- the IC card or the module may include the super multifunctional LSI described above.
- the IC card or the module achieves its function by the microprocessor operating according to the computer program. This IC card or this module may have tamper resistance.
- the present invention may be the method described above. Further, the present invention may be a computer program that realizes these methods by a computer, or may be a digital signal composed of the computer program.
- the present invention also provides a computer-readable recording medium such as a flexible disk, hard disk, CD-ROM, MO, DVD, DVD-ROM, DVD-RAM, BD (Blu-ray Disc). ), Recorded in a semiconductor memory or the like.
- the digital signal may be recorded on these recording media.
- the computer program or the digital signal may be transmitted via an electric communication line, a wireless or wired communication line, a network represented by the Internet, a data broadcast, or the like.
- the present invention may be a computer system including a microprocessor and a memory, the memory storing the computer program, and the microprocessor operating according to the computer program.
- program or the digital signal is recorded on the recording medium and transferred, or the program or the digital signal is transferred via the network or the like, and executed by another independent computer system. It is good. (82) The above embodiment and the above modifications may be combined.
- the update system, the program execution device, and the like according to the present invention are suitable for consumer devices such as Internet home appliances that use secure applications because they can mutually monitor the unauthorized operation of each module to be executed and can maintain the security strength of the system high. is there.
- the monitoring system, the program execution device, and the like according to the present invention are manufactured, sold, and the like by a vendor that handles consumer equipment.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
Description
以下では、本発明に係る一つの実施形態であるソフトウェア更新システムについて、図面を参照して説明する。
(実施の形態1)
1.ソフトウェア更新システム10の構成
図1は、本発明の実施の形態1におけるソフトウェア更新システム10の全体構成図である。
ここでは、図2から図4を用いて、機器100の構成について説明する。
次に、更新サーバ200の構成について説明する。更新サーバ200は、機器100内部のソフトウェアを更新するために必要な更新用のソフトウェアを配布する装置である。
次に、更新モジュール群130に含まれる更新モジュールの構成について説明する。ここでは、更新モジュール131の構成について説明するが、他の更新モジュールも基本的に同一の構成を有する。
図9は、機器100の保護制御モジュール120の構成図である。同図に示すように、保護制御モジュール120は、受信部401、送信部402、制御部403、復号ロード部404、改ざん検出部405、解析ツール検出部406、暗復号鍵保持部407、暗復号鍵生成部408、暗復号鍵分散部409、証明書生成部410及び暗復号鍵復元部411から構成される。
図10は、機器100のアクセス制御モジュール140の構成図である。同図に示すように、アクセス制御モジュール140は、受信部501、送信部502及びアクセス情報保持部503から構成される。
図11は、更新サーバ200の判断部210の構成図である。同図に示すように、判断部210は、受付部601、指示部602、指示生成部603、不正モジュール特定部604、判断基準読込部605及び判断基準格納部606から構成される。
図12は、更新サーバ200の更新用ソフトウェア配布部220の構成図である。同図に示すように、更新用ソフトウェア配布部220は、受信部701、送信部702、暗号鍵生成部703、暗号処理部704、認証部705、更新モジュール選択部706、制御部707、証明書生成部708、署名秘密鍵保持部709、更新用ソフトウェア保持部710及び暗号鍵保持部711から構成される。
図13は、更新サーバ200のモジュール無効化部230の構成図である。同図に示すように、モジュール無効化部230は、受信部801、送信部802、アクセス情報取得鍵保持部803及び更新モジュール選択部804から構成される。
図14は、更新サーバ200のモジュール追加部240の構成図である。同図に示すように、モジュール追加部240は、受信部901、送信部902、更新モジュール選択部903、更新モジュール保持部904、更新モジュール分割部905及び制御部906から構成される。
図15は、更新サーバ200の監視パターン更新部250の構成図である。同図に示すように、監視パターン更新部250は、受信部1001、送信部1002、監視パターン生成部1003、監視パターン分割部1004及び制御部1005から構成される。
続いて、図16を用いて、ソフトウェア更新システム10の動作について説明する。
ここでは、図17~図19を用いて、初期設計処理について説明する。
図19は、更新モジュール初期化処理を示すフローチャートである。ここでは、更新モジュール131について説明するが、他の更新モジュール132、133の動作も基本的に同一である。
機器100は、初期設計処理を終えると工場から出荷され、ユーザの元へ送られる。ユーザの元で機器100が使用される。
次に、図21を用いて、解析・判断処理の動作について説明する。図21は、解析・判断処理の動作の流れを示すシーケンス図である。図21では、各更新モジュール131、132、133が個別に行う処理を、更新モジュール群130が行う処理としてまとめて記載している。
図22は、解析・判断処理の通常時判断処理(S3006)のシーケンス図である。
図23は、相互監視処理(S3100)の詳細なシーケンス図である。
図24は、通常時判断処理の通常時無効化判断処理(S3200)の詳細なフローチャートである。
次に、追加判断処理について説明する。図26は、通常時判断処理の追加判断処理(S3300)の詳細なフローチャートである。
次に、図28を用いて、監視パターン更新判断処理を説明する。図28は、通常時判断処理の監視パターン更新判断処理(S3400)の詳細なフローチャートである。
ここでは、図29及び図30を用いて、ソフトウェア更新システム10による相互認証処理の動作について説明する。
ここでは、図31から図38を用いて、ソフトウェア更新システム10による回復処理の動作について説明する。
ここでは、図33及び図34を用いて、更新処理(S5000)の一例を説明する。
ここでは、図35及び図36を用いて、回復時相互監視処理(S5100)の一例を説明する。
ここでは、図36を用いて、回復時判断処理(S5103)の詳細について説明する。
ここでは、図32を用いて、更新処理と回復時相互監視処理との連携動作の詳細について説明する。回復時相互監視処理は、更新処理と連携するだけでなく、更新処理の開始から終了まで定期的に繰り返して行なわれる。回復時相互監視処理は、新保護制御モジュールがネットワークを介して完全に外部に出力されるまでに要する時間より短い時間間隔で繰り返し実施する必要がある。例えば、新保護制御モジュールが完全に外部に出力されるまでに1秒かかるのであれば、それより短い500ミリ秒間隔のタイミングで回復時相互監視処理を実行する。以下、詳細に説明する。
次に、図37を用いて、回復処理の再暗号化処理(S5200)の一例について説明する。
次に、図38を用いて、回復処理の回復時無効化判断処理(S5300)について説明する。
追加判断処理(S5400)は、通常時判断処理(図21のS3006)で行う追加判断処理(図22のS3300)と同様である。ここでは説明を省略する。
監視パターン更新判断処理(S5500)は、通常時判断処理(図21のS3006)で行う監視パターン更新判断処理(図22のS3400)と同様である。ここでは説明を省略する。
ここでは、図39のフローチャートを用いて、次ラウンド準備処理の動作について説明する。次ラウンド準備処理では、回復処理の終了後、次の回復処理のための準備を行う。以下、具体的に説明する。
ここでは、図25のフローチャートを用いて、ソフトウェア更新システム10における無効化処理の動作について説明する。
次に、図27のフローチャートを用いて、ソフトウェア更新システム10における追加処理の動作について説明する。追加処理は、図26のS3302の詳細であり、機器100内部の更新モジュールの数を増やすために更新モジュールを追加する処理である。
ここでは、ソフトウェア更新システム10における監視パターン更新処理について説明する。監視パターン更新処理は、更新モジュールの無効化処理や追加処理を行った後に、監視パターンを更新する必要あると判断された場合、機器100内部の更新モジュール群130の監視パターンを更新する処理である。
実施の形態1では、機器100の状態に応じて、機器100が行う処理の処理順序が異なる。管理サーバ200の判断部210は、機器100にどの処理を優先させるか、判断基準を用いて判断する。
実施の形態1では、ある更新モジュールが無効化されることによって、他の更新モジュールから監視されない更新モジュールが存在してしまうことのないよう、監視パターンの更新処理(S3402)を行っていた。本実施の形態では、さらに、監視モジュールにおいて監視パターンの更新処理が確実に行われたか否かを他の更新モジュールが検証し、更新後の監視パターンが常に用いられることを保証する。これにより、古い監視パターンに基づき他の更新モジュールから一切監視されていないなど不正な動作をしうる更新モジュールが動作してしまうのを避けることができる。さらに、本実施の形態では、更新サーバ200の監視パターン更新部250が、更新モジュール131~133の構成に応じた適切な監視パターンを生成している。以下、それぞれの詳細について説明する。なお、実施の形態1と同じ構成要素については同じ符号を用いるものとし、実施の形態1で既に説明した処理についての説明は省略する。
まず、更新モジュール131~133の構成について説明し、次に、監視パターン更新部250の構成について説明する。
図62に示す例の場合、更新モジュール131は、更新モジュール133、134を監視するので、更新モジュール131に係る新監視パターンには更新モジュール133及び134を識別する識別子が記載される。また、更新モジュール134については、更新モジュール133、136、137を監視するので、更新モジュール134に係る新監視パターンには、更新モジュール133、136、137のそれぞれを識別する識別子が記載される。
ソフトウェア更新システム10における監視パターン更新処理の動作について図46のフローチャートを用いて説明する。
上述の実施の形態1では、暗復号鍵に対し秘密分散法を用いて分散情報を生成し、各更新モジュール自身に割り当てられた分散情報を保持するものとしていた。本実施の形態では、各更新モジュールには、各更新モジュール自身に割り当てられた分散情報だけでなく、他の更新モジュールの分散情報をも保持する機能が追加されている。この機能により、一部の更新モジュールが無効化されても、残りの更新モジュールから暗復号鍵を復元しうる。よって、暗復号鍵を復元するために更新モジュールが改ざんされたとしても、改ざんされた更新モジュールを無効化することなく、正常な更新モジュールのみで動作を継続できる。以下、実施の形態3における処理の詳細について説明する。
まず、通常時無効化判断処理について説明する。
図51は、更新モジュール群130のうち、半数以上が危殆化した例を示す図である。
回復時判断処理(S5103)の詳細について図54を用いて説明する。
なお、本発明を上記実施の形態に基づいて説明してきたが、本発明は、上記の実施の形態に限定されないのはもちろんである。以下のような場合も本発明に含まれる。
(1)上記実施の形態では、保護制御モジュール120を更新するとしたが、これに限定するものではなく、更新モジュールやアプリ等、保護制御モジュール120以外のモジュールを更新するとしてもよい。以下、更新モジュール133を更新する場合を例に、更新モジュールの更新処理を説明する。
(2)上記実施の形態では、更新モジュール13x(xは1~7)は、受信部301、送信部302、制御部303、更新部304、検証部305、MAC値生成部306、MAC値テーブル更新部307、監視パターン取得部308、監視パターン更新部309、分散情報保持部310を含んで構成されるとしたが、これに限定されるものではない。例えば、監視処理に必要な構成要素(制御部303、検証部305、監視パターン取得部308、監視パターン更新部309)のみで構成されるとしてもよい。また、更新処理に必要な構成要素(制御部303、更新部304)のみで構成されるとしてもよい。また、無効化処理に必要な構成要素(制御部303、更新部304)のみで構成されるとしてもよい。さらに、上記の組み合わせから構成されるとしてもよい。
(3)上記実施の形態では、更新モジュール13xにおいて検証部305により他の更新モジュールや保護制御モジュール120の改ざんチェックを実行するとしたが、改ざんチェック対象はモジュール全体に限定するものではなく、モジュール内の一部、例えば、特定の機能や関数、鍵等のデータであってもよい。また、一度に改ざん対象全てを改ざんチェックするのではなく、改ざん対象の一部を改ざんチェックするだけでもよい。この場合、改ざん対象を一定のサイズに分割した部分毎に改ざんチェックしてもよいし、機能や関数単位で分割した部分毎に改ざんチェックしてもよい。さらに、改ざん対象の一部を、改ざんチェックの度に順番に改ざんチェックするとしてもよいし、改ざんチェックする部分を改ざんチェックの度にランダムに決定してもよし、どの部分を改ざんチェックするかを他のモジュールや機器100外部などから指定されることとしてもよい。
(4)上記実施の形態では、特に明示はしなかったが、重要度の高いモジュールについて、耐タンパ化された領域など、攻撃者による攻撃から保護されている領域で動作させることとしてもよい。例えば、更新モジュール13xや保護制御モジュール120を、上述のような保護されている領域で動作させてもよい。監視処理に必要な構成要素のみで構成される更新モジュールが、攻撃者による攻撃から保護されている領域で動作する場合には、他の更新モジュールや判断部210は、その保護された領域にある更新モジュールから、他の更新モジュールや保護制御モジュール120が攻撃されたことを検知した旨の通知を受けたときに、その通知を無条件に受け入れ、更新処理や無効化処理を実施することとしてもよい。また、その通知を他のモジュールからの通知よりも重要な通知として扱い、更新処理や無効化処理の判断を行ってもよい。
(5)上記実施の形態では、モジュール無効化部230は、更新サーバ200にあり、アクセス制御モジュール140は、機器100にあるとしたが、これに限定するものではない。例えば、モジュール無効化部230とアクセス制御モジュール140とはそれぞれ、機器100にあってもよいし、更新サーバ200にあってもよいし、各更新モジュール内にあってもよい。また、アクセス情報取得鍵配布モジュール220とアクセス制御モジュール140とは、別々のモジュールではなく1つのモジュールであってもよい。モジュール無効化部230とアクセス制御モジュール140とが1つのモジュールである場合には、更新モジュールへアクセス情報取得鍵と暗号化アクセス情報とを送信するのではなく、アクセス情報を直接送信してもよい。さらに、モジュール無効化部230やアクセス制御モジュール140が機器100内にあるときには、耐タンパ化などにより攻撃から保護される領域にあるとしてもよい。
(6)上記実施の形態では、更新サーバ200は、判断部210と更新用ソフトウェア配布部220、モジュール無効化部230、モジュール追加部240、監視パターン更新部250、通信部260とから構成されるとしたが、これに限定するものではなく、判断部210と更新用ソフトウェア配布部220、モジュール無効化部230、モジュール追加部240、監視パターン更新部250、通信部260が、1つのモジュールであってもよいし、どれか1つのモジュールのみで構成されてもよいし、上記の組み合わせから構成されるとしてもよい。
(7)上記実施の形態では、ソフトウェア更新システム10は、機器100の工場製造時に初期設計処理を行うとしたが、これに限定するものではなく、販売後など工場出荷後のどこかで初期化処理を実施してもよい。また、初期化処理は1度だけでなく、2度以上実施してもよい。
(8)上記実施の形態では、初期設計処理の動作として、検証用証明書及び認証鍵証明書は、更新用ソフトウェア配布部220が保持する署名秘密鍵を用いて生成された証明書であるとしたが、これに限定するものではなく、それぞれ別の鍵を用いて生成されてもよいし、更新用ソフトウェア配布部220以外の証明書発行装置により発行された証明書でもよい。
(9)上記実施の形態では、初期設計処理や次ラウンド準備処理の動作として、暗復号鍵から生成する分散情報を更新モジュール13xへ送信し、更新モジュール13xが分散情報を保持するとしたが、これに限定するものではなく、更新モジュールの代わりにアプリが保持するとしてもよいし、更新モジュール13xとアプリとが保持するとしてもよい。
(10)上記実施の形態では、検知処理の動作として、更新モジュール13xが保護制御モジュール120の改ざん検出を行うときに、検証鍵を使用して計算したMAC値を用いて改ざん検出処理を行うとしたが、これに限定するものではなく、保護制御モジュール120の改ざん検出用証明書を用いて検証するとしてもよい。また、MAC値や証明書のようにハッシュ値を利用した改ざん検証を行うのではなく、ログをチェックすることで改ざん検証を行うとしてもよい。
(11)上記実施の形態では、検知処理の動作として、更新モジュール13xが保護制御モジュール120の改ざんを検出した場合、判断部210と他の更新モジュールへ通知するとしたが、これに限定するものではなく、判断部210と他の更新モジュールのうち、どれか1つ以上のモジュールに通知するとしてもよい。また、保護制御モジュール120の改ざんを検出した場合、更新モジュールを停止するとしてもよいし、機器100や保護制御モジュール120を停止するとしてもよい。更に、改ざんされた保護制御モジュールを消去するとしてもよい。さらに、更新モジュール131~133が保護制御モジュール120の改ざんを検出しなかった場合、更新用ソフトウェア配布モジュール210へ通知を行わないとしたが、これに限定するものではなく、改ざん検出処理を実施した結果として、改ざんを検出しなかった旨を通知するとしてもよい。
(12)上記実施の形態では、検知処理の動作として、更新モジュール13xは、他の更新モジュールに保護制御モジュールの改ざん検出結果を送信しないとしたが、それぞれの更新モジュールで検出結果を共有するとしてもよい。また、検出結果を共有しない更新モジュールがあった場合に、当該更新モジュールを不正な更新モジュールと判断して無効化するとしてもよい。
(13)上記実施の形態では、解析・判断処理の動作として、改ざん情報に基づいて保護制御モジュール120を更新するかどうか判定するとしたが、これに限定するものではなく、改ざんされていると通知してきた更新モジュールの数によって更新するか否かを判定してもよい。また、解析・判断時の動作として、保護制御モジュール120を更新するか否か、及び保護制御モジュール120を無効化するか否かを判断したが、これに限定するものではなく、機器100を停止するか否かを判断するとしてもよい。
(14)上記実施の形態では、相互認証処理の動作として、更新モジュール131~133が更新用ソフトウェア配布部220を認証し、その後、更新用ソフトウェア配布部220がそれぞれの更新モジュール131~133を認証するとしたが、これに限定するものではなく、更新用ソフトウェア配布部220がそれぞれの更新モジュール131~133を認証し、その後、更新モジュール131~133が更新用ソフトウェア配布部220を認証してもよいし、それぞれの更新モジュール131~133と更新用ソフトウェア配布部220とが個別に認証処理を行ってもよい。
(15)上記実施の形態では、相互認証処理の動作として、更新用ソフトウェア配布部220がそれぞれの更新モジュール13xを認証する処理において、チャレンジデータをそれぞれの更新モジュールで異なる値にするとしたが、これに限定するものではなく、チャレンジデータを全ての更新モジュールで同じ値としてもよいし、更新モジュール13xを複数のグルーブに分けた場合のそれぞれのグループで異なる値にしてもよい。
(16)上記実施の形態では、相互認証処理の動作として、それぞれの更新モジュール13xが、更新用ソフトウェア配布部220を認証する処理において、それぞれの更新モジュール13xが個別に更新用ソフトウェア配布部220を認証するとしたが、これに限定するものではなく、署名検証した結果を他の更新モジュールへ通知し、更新モジュール間で検証結果を共有し、自更新モジュールの認証結果と他の更新モジュールから受信した認証結果とから、更新用ソフトウェア配布部220が正当かどうかをそれぞれ判定してもよい。判定方法としては、例えば、一定数(例えば、過半数等)の更新モジュールが認証に成功した場合には正当であると判定し、認証に成功しなかった場合には、正当ではないと判定する方法がある。
(17)上記実施の形態では、相互認証処理の動作として、更新サーバ200は署名秘密鍵と署名公開鍵とを使用して相互認証処理を実施するとしたが、これに限定するものではなく、署名秘密鍵と署名公開鍵とは別に、相互認証に使用する認証鍵対を用いるとしてもよい。この時、更新サーバ200の認証鍵対のうちの認証公開鍵は、予め更新モジュール13xで保持するとしてもよいし、相互認証処理時に更新サーバ200から更新モジュール13xへ送信するとしてもよい。
(18)上記実施の形態では、相互認証処理の動作として、正当なモジュールであると検証できた更新モジュールが、回復処理に必要な数以上あるかどうかで、その後の回復処理を実施するかどうか判定したが、これに限定するものではなく、不正な更新モジュールの数が、予め設定されている許容数未満かどうかで回復処理を実施するかどうか判定してもよい。また、相互認証処理において、回復処理に必要な数に満たないと判定した場合には、機器を停止するとしたが、更新モジュールを無効化してもよい。
(19)上記実施の形態では、相互認証処理の動作として、更新用ソフトウェア配布モジュール210がそれぞれの更新モジュール131~133を認証する時に、更新モジュール131~133は、レスポンスデータと一緒に認証公開鍵と認証鍵証明書とを更新用ソフトウェア配布部220へ送信するとしたが、これに限定するものではなく、それぞれ別のタイミングで送信してもよい。また、認証公開鍵や認証鍵証明書は、更新用ソフトウェア配布部220から要求があったときにのみそれぞれ送信するとしてもよい。この時、更新用ソフトウェア配布部220は、全ての更新モジュールの認証公開鍵や認証鍵証明書を受信してもよいし、予め設定されている、回復処理に必要な数以上、或いは予め設定されている、不正な更新モジュールの許容数未満の更新モジュールの認証公開鍵と認証鍵証明書とを受信してもよい。
(20)上記実施の形態では、回復処理の動作として、監視処理を1回の復号中(監視3-1、3-2、5-1、5-2)に2回実施するとしたが、これに限定するものではなく、復号処理の時間にあわせて監視処理を3回以上行ってもよいし、復号処理以外であっても、鍵や更新用保護制御モジュールの受信処理時や検知処理時、相互認証処理時に監視処理を行ってもよい。また、監視処理を一定時間間隔で定期的に実施するとしたが、これに限定するものではなく、更新処理を複数のブロックに分割し、その処理ブロックの処理が終わるごとに実施してもよいし、ランダムな時間間隔で実施してもよいし、更新サーバ200から指定された時間間隔で実施してもよい。
(21)上記実施の形態1や実施の形態2では、回復処理の動作として、監視処理のパターンは、更新モジュール131が更新モジュール132の改ざん検出を行い、更新モジュール132が更新モジュール133の改ざん検出を行い、更新モジュール133が更新モジュール131の改ざん検出を行うものであったが、これに限定するものではない。例えば、更新モジュール131が更新モジュール133の改ざん検出を行い、更新モジュール132が更新モジュール131の改ざん検出を行い、更新モジュール133が更新モジュール132の改ざん検出を行うなど、予め決められたパターンで改ざん検出するとしてもよいし、どの更新モジュールの改ざん検出を行うかをランダムに決定してもよいし、他のモジュールや機器100外部から与えられるとしてもよい。また、各更新モジュールは、当該更新モジュール(自更新モジュール)が改ざんされていないかを検証するとしてもよい。さらに、自更新モジュールの改ざんを検出した場合に、自更新モジュール自身を無効化するとしてもよい。更に、複数の監視パターンを保持している場合、全ての更新モジュールが他の更新モジュールから監視される必要はなく、ある監視パターンでは、他の更新モジュールから監視されない更新モジュールがあってもよい。また、全ての更新モジュールは、複数の更新モジュールから監視されてもよい。また、監視処理のパターンを変更する場合は、改ざん検出の処理毎など、一定の間隔で変更するとしてもよいし、ランダムなタイミングで変更するとしてもよいし、他のモジュールや機器100外部から与えられたタイミングで変更するとしてもよい。また、複数の更新モジュールは、改ざん検出の結果を、更新サーバ200により指定される順序で、更新サーバ200に送信してもよい。
(22)上記実施の形態1や実施の形態2では、回復処理の動作として、監視処理時に、更新モジュール131が更新モジュール132の改ざん検出を行い、更新モジュール132が更新モジュール133の改ざん検出を行い、更新モジュール133が更新モジュール131の改ざん検出を行うというように、全ての更新モジュールが監視処理を行うとしたが、これに限定するものではなく、一つの更新モジュールが更新処理を実施し、他の更新モジュールが監視処理を実施してもよい。このときの監視パターンとしては、更新処理を行っている更新モジュールを、1つの更新モジュールが監視してもよいし、複数または全ての更新モジュールが監視してもよい。例えば、更新モジュール131が更新モジュール132の改ざん検出を行い、更新モジュール132が更新モジュール133の改ざん検出を行い、更新モジュール133が更新処理を行う。これにより、更新処理を中断することなく監視処理も実施できる。
(23)上記実施の形態では、回復処理の動作として、更新モジュール132は、取得した更新用保護制御モジュール121を保護制御モジュール120に上書きし、保護制御モジュール120を更新するとしたが、これに限定するものではなく、更新用ソフトウェア配布モジュール210から保護制御モジュール120と更新用保護制御モジュール121との差分を取得し、差分のみを更新するとしてもよいし、更新用保護制御モジュール121を保護制御モジュール120とは別の領域へ書き込み、保護制御モジュール120に代わって、更新用保護制御モジュール121が実行されるようにしてもよい。
(24)上記実施の形態では、回復処理の動作として、監視処理により更新モジュール13xの改ざんが検出された場合、改ざん検出の通知を受けた判断部210は、直ちに回復処理を停止するとしたが、これに限定するものではなく、更新用ソフトウェア配布部220から更新モジュールへ、鍵などのデータを次に送信するタイミングで回復処理を停止するとしてもよい。また、回復処理を停止するのではなく、改ざんされた更新モジュールを使用せずに、正常な更新モジュールを用いて回復処理を行うとしてもよい。また、監視処理により改ざんが検出された場合だけでなく、検知処理時に保護制御モジュール120によって改ざんが検出された更新モジュールや、相互認証処理時に認証に失敗した更新モジュールについても同様に、当該更新モジュールを使用せずに回復処理を行うとしてもよい。さらに、改ざんされた更新モジュールが存在する場合には、保護制御モジュールの更新を行わないとしてもよい。
(25)上記実施の形態では、回復処理の動作として、更新処理において復号に使用する更新モジュールを、更新用ソフトウェア配布部220が更新モジュール群130から一つ選択するとしたが、その選択方法は、予め決められた更新モジュールを選択するとしてもよいし、ランダムに決定するとしてもよいし、機器100から通知された情報を元に決定するとしてもよいし、相互認証時に認証した順番に応じて選択するとしてもよい。
(26)上記実施の形態では、回復処理の動作として、更新処理において更新用ソフトウェア配布部220が更新用保護制御モジュール121を複数の鍵を用いて多重に暗号化するとしたが、これに限定するものではなく、更新用保護制御モジュール121を複数の部分に分割した分割モジュールを生成し、分割モジュールそれぞれを個別に暗号化し、更新モジュールと一対一に対応する形態で、更新モジュールへ送信するとしてもよい。この場合、更新処理としては、暗号化した分割モジュールと暗号に使用した鍵を送信するときに、それらを1度に全て送信するのではなく、1つの暗号化した分割モジュールの復号処理が終了するまで、他の暗号化した分割モジュールと鍵を送信しないように、更新モジュールへの送信を制御する。別の方法として、暗号化した分割モジュールは1度に更新モジュールへ送信し、それらを復号するための鍵の送信のタイミングのみを制御するとしてもよいし、鍵は1度に更新モジュールへ送信し、暗号化した分割モジュールの送信のタイミングのみを制御するとしてもよいし、全ての鍵と暗号化した分割モジュールを1度に送信するとしてもよい。また、分割モジュールは、1つの鍵で暗号化されるのではなく、複数の鍵を用いて多重に暗号化されてもよい。この場合、鍵や多重暗号化した分割モジュールの送信制御は、更新用保護制御モジュール121を複数の鍵を用いて多重に暗号化した時と同様である。更に、暗号化した分割モジュールとそれを復号する鍵は、1つの更新モジュールへ送信してもよいし、それぞれ別の更新モジュールへ送信し、機器100内部で更新モジュール同士が協調動作するとしてもよい。その際、分割モジュールを受信する前後で監視処理を実施してもよい。また、監視処理により、改ざんされた不正な更新モジュールが検出された場合、次の分割モジュールを送信するタイミングで更新処理を停止してもよい。さらに、複数の更新モジュールは、改ざんされた更新モジュールが存在する場合には、それを更新サーバに通知し、更新サーバは、改ざんされた更新モジュールには復号鍵を送信しないとしてもよい。分割モジュールはそれぞれ異なる暗号鍵で暗号化されていてもよい。
(27)上記実施の形態では、回復処理の動作として、暗復号鍵(旧暗復号鍵)で暗号化されたアプリ110、111を新しい暗復号鍵(新暗復号鍵)を用いて再暗号化するとしたが、これに限定するものではなく、再暗号化処理を行わなくてもよい。この時、新暗復号鍵を生成せずに旧暗復号鍵を使い続けるとしてもよいし、旧暗復号鍵と新暗復号鍵を保持しておき、アプリによって使用する鍵を変える構成にしてもよいし、旧暗復号鍵が必要になったときには分散情報から再び生成するとしてもよい。旧暗復号鍵を使用し続ける場合は、保護制御モジュール120が更新される度に旧暗復号鍵が増えることになる。また、各更新モジュールで新暗復号鍵と旧暗復号鍵の分散情報を保持しておく必要がある。
(28)上記実施の形態において、保護制御モジュール121が正しく更新されなかった場合に機器100を停止するとしたが、これに限定するものではなく、再度、相互認証処理及び回復処理を実施するとしても良い。
(29)上記実施の形態において、無効化処理の動作として、アクセス情報は、更新モジュールを消去するための専用ドライバであるとしたが、これに限定するものではなく、更新モジュールを消去するための専用プログラムであってもよいし、更新モジュールを消去するための手順が記された手順書であってもよいし、消去する更新モジュールのアドレスであってもよいし、更新モジュールを消去するプログラムのアドレスであってもよいし、更新モジュールを消去するための機能を動作させるためのレジスタやメモリのアドレスやレジスタやメモリに設定する値であってもよい。また、アクセス情報は、コード部分を消去する旨が記述された情報であってもよい。この場合、コード位置はヘッダに格納されており、ヘッダを参照して消去すべきコード部分を判断するとしてもよい。さらに、アクセス制御モジュール自体が暗号鍵で暗号化されているとしてもよい。その場合には、改ざんされていない更新モジュールは、更新サーバから、アクセス制御モジュールを暗号化した暗号鍵に対応する復号鍵を取得し、取得した復号鍵を用いてアクセス制御モジュールを復号し、改ざんされた更新モジュールに対応するアクセス情報をアクセス制御モジュールから取得し、取得したアクセス情報に基づいて、改ざんされた更新モジュールを無効化するとしてもよい。
(30)上記実施の形態において、無効化処理の動作として、改ざんされた更新モジュール全体を消去するとしたが、これに限定するものではなく、改ざんされた不正な更新モジュールの一部、例えば、他のモジュールを読み込むための読み込み機能など特定の機能や関数、鍵や他のモジュールをアクセスするための情報(チケット、トークン、ソケット)などのデータを消去するとしてもよいし、他のプログラムからアクセスできなくしてもよいし、不活性化してもよいし、更新してもよい。また、改ざんされた更新モジュールを無効化した後、無効化処理を行った更新モジュールは、アクセス制御モジュールに格納されている、無効化した更新モジュールに対応するアクセス情報を消去するとしてもよい。
(31)上記実施の形態において、改ざんされた不正な更新モジュールを無効化するとしたが、これに限定するものではなく、改ざんされた不正な更新モジュールを無効化しないとしてもよい。このとき、どのくらいの部分が改ざんされているか、どの部分が改ざんされたか等によって、無効化するかどうかを判断してもよいし、改ざんされた不正な更新モジュールの数によって無効化する更新モジュール数を決めてもよい。
(32)上記実施の形態1や実施の形態2では、更新モジュールの数を3として説明したが、これに限定されるものでなく、更新モジュールは、複数あればよい。
(33)上記実施の形態では、アクセス制御モジュール140及び更新モジュール群130は、OS150の中に組み込まれているとしたが、更新モジュールがOSを更新する機能を備えている場合等には、更新モジュールは、OSの管理外にプログラムとして格納されているとしてもよい。また、保護制御モジュールがOSに組み込まれているとしてもよい。
(34)機器100は、具体的には、携帯電話等の携帯端末やデジタルテレビ等、双方向のデータ通信が可能な機器であればよい。
(35)上記実施の形態では、アクセス情報は、更新モジュール毎にそれぞれ個別のアクセス情報取得鍵で暗号化されているとしたが、同一のアクセス情報取得鍵で暗号化されているとしてもよい。その場合には、正常な更新モジュールが更新サーバにアクセスして、アクセス情報取得鍵に対応した復号鍵を取得し、取得した復号鍵を用いてアクセス制御モジュールを復号し、アクセス制御モジュールから、改ざんされた更新モジュールに対応するアクセス情報を取得し、取得したアクセス情報に基づいて、改ざんされた更新モジュールを無効化するとしてもよい。
(36)上記実施の形態では、保護制御モジュールが改ざんされている場合に、当該保護制御モジュールを更新し、その際、更新モジュール群に含まれる複数の更新モジュールの各々が、他の更新モジュールの改ざん検証を行うとしたが、改ざんの有無に関わらず、例えば、保護制御モジュールのバージョンをアップさせる場合等において改ざん検証を行うとしてもよい。
(37)上記実施の形態では、更新用の保護制御モジュールは、複数の暗号鍵で暗号化されていたが、一つの暗号鍵で暗号化されているとしてもよい。その場合、当該暗号鍵に対応する復号鍵が複数に分割され、分割された復号鍵の全てが、改ざんされていない更新モジュールを送信先として送信され、分割された全ての復号鍵を用いて、改ざんされていない更新モジュールは、更新用の保護制御モジュールを復号するとしてもよい。
(39)上記実施の形態では、各更新モジュールに保護制御モジュール120を更新するための機能を予め保持させていたが、これに限定するものではなく、保護制御モジュールの改ざんを検出し、保護制御モジュール120を更新する必要が生じたときに、保護制御モジュール120を更新するためのアクセス情報を取得することにより、保護制御モジュール120を更新する機能を更新モジュールに付加するとしてもよい。このとき、モジュール無効化部230は、アクセス情報取得鍵保持部803に加え、保護制御モジュール120を更新するためのアクセス情報取得鍵を保持している。また、アクセス制御モジュール140は、各更新モジュールのアクセス情報に加え、保護制御モジュール120の暗号化アクセス情報を保持している。
(40)上記実施の形態では、判断基準は判断部210内の判断基準格納部606に格納されているとしたが、これに限定するものではなく、判断基準は更新サーバ200の外部の装置やサーバに格納してもよいし、判断基準を読み込む場合に、その都度外部から取得してもよい。
(41)上記実施の形態では、判断基準は判断部210内の判断基準格納部606に予め格納されているとしたが、これに限定するものではなく、予め格納されている判断基準を更新サーバ200内部で変更してもよいし、外部の装置やサーバから判断基準を取得して変更してもよい。
(42)上記実施の形態では、更新モジュールは監視パターン情報を1つ持つとしているが、監視パターン情報を複数持ってもよい。また、監視パターン情報を複数持つ場合、更新モジュール群130で一斉に監視パターンを切り替えてもよいし、各更新モジュールが個別に判断し切り替えてもよい。切り替えるタイミングは、機器100内で判断してもよいし、更新サーバ200から通知してもよいし、切り替えタイミングを判断するアルゴリズムを更新サーバ200から事前に通知し、そのアルゴリズムを使用して機器100で切り替えタイミングを判断してもよい。また、複数の監視パターン情報と一緒に、監視パターンを切り替えるタイミングやどの監視パターンをいつ使うかの情報を持ってもよい。これにより、機器100と更新サーバ200が通信不可能な状況においても、様々な監視パターンを組み合わせた監視を機器100単独で実施することが可能となる。また、監視パターンの更新が必要になった時に、更新サーバ200から切り替えの指示のみを行えばよいため、機器100と更新サーバ200との通信量を減らすことが可能となる。
(43)上記実施の形態では、監視パターン情報の監視頻度として、監視対象を、監視するタイミングに関する情報から構成されるとしたが、これに限定するものではなく、複数の監視パターンのうち、どの監視パターンを使用するかのタイミングや、監視パターンの選択アルゴリズムを含むとしてもよい。これにより、同じ監視頻度であっても異なる監視パターンを選択することが可能となり、攻撃者による、監視される更新モジュールの予想が困難になる。
(44)上記実施の形態では、監視パターン本体の構造が、先頭にヘッダ情報として監視パターンの数と監視パターンそれぞれのサイズが記述され、それ以降に、監視パターン識別子と監視パターンの組がそれぞれ並ぶ構造になるとしたが、これに限定するものではなく、単に、監視パターン1つを記述するだけでもよいし、監視パターンのサイズを固定長のサイズとし、監視パターン本体にサイズを記述しないとしてもよい。また、ヘッダ情報として監視パターンの数を記述し、それ以降に、サイズと監視パターン識別子、監視パターンの組がそれぞれ並ぶ構造になっていてもよい。更に、複数の監視パターンの並び順は、監視対象であるモジュールに関する情報(モジュール識別子、メモリ上の位置、サイズ、アドレス、ファイル名等)に応じた順番で並べてもよいし、監視パターンのサイズに応じた順番で並べてもよいし、監視パターン識別子に応じた順番で並べてもよいし、それらの情報とは無関係に並べてもよい。但し、ヘッダ情報としてサイズを記述する場合には、サイズの順番と、それに対応する監視パターン識別子と監視パターンの組の順番は一致している必要がある。
(45)上記実施の形態では、追加処理の動作として、更新モジュール分割部905が追加処理を実施する更新モジュールの数と同数に分割するとしたが、これに限定するものではなく、更新処理を実施する更新モジュールの数より少なく分割してもよいし、多く分割してもよい。例えば、少ない場合には、分割した追加用更新モジュール(追加用更新モジュール部分)の一部を2以上の複数の更新モジュールに送信し、多い場合には、一部の更新モジュールが複数の追加用更新モジュール部分を受信するとしてもよい。これにより、追加処理を実施する更新モジュールの数と、追加用更新モジュールを分割する数を、異なる数にすることが可能となる。また、1つの追加用更新モジュール部分を複数の更新モジュールに送信することで、どちらか一方の更新モジュールが攻撃され不正なものとなった場合にも、同じ追加用更新モジュール部分を受信した更新モジュールが追加処理を行うことで、更新モジュールの追加処理を継続することが可能になる。さらに、1つの更新モジュールが複数の追加用更新モジュール部分を受信することが可能になるため、追加用更新モジュールを細かく分割し、連続しない複数の追加用更新モジュール部分をそれぞれの更新モジュールへ送信することで、攻撃者による解析を困難にすることが可能となる。
(46)上記実施の形態では、分割した追加用更新モジュールを受信した各更新モジュールは、それぞれ独立に追加処理を実施するとしたが、これに限定するものではなく、それぞれの更新モジュールが連携して、順番に追加処理を実施するとしてもよい。この場合、図27の追加処理のシーケンス図において、各更新モジュールで追加処理が終了したときに、「追加処理終了通知」をモジュール追加部のみへ通知しているが、この「追加処理終了通知」を他の更新モジュールへも通知することで、他の更新モジュールが何番目の追加処理まで終了したかを認識できるようにする、あるいは、「追加処理終了通知」を次の更新モジュールへ通知することで、順番に処理が可能になるようにする必要がある。
(47)上記実施の形態では、更新モジュールを1つ追加する処理を説明したが、これに限定するものではなく、複数の更新モジュールを同時に追加するとしてもよい。図57は、複数の更新モジュールを同時に追加するときの分割方法の一例を示す図である。図57において、3つの更新モジュールを用いて追加処理を実施するとき、まず、それぞれの追加用更新モジュールを、追加処理する更新モジュールと同じ数の3つに分割し、それぞれに書き込み順を付加する。そして、追加用更新モジュール1部分1と追加用更新モジュール2部分1を更新モジュール131へ、追加用更新モジュール1部分2と追加用更新モジュール2部分2を更新モジュール132へ、追加用更新モジュール1部分3と追加用更新モジュール2部分3を更新モジュール133へ送信する。それぞれの更新モジュールでは、受信した追加用更新モジュール部分に付加されている書き込み順番に応じて追加処理を実施する。ここで、複数の追加用更新モジュールをそれぞれ同じ数に分割したが、これに限定するものではなく、すべての追加用更新モジュールで所定の数に分割するとしてもよい。また、複数の更新モジュールを同時に追加するとしたが、これに限定するものではなく、更新モジュールとダミーモジュールを追加してもよい。これにより、複数の更新モジュールを一度に追加することが可能となり、機器100のセキュリティ強度を向上させることが可能になる。また、複数の追加用更新モジュールの部分が一緒になった状態で、更新サーバ200から機器100へ送信、追加処理が実施されるため、攻撃者による解析が困難になる。さらに、ダミーモジュールも含めることにより、より解析を困難にすることが可能となる。
(48)上記実施の形態では、機器100が追加用更新モジュールを更新サーバ200から受信するとしたが、これに限定するものではなく、初期設計処理時に、各更新モジュールへ追加用更新モジュール部分を予め格納してもよい。また、追加用更新モジュール部分ではなく、追加用更新モジュール部分を生成するプログラムを予め格納し、追加処理が必要な時に各更新モジュールが追加用更新モジュール部分を生成してもよい。この場合、モジュール追加部240において、更新モジュール保持部904と更新モジュール分割部905は不要であり、追加処理を行う更新モジュールを選択し、選択した更新モジュールへ処理開始の指示を送信するのみでよい。
(49)上記実施の形態では、追加用更新モジュールを機器100が受信した時に追加処理を行うが、これに限定するものではなく、更新サーバ200から分割された追加用更新モジュールと更新モジュール検証情報を機器100があらかじめ受信し、更新モジュール群130による相互監視の結果や、保護制御モジュール120による更新モジュールのチェック結果から、正常な更新モジュールの数が過半数などの所定の値以下になったことを検出したときに、更新サーバ200と通信することなく、あらかじめ受信した追加用更新モジュールを用いて追加処理を実施してもよい。これにより、機器100がネットワークから切断されていた場合にも、更新モジュールの追加処理が可能となり、セキュリティ強度を保つことが可能となる。
(50)上記実施の形態では、監視パターン更新部250では、監視パターンを生成するとしたが、これに限定するものではなく、監視パターンを予め格納しているとしてもよい。また、監視パターンは更新サーバ200の外部の装置やサーバから与えられてもよい。これにより、監視パターン更新部250の処理を減らすことが可能となるため、監視パターンの更新処理を迅速に行うことが可能となる。
(51)上記実施の形態では、監視パターン更新部250では、生成した新監視パターンを機器100へ送付するとしたが、これに限定するものではなく、監視パターン生成プログラムを機器100に送付するとしてもよい。このとき、監視パターン生成プログラムを受信した機器100は、監視パターン生成プログラムを実行して監視パターンを生成し、生成した監視パターンに従って監視する。これにより、機器100の内部状態に応じて最適な監視パターンを生成することが可能となり、不正な更新モジュールを検知しやすくなる。
(52)上記実施の形態では、初期設計処理の動作として、機器100の工場製造時に、予め監視パターンをインストールしてもよいし、更新サーバ200から入手してもよい。また、監視パターンがインストールされていない場合には、デフォルトの監視パターンを使用するとしてもよい。デフォルトの監視パターンは、例えば、すべての他の更新モジュールを監視する監視パターンや実施の形態1のように更新モジュールが3つの場合、更新モジュール131が更新モジュール132を監視し、更新モジュール132が更新モジュール133を監視し、更新モジュール133が更新モジュール131を監視するように、リングのような監視パターンであってもよい。
(53)上記実施の形態では、初期化設計処理の動作として、ユーザがセキュリティレベルを設定してもよい。設定したセキュリティレベルに合わせて、更新モジュールの数や監視の頻度を設定できるとしてもよい。また、ユーザが設定したセキュリティレベルにおいて、更新モジュールの数が足りない場合、更新サーバ200から更新モジュールを入手してもよい。また、セキュリティレベルに合わせて、監視パターンを入手してもよい。このことにより、セキュリティレベル適切に設定でき、セキュリティ強度を保つことが可能となる。
(54)上記実施の形態では、更新モジュール初期化処理の動作として、自身の監視パターンがあるか否かを検証してもよい。また、監視パターンが存在しない場合には、更新サーバ200に問い合わせをし、監視パターンを入手してもよい。
(55)上記実施の形態では、解析・判断処理の動作として、検知処理の結果を基に、保護制御モジュール120が改ざんされていると判断し、回復するかの判断をしているが、これに限定するものではなく、機器100と同様の第三の機器の保護制御モジュールが改ざんされた情報を基に、保護制御モジュール120を回復するか判断してもよいし、外部から保護制御モジュール危殆化情報を取得するとしてもよい。保護制御モジュール危殆化情報として、例えば、同じ実装方法の保護制御モジュールが改ざんされたなどの情報がある。
(56)上記実施の形態3では、通常時無効化判断処理の動作として、更新モジュールが半数以上危殆化と判断した場合、更新モジュール全体を更新しているが、これに限定するものではなく、機器を停止するとしてもよい。
(57)上記実施の形態では、通常時無効化判断処理の動作として、更新モジュールが半数以上危殆化と判断した場合、更新モジュール群130全体を更新しているが、これに限定するものではなく、危殆化している更新モジュールの全てに対し、無効化処理を行い、無効化処理が完了した後に、更新モジュールの追加処理を行うとしてもよい。
(58)上記実施の形態では、追加判断処理の動作として、更新モジュールが所定値以下の場合、追加処理を行うとしたが、これに限定するものではなく、無効化処理が行われたか否かを判断し、無効化処理が行われていた場合に、追加処理を行うとしてもよい。また、追加処理は1回に限らず複数回行ってもよい。さらに、所定値を増やし、初期の更新モジュールの数より多くなるように追加してもよい。また、追加処理を実施するのではなく更新モジュール全体を更新してもよい。このことにより、更新モジュール数が一定数で維持することができ、機器100内のセキュリティ強度を保つことができる。
(59)上記実施の形態では、監視パターン更新判断処理の動作として、無効化処理や追加処理により更新モジュールの構成が変更されたことで、監視パターンの更新が必要であるか否かを判断しているが、これに限定するものではなく、ある一定時間が経過したことで監視パターンの更新の判断をしてもよいし、通常時と回復時のような機器100内部の状態に応じて監視パターンの更新の判断をしてもよい。また、第三の機器の監視パターンが更新された情報を入手し、監視パターンの更新の判断をしてもよいし、更新サーバ200の外部の装置やサーバから情報を入手し、監視パターンの更新を判断してもよい。更に、相互監視の結果、不正な更新モジュールが判明した場合に監視パターンを更新すると判断してもよい。これにより、攻撃者による攻撃が行われる前、或いは攻撃直後に監視パターンの更新を行うことが可能となるため、攻撃を困難にできる。
(60)上記実施の形態では、追加処理の動作として、更新モジュールの検証情報を受信した更新モジュールは、追加用更新モジュールの検証を実施し(S3316)、モジュール追加部240の制御部960が、検証結果から、追加用更新モジュールが正しく追加されたかを判定(S3318)しているが、これに限定するものではなく、モジュール追加部240の制御部960が追加した更新モジュールの検証情報とは異なった検証情報を更新モジュールに送信し、異なった検証情報で検証させることで、更新モジュールからの通知される検証結果が正しくないことを確認することで、追加用更新モジュールの検証が正しく実施されているかを検証するとしてもよい。また、更新モジュール分割部905が誤った更新モジュールを分割し、更新モジュールへ送信し、制御部960が正しい更新モジュールの検証情報を送信することで、更新モジュールからの通知される検証結果が正しくないことを確認することで、追加用更新モジュールの検証が正しく実施されているかを検証するとしてもよい。このことにより、追加用更新モジュールの検証(S3316)が正しく動作しているかの確認ができ、検証機能が正しく動作していることで、機器100内に不正な更新モジュールが追加されることを防止できる。
(61)上記実施の形態では、通常時無効化判断処理の動作として、更新モジュールが半数以上危殆化と判断した場合、更新モジュール全体を更新しているが、これに限定するものではなく、監視機能の限界を超えているかを判断し、超えている場合に、更新モジュール全体を更新してもよい。監視機能の限界を超えている場合として、例えば、半数以上の所定のしきい値を超えた場合、監視機能の限界を超えていると判断してもよい。また、監視機能を持たない更新モジュールが存在する場合において、更新モジュール全体の数では半数以下だが、監視機能を持つ更新モジュールが半数以上危殆化した場合は監視機能の限界を超えていると判断する。
(62)上記実施の形態では、監視パターン更新判断処理の動作として、無効化処理や追加処理による更新モジュールの構成が変更されたことで、監視パターンの更新が必要であるか否かを判断しているが、これに限定するものではなく、相互監視処理で、何らかの不正を検出した場合に監視パターンを更新すると判断してもよい。これにより、どの更新モジュールが不正なのか、また、どのような不正なのかなど詳細に不正の確認をすることができる。
(63)上記実施の形態では、相互監視処理の動作として、更新モジュール群130内の更新モジュール131~133がそれぞれ他の更新モジュールに対して改ざん検出の処理を実施し、攻撃者により改ざんされていた場合にはそれを検出するとしているが、これに限定するものではなく、改ざんされていた位置や量の度合いにより、不正を検出するとしてもよいし、更新モジュールのログをチェックして不正を検出するとしてもよい。
(64)上記実施の形態では、相互認証処理の動作として、正しいレスポンスデータを返す更新モジュールの数を判定し、回復処理に必要な更新モジュールの数が満たされていれば、回復処理に移行するが、このとき、正しいレスポンスデータを返さない更新モジュールを記憶する機能を追加してもよい。正しいレスポンスデータを返さない更新モジュールは改ざんされている可能性があり、記憶することで、更新処理に用いる更新モジュールを選択する(S5006)が正しいレスポンスデータを返さない更新モジュールを選択しないことで、正しいレスポンスデータを返さない更新モジュールが改ざんされていて、更新処理が正常に行えなくなることを防止することができる。また、正しいレスポンスデータを返さない更新モジュールを除いた監視パターンに更新するとしてもよい。このことにより、回復時相互監視処理の相互監視処理(S5101)の動作において、正しいレスポンスデータを返した更新モジュール群のみで相互監視を行うことができる。
(65)本発明の実施の形態2では、監視パターンの更新処理の動作として、監視パターン分割部1004が新監視パターン(全体)を分割し、それぞれの更新モジュールに送るとしているが、これに限定するものではなく、新監視パターン(全体)を機器100に送り、更新モジュールが新監視パターン(全体)から自身の監視パターンを取得し、更新してもよい。
(66)本発明の実施の形態2では、監視パターンの更新処理の動作として、更新した新監視パターン本体に記述されている更新モジュールの、監視パターン本体を検証するとしているが、すべての更新モジュールを検証してもよいし、機器100内で予め決められた更新モジュールを検証してもよいし、更新サーバ200がどの更新モジュールを検証するかを通知してもよいし、すべての更新モジュールが検証されるのであればランダムに決定してもよい。
(67)本発明の実施の形態2では、監視パターンの更新処理の動作として、監視パターン分割部1004が新監視パターン(全体)を分割してそれぞれの更新モジュールに送るとしているが、これに限定するものではない。例えば、以下のように、監視パターンを取得してもよい。まず、更新サーバ200がある更新モジュールに新監視パターン(全体)を送信し、新監視パターン(全体)を受信した更新モジュールが、新監視パターン(全体)のうち自身の監視パターンのみを取得して、他の更新モジュールに転送する。さらに、新監視パターン(全体)を受信した他の更新モジュールが、新監視パターン(全体)のうち自身の監視パターンのみを取得して、新監視パターンを取得していない他の更新モジュールへ送信する。これをすべての更新モジュールについて繰り返すことで、各更新モジュールが自身の監視パターンを取得できる。
(68)本発明の実施の形態3では、初期設計処理の動作として、隣接する更新モジュールの分散情報を保持するとしているが、これに限定するものではなく、隣接する更新モジュールの分散情報だけでなく、隣接する更新モジュールが隣接する自身以外の更新モジュールの分散情報を保持するようにしてもよい。具体的には、更新モジュールAの一方に隣接する更新モジュールBが隣接する更新モジュールCの分散情報も更新モジュールAが保持するようにしてもよい。この場合、更新モジュールAは自身の分散情報を含め、分散情報4つを保持することになる。また、通常時無効化判断処理の動作として、隣接する両隣の更新モジュールが危殆化したと判断しても、更新モジュール全体を更新する必要はなく、危殆化した更新モジュールに無効化処理を行い、特許文献2の脱退処理を行うことで、分散情報の持ち合いが行われる。ただし、再暗号化処理において、暗復号鍵の復元の動作では、危殆化していない更新モジュールの持つ分散情報が正しいかどうか、特許文献2の分散情報の検証処理を行う。分散情報の検証処理の詳細な方法は特許文献2の57ページに詳しく説明されているので、ここでの説明は省略する。上記の処理により、更新モジュールCに隣接する更新モジュールが危殆化しても、更新モジュールAが更新モジュールCの分散情報を保持するため、特許文献2のにおける分散情報の検証処理を行うことができ、更新モジュールCの分散情報の正当性を検証し、暗復号鍵の復元処理(S5204)において、正しく復元できなくなることを防止することができる。
(69)本発明の実施の形態3では、通常時無効化判断処理の動作として、隣接する更新モジュールが危殆化したと判定した場合(S320B)、更新モジュール全体を更新するとしたが、これに限定するものではなく、危殆化した更新モジュールの無効化処理を行い、更新モジュール全体を更新しなくてもよい。ただし、図58に示すように、更新モジュール131の保持する分散情報1を他の更新モジュールが保持しなくなるため、追加処理が必要となる。この場合の追加判断処理を図58を用いて説明する。隣接する更新モジュールが危殆化し、無効化処理のみが行われたかを判定し(S330A)、無効化されている場合には、追加処理を行う。更新モジュール131に隣接する更新モジュール132と更新モジュール137が無効化された場合、分散情報1を保持する更新モジュールは更新モジュール131のみになり、次に更新モジュール131が攻撃された場合、暗復号鍵の復元をすることができなくなる。この場合、更新モジュールを追加し、追加した更新モジュールに分散情報1を保持させることで、更新モジュール131が攻撃されても、暗復号鍵が復元できなくなることを回避することができる。ここで、追加した更新モジュールに分散情報1を保持させるのではなく、保護制御モジュール120が更新モジュール全体の分散情報を更新するとしてもよい。更新モジュール全体の分散情報を更新する方法は、通常時無効化判断処理における更新モジュール全体の分散情報の更新方法と同様であるので、ここでは省略する。上記のようにすることにより、分散情報1を複数の更新モジュールで保持することができるため、更新モジュール131が改ざんされた場合においても、暗復号鍵の復元ができなくなることを防止できる。
(70)本発明の実施の形態3では、通常時無効化判断処理の動作として、ある更新モジュール13Aに隣接する更新モジュールのどちらか一方(ここでは、更新モジュール13)が危殆化した場合において、特許文献2の脱退処理を行わず、更新モジュール13Bの無効化処理を行ってもよい。このことにより、更新モジュール13Aの分散情報Aはどちらか一方が保持しているため、追加処理の必要がなく、追加処理を行わないことで複数の更新モジュールが不正動作を行わないかの検証を継続するなど他の処理を行うことができる。
(71)本発明の実施の形態3では、初期設計処理の動作として、全ての更新モジュールが隣接する更新モジュールの分散情報を保持するとしたが、これに限定するものではなく、ある更新モジュールの分散情報は隣接する更新モジュールとさらに他の更新モジュールが保持するとしてもよい。以下、図59を用いて具体的に説明する。実施の形態3では、隣接する更新モジュールの分散情報を保持するため、分散情報1は更新モジュール131、132、137が保持していた。そのため、通常時無効化判断処理や回復時判断処理の動作として、更新モジュール131、132、137の連続3つが危殆化した場合、分散情報1が復元できなくなるため、機器を停止するなどの処理を行っていた。図59のように、分散情報1を更新モジュール131、132、133、137が保持するようにすることで、通常時無効化判断処理や回復時判断処理で更新モジュール131、132、137の連続3つが危殆化した場合においても、分散情報1が復元できなくなることはないため、分散情報1に関しては、通常時無効化判断処理や回復時判断処理の動作として、連続4つが危殆化しているかの判定となる。ただし、分散情報2から分散情報7に関しては、隣接する更新モジュールのみが保持しているため、連続3つが危殆化しているかの判定となる。このように、各分散情報を持ち合いする数が違う場合には、分散情報ごとに持ち合いの数を考慮して判定する必要がある。実施の形態3では、分散情報の持ち合いの数がすべて3のため、分散情報ごとの判定が考慮不要となる。
(72)本発明の実施の形態3では、初期設計処理の動作として、保護制御モジュール120の暗復号鍵を全ての更新モジュールが一様に保持するとしたが、これに限定するものではなく、暗復号鍵を分割し、分割した暗復号鍵の1つに対して、秘密分散法を用いて分散情報を生成するとしてもよい。具体的な例として、図60を用いて説明する。保護制御モジュール120は暗復号鍵を分割鍵1と分割鍵2の2つに分割する。それぞれの分割鍵に初期設計処理と同様に秘密分散法を用いて、分割鍵1が分散情報1から分散情報5に、分割鍵2が分散情報6から分散情報10となるように分散情報を生成する。分割鍵1の分散情報を更新モジュール1301から1305に送信し、分割鍵2の分散情報を更新モジュール1306から1310に送信する。暗復号鍵の復元では、各更新モジュールから分散情報を受信し、分割鍵を復元し、復元した分割鍵から暗復号鍵を復元する。また、通常時無効化判断処理や回復時判断処理の動作では、分割鍵に対する分散情報を持つ更新モジュールの構成において、連続3つ更新モジュールが危殆化しているかの判定を行う。また、無効化処理や追加処理に用いる特許文献2の脱退処理や追加処理は、分割鍵の分散情報を持つ更新モジュールの構成で行う。
(73)本発明の実施の形態3では、保護制御モジュール120が暗復号鍵の分散情報の配置情報を生成しているが、これに限定するものではなく、更新サーバ200が配置情報を生成し、保護制御モジュール120に送信するとしてもよいし、外部の装置やサーバから入手するとしてもよい。また、分散情報の持ち合いの数を更新サーバ200から入力するとしてもよい。この時、持ち合いの数によって、更新サーバ200内で通常時無効化判断処理や回復時判断処理の更新モジュールのうち更新モジュールの構成で連続いくつが危殆化するかを判定する数を決定してもよい。
(74)本発明の実施の形態3では、保護制御モジュール120が暗復号鍵の分散情報の配置情報を記憶しているが、これに限定するものではなく、保護制御モジュール120が分散情報の配置情報を更新サーバ200に送信し、更新サーバ200が記憶してもよいし、更新サーバ200が更新モジュール群130に通知依頼を送信し、更新モジュール群130から受信してもよいし、更新サーバ200の外部の装置やサーバから入手するとしてもよい。
(75)実施の形態2では、S8101において新監視パターンを受信したそれぞれの更新モジュールは、監視パターン更新部309を用いて、自身の監視パターン情報を、受信した新監視パターンへ更新することとしていたが、更新前の監視パターンを保持しておくものとしてもよい。そして、S8102において、監視パターン更新部250が全更新モジュールから監視パターンの反映終了の通知を受け取った場合、すなわち、全ての更新パターンの更新が完了した場合に、監視パターン更新部250は、各更新モジュールに更新前の監視パターン破棄の指示を送信する。そして、各更新モジュールは、監視パターン破棄の指示を受けた場合に、更新前の監視パターンを破棄する。全ての更新パターンの更新が完了しなかった場合、新監視パターンの方を破棄する。
(76)上記実施の形態1において、各更新モジュールは、MAC値テーブルに格納されているMAC値を用いて、他の更新モジュールの改ざんの有無を検出する。ここで、MAC値テーブル自体が改ざんされた場合には、更新モジュールの改ざん検出が正しく実施されない可能性がある。例えば、更新モジュールが改ざんされた場合であっても、MAC値テーブルに格納されているMAC値も同じ攻撃者により改ざんされていた場合、更新モジュールが改ざんされているにもかかわらず、改ざんは無いと検出される。
(77)上記の各モジュールは、具体的には、それぞれ個別のコンピュータプログラムであってもよいし、オペレーティングシステムに組み込まれるモジュールであってもよいし、オペレーティングシステムから呼ばれるドライバであってもよいし、アプリケーションプログラムであってもよい。
(78)上記の各装置は、具体的には、マイクロプロセッサ、ROM、RAM、ハードディスクユニット、ディスプレイユニット、キーボード、マウスなどから構成されるコンピュータシステムである。前記RAMまたはハードディスクユニットには、コンピュータプログラムが記憶されている。前記マイクロプロセッサが、前記コンピュータプログラムにしたがって動作することにより、各装置は、その機能を達成する。ここでコンピュータプログラムは、所定の機能を達成するために、コンピュータに対する指令を示す命令コードが複数個組み合わされて構成されたものである。
(79)上記の各装置を構成する構成要素の一部または全部は、1個のシステムLSI(Large Scale Integration:大規模集積回路)から構成されているとしてもよい。システムLSIは、複数の構成部を1個のチップ上に集積して製造された超多機能LSIであり、具体的には、マイクロプロセッサ、ROM、RAMなどを含んで構成されるコンピュータシステムである。前記RAMには、コンピュータプログラムが記憶されている。前記マイクロプロセッサが、前記コンピュータプログラムにしたがって動作することにより、システムLSIは、その機能を達成する。
(80)上記の各装置を構成する構成要素の一部または全部は、各装置に脱着可能なICカードまたは単体のモジュールから構成されているとしてもよい。前記ICカードまたは前記モジュールは、マイクロプロセッサ、ROM、RAMなどから構成されるコンピュータシステムである。前記ICカードまたは前記モジュールは、上記の超多機能LSIを含むとしてもよい。マイクロプロセッサが、コンピュータプログラムにしたがって動作することにより、前記ICカードまたは前記モジュールは、その機能を達成する。このICカードまたはこのモジュールは、耐タンパ性を有するとしてもよい。
(81)本発明は、上記に示す方法であるとしてもよい。また、これらの方法をコンピュータにより実現するコンピュータプログラムであるとしてもよいし、前記コンピュータプログラムからなるデジタル信号であるとしてもよい。
(82)上記実施の形態及び上記変形例をそれぞれ組み合わせるとしてもよい。
100 機器
110、111 アプリ
120 保護制御モジュール
121 新保護制御モジュール
130 更新モジュール群
131、132、133、134、135、136、137 更新モジュール
140 アクセス制御モジュール
150 OS
160 ブートローダ
171 CPU
172 EEPROM
173 RAM
174 NIC
200 更新サーバ
210 判断部
220 更新用ソフトウェア配布部
230 モジュール無効化部
240 モジュール追加部
250 監視パターン更新部
301 受信部
302 送信部
303 制御部
304 更新部
305 検証部
306 MAC値生成部
307 MAC値テーブル更新部
308 監視パターン取得部
309 監視パターン更新部
310 分散情報保持部
311 監視パターン検証部
312 モジュール機能通知部
313 機能情報保持部
401 受信部
402 送信部
403 制御部
404 復号ロード部
405 改ざん検出部
406 解析ツール検出部
407 暗復号鍵保持部
408 暗復号鍵生成部
409 暗復号鍵分散部
410 証明書生成部
411 暗復号鍵復元部
501 受信部
502 送信部
503 アクセス情報保持部
601 受付部
602 指示部
603 指示生成部
604 不正モジュール特定部
605 判断基準読込部
606 判断基準格納部
701 受信部
702 送信部
703 暗号鍵生成部
704 暗号処理部
705 認証部
706 更新モジュール選択部
707 制御部
708 証明書生成部
709 署名秘密鍵保持部
710 更新用ソフトウェア保持部
711 暗号鍵保持部
801 受信部
802 送信部
803 アクセス情報取得鍵保持部
804 更新モジュール選択部
901 受信部
902 送信部
903 更新モジュール選択部
904 更新モジュール保持部
905 更新モジュール分割部
906 制御部
1001 受信部
1002 送信部
1003 監視パターン生成部
1004 監視パターン分割部
1005 制御部
1006 機能情報取得部
1007 更新完了判定部
1301、1302、1303、1304、1305、1306、1307、1308、1309、1310 更新モジュール
Claims (12)
- プログラム実行装置と、サーバ装置とから構成される監視システムであって、
前記プログラム実行装置は、複数のモジュールを備え、
前記複数のモジュールのうち少なくとも2つは、他のモジュールの不正動作を監視する監視モジュールであり、
前記監視モジュールの各々は、
不正動作の監視対象である1以上のモジュールを示す監視先情報を保持する保持手段と、
前記監視先情報により示されるモジュールの不正動作を監視する監視手段と、
前記監視の結果をサーバ装置に送信する送信手段と、
前記サーバ装置から更新用の新監視先情報を取得した場合に、前記保持手段により保持される監視先情報を、当該新監視先情報に更新する更新手段とを備え、
前記サーバ装置は、
前記監視モジュール各々による前記監視の結果を収集する収集手段と、
前記収集した全監視結果に基づき、全モジュールのうち不正動作を行うモジュールを特定する特定手段と、
前記監視モジュールの各々が保持する監視先情報と同じ監視先情報を保持しており、全モジュールから前記特定されたモジュールを除いた残モジュールの各々が少なくとも1つの監視モジュールから監視されるよう監視先情報を再構成し、当該再構成により監視先情報に変更が生じる監視モジュールに対し当該変更後の新監視先情報を送信する送信手段
を備えることを特徴とする監視システム。 - 他モジュールを監視する複数の監視モジュールを備えるプログラム実行装置であって、
第1の監視モジュールは、
監視対象である1以上の監視モジュールを示す監視先情報を保持する保持手段と、
サーバ装置から更新用の新監視先情報を取得した場合に、前記保持手段により保持される監視先情報を当該新監視先情報に更新する更新手段とを備え、
第2の監視モジュールは、
前記第1の監視モジュールにより監視先情報の更新が行われた場合に、当該更新が正常に行われたか否かを確認する確認手段と、
前記確認の結果を前記サーバ装置に送信する送信手段と
を備えることを特徴とするプログラム実行装置。 - 前記確認手段は、予め前記第1の監視モジュールが保持する監視先情報から生成すべき要約値の期待値を保持しており、前記第1の監視モジュールの保持手段に保持された監視先情報から要約値を生成し、生成した要約値と、前記期待値とを比較することにより前記確認を行う
ことを特徴とする請求項2記載のプログラム実行装置。 - 前記第1の監視モジュールは、前記新監視先情報を取得した場合、更新前の監視先情報により示されるモジュールの監視を中止し、前記サーバ装置から前記確認結果の送信に基づく実行指示を受け取った場合に、前記新監視先情報により示されるモジュールを監視する
ことを特徴とする請求項3記載のプログラム実行装置。 - 前記第1の監視モジュールは、さらに、前記更新に先立ち監視先情報をバックアップし、前記実行指示を受け取った場合に前記バックアップを破棄する
ことを特徴とする請求項4記載のプログラム実行装置。 - 前記第1の監視モジュールは、前記実行指示を受け取らなかった場合に、前記バックアップを用いてロールバック処理を行う
ことを特徴とする請求項5記載のプログラム実行装置。 - 前記第2の監視モジュールは、さらに、
監視対象である1以上のモジュールを示す監視先情報を保持する保持手段と、
前記サーバ装置から更新用の新監視先情報を取得した場合に、前記第2の監視モジュールに係る保持手段により保持される監視先情報を、当該新監視先情報に更新する更新手段とを備え、
前記第1の監視モジュールは、さらに、
前記第2の監視モジュールに係る更新手段により監視先情報の更新が行われた場合に、当該更新が正常に行われたか否かを確認する確認手段と、
前記確認の結果を前記サーバ装置に送信する送信手段と
を備えることを特徴とする請求項2記載のプログラム実行装置。 - 前記新監視先情報は、各監視モジュールが、少なくとも1つの他の監視モジュールから監視されるよう構成されている
ことを特徴とする請求項7記載のプログラム実行装置。 - 前記更新手段は、1以上の監視モジュール各々についての更新用の監視先情報を含む統合監視先情報を取得し、前記統合監視先情報から自監視モジュールが保持すべき更新用の監視先情報を抽出して取得する
ことを特徴とする請求項2記載のプログラム実行装置。 - 他モジュールを監視する複数の監視モジュールを備える監視プログラムであって、
第1の監視モジュールは、
監視対象である1以上の監視モジュールを示す監視先情報を保持する保持ステップと、
サーバ装置から更新用の新監視先情報を取得した場合に、前記保持手段により保持される監視先情報を当該新監視先情報に更新する更新ステップとを備え、
第2の監視モジュールは、
前記第1の監視モジュールにより監視先情報の更新が行われた場合に、当該更新が正常に行われたか否かを確認する確認ステップと、
前記確認の結果を前記サーバ装置に送信する送信ステップと
を備えることを特徴とする監視プログラム。 - 監視プログラムを記憶するコンピュータ読取可能な記録媒体であって、
前記監視プログラムは、他モジュールを監視する複数の監視モジュールを備え、
第1の監視モジュールは、
監視対象である1以上の監視モジュールを示す監視先情報を保持する保持ステップと、
サーバ装置から更新用の新監視先情報を取得した場合に、前記保持手段により保持される監視先情報を当該新監視先情報に更新する更新ステップとを備え、
第2の監視モジュールは、
前記第1の監視モジュールにより監視先情報の更新が行われた場合に、当該更新が正常に行われたか否かを確認する確認ステップと、
前記確認の結果を前記サーバ装置に送信する送信ステップとを備える
ことを特徴とする記録媒体。 - 他モジュールを監視する複数の監視モジュールを備える集積回路であって、
第1の監視モジュールは、
監視対象である1以上の監視モジュールを示す監視先情報を保持する保持手段と、
サーバ装置から更新用の新監視先情報を取得した場合に、前記保持手段により保持される監視先情報を当該新監視先情報に更新する更新手段とを備え、
第2の監視モジュールは、
前記第1の監視モジュールにより監視先情報の更新が行われた場合に、当該更新が正常に行われたか否かを確認する確認手段と、
前記確認の結果を前記サーバ装置に送信する送信手段と
を備えることを特徴とする集積回路。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP09828811.1A EP2352109B1 (en) | 2008-11-26 | 2009-11-20 | Monitoring system, program-executing device, monitoring program, recording medium and integrated circuit |
CN200980146433.5A CN102224509B (zh) | 2008-11-26 | 2009-11-20 | 监视系统、程序执行装置、监视程序、记录介质及集成电路 |
JP2010540336A JP5390532B2 (ja) | 2008-11-26 | 2009-11-20 | 監視システム、プログラム実行装置、監視プログラム、記録媒体及び集積回路 |
US13/128,080 US8745735B2 (en) | 2008-11-26 | 2009-11-20 | Monitoring system, program-executing device, monitoring program, recording medium and integrated circuit |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2008-301308 | 2008-11-26 | ||
JP2008301308 | 2008-11-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010061561A1 true WO2010061561A1 (ja) | 2010-06-03 |
Family
ID=42225449
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2009/006260 WO2010061561A1 (ja) | 2008-11-26 | 2009-11-20 | 監視システム、プログラム実行装置、監視プログラム、記録媒体及び集積回路 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8745735B2 (ja) |
EP (1) | EP2352109B1 (ja) |
JP (1) | JP5390532B2 (ja) |
CN (1) | CN102224509B (ja) |
WO (1) | WO2010061561A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013537729A (ja) * | 2010-06-10 | 2013-10-03 | アルカテル−ルーセント | 単一の登録手順を使用するクライアントのグループの安全な登録 |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101888311B (zh) * | 2009-05-11 | 2013-02-06 | 北京神州绿盟信息安全科技股份有限公司 | 一种防止网络内容被篡改的设备、方法和系统 |
US20110225649A1 (en) * | 2010-03-11 | 2011-09-15 | International Business Machines Corporation | Protecting Computer Systems From Malicious Software |
EP2856332A4 (en) * | 2012-05-30 | 2016-02-24 | Hewlett Packard Development Co | ADJUSTING PARAMETERS FOR DISCOVERING PATTERNS |
EP2979211B1 (en) * | 2013-03-27 | 2020-09-09 | Irdeto B.V. | Protecting software application |
CN104679530B (zh) * | 2013-11-26 | 2017-12-29 | 英业达科技有限公司 | 服务器系统与固件更新方法 |
US9383989B1 (en) | 2014-06-16 | 2016-07-05 | Symantec Corporation | Systems and methods for updating applications |
JP6264331B2 (ja) * | 2015-06-18 | 2018-01-24 | 京セラドキュメントソリューションズ株式会社 | 管理システム、管理装置および画像形成装置 |
JP6900727B2 (ja) * | 2017-03-28 | 2021-07-07 | 横河電機株式会社 | エンジニアリング支援システム、エンジニアリング支援方法、クライアント装置、及びクライアントプログラム |
JP6973450B2 (ja) * | 2018-08-10 | 2021-12-01 | 株式会社デンソー | 車両用マスタ装置、インストールの指示判定方法及びインストールの指示判定プログラム |
JP7378980B2 (ja) * | 2019-06-27 | 2023-11-14 | キヤノン株式会社 | 情報処理装置、情報処理方法およびプログラム |
US11861009B2 (en) * | 2020-12-23 | 2024-01-02 | Intel Corporation | Mechanism to update attested firmware on a platform |
US20240118880A1 (en) * | 2022-10-11 | 2024-04-11 | Ford Global Technologies, Llc | Transmission of authentication keys |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000293370A (ja) * | 1999-04-09 | 2000-10-20 | Konami Co Ltd | コンピュータシステム、コンピュータプログラムの実行方法及びコンピュータプログラム記録媒体 |
JP2008123262A (ja) * | 2006-11-13 | 2008-05-29 | Hitachi Software Eng Co Ltd | 情報処理装置、及びシステム監視方法、並びにシステム監視方法をコンピュータに実行させるためのプログラム |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2837446B2 (ja) | 1989-07-21 | 1998-12-16 | カヤバ工業株式会社 | 二段作動ステーダンパ |
SE504827C2 (sv) * | 1995-09-05 | 1997-05-12 | Daniel Danielsson | Sätt för övervakning av ett datorsystem |
DE19740136A1 (de) | 1997-09-12 | 1999-03-18 | Alsthom Cge Alcatel | Verfahren zur Isolation eines defekten Rechners in einem fehlertoleranten Mehrrechnersystem |
JP3748708B2 (ja) | 1998-03-17 | 2006-02-22 | 富士通株式会社 | クライアント/サーバシステム、クライアントコンピュータ及び記録媒体 |
US6510992B2 (en) | 2000-02-02 | 2003-01-28 | Thomas R. Wells | In-line verification, reporting and tracking apparatus and method for mail pieces |
WO2002103960A2 (en) * | 2001-06-14 | 2002-12-27 | Okena, Inc. | Stateful distributed event processing and adaptive security |
US7974234B2 (en) | 2004-10-22 | 2011-07-05 | Alcatel Lucent | Method of authenticating a mobile network node in establishing a peer-to-peer secure context between a pair of communicating mobile network nodes |
US7966485B2 (en) | 2004-12-01 | 2011-06-21 | Igt | Universal operating system to hardware platform interface for gaming machines |
EP1899886A2 (en) | 2005-06-29 | 2008-03-19 | Nxp B.V. | Security system and method for securing the integrity of at least one arrangement comprising multiple devices |
US8291093B2 (en) | 2005-12-08 | 2012-10-16 | Microsoft Corporation | Peer-to-peer remediation |
WO2008099682A1 (ja) | 2007-02-16 | 2008-08-21 | Panasonic Corporation | 分散情報配布装置、保持装置、認証局装置及びシステム |
US8230415B1 (en) | 2007-03-13 | 2012-07-24 | Juniper Networks, Inc. | On-demand advertising of software packages |
US8316445B2 (en) | 2008-04-23 | 2012-11-20 | Trusted Knight Corporation | System and method for protecting against malware utilizing key loggers |
US8381298B2 (en) * | 2008-06-30 | 2013-02-19 | Microsoft Corporation | Malware detention for suspected malware |
-
2009
- 2009-11-20 CN CN200980146433.5A patent/CN102224509B/zh active Active
- 2009-11-20 JP JP2010540336A patent/JP5390532B2/ja active Active
- 2009-11-20 EP EP09828811.1A patent/EP2352109B1/en active Active
- 2009-11-20 WO PCT/JP2009/006260 patent/WO2010061561A1/ja active Application Filing
- 2009-11-20 US US13/128,080 patent/US8745735B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000293370A (ja) * | 1999-04-09 | 2000-10-20 | Konami Co Ltd | コンピュータシステム、コンピュータプログラムの実行方法及びコンピュータプログラム記録媒体 |
JP2008123262A (ja) * | 2006-11-13 | 2008-05-29 | Hitachi Software Eng Co Ltd | 情報処理装置、及びシステム監視方法、並びにシステム監視方法をコンピュータに実行させるためのプログラム |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013537729A (ja) * | 2010-06-10 | 2013-10-03 | アルカテル−ルーセント | 単一の登録手順を使用するクライアントのグループの安全な登録 |
US9450928B2 (en) | 2010-06-10 | 2016-09-20 | Gemalto Sa | Secure registration of group of clients using single registration procedure |
Also Published As
Publication number | Publication date |
---|---|
US20110225653A1 (en) | 2011-09-15 |
US8745735B2 (en) | 2014-06-03 |
CN102224509B (zh) | 2014-07-30 |
JPWO2010061561A1 (ja) | 2012-04-26 |
CN102224509A (zh) | 2011-10-19 |
EP2352109B1 (en) | 2018-06-20 |
EP2352109A4 (en) | 2014-01-01 |
JP5390532B2 (ja) | 2014-01-15 |
EP2352109A1 (en) | 2011-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5390532B2 (ja) | 監視システム、プログラム実行装置、監視プログラム、記録媒体及び集積回路 | |
JP5405986B2 (ja) | ソフトウェア更新システム、管理装置、記録媒体及び集積回路 | |
JP5453324B2 (ja) | 不正モジュール特定装置、情報処理装置、不正モジュール特定方法、不正モジュール特定プログラム、集積回路、不正モジュール無効化システム、および不正モジュール無効化方法 | |
JP5681028B2 (ja) | 改ざん監視システム、管理装置及び管理方法 | |
JP5453323B2 (ja) | 改竄監視システム、管理装置及び改竄管理方法 | |
JP5744855B2 (ja) | 改ざん監視システム、管理装置及び改ざん管理方法 | |
US9594909B2 (en) | Software updating apparatus, software updating system, invalidation method, and invalidation program | |
US8464347B2 (en) | Software updating apparatus, software updating system, alteration verification method and alteration verification program | |
US8683214B2 (en) | Method and device that verifies application program modules | |
US8769312B2 (en) | Tampering monitoring system, protection control module, and detection module | |
KR20150128328A (ko) | 증거 수집 도구 제공 방법, 도메인 분리 기반 모바일 기기에서 증거 자료 확보 장치 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980146433.5 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09828811 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13128080 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2010540336 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009828811 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |