WO2010116643A1 - 通信制御装置及び監視装置 - Google Patents
通信制御装置及び監視装置 Download PDFInfo
- Publication number
- WO2010116643A1 WO2010116643A1 PCT/JP2010/002122 JP2010002122W WO2010116643A1 WO 2010116643 A1 WO2010116643 A1 WO 2010116643A1 JP 2010002122 W JP2010002122 W JP 2010002122W WO 2010116643 A1 WO2010116643 A1 WO 2010116643A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- address
- monitoring
- vpn
- packet
- virtual
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2592—Translation of Internet protocol [IP] addresses using tunnelling or encapsulation
Definitions
- the present invention relates to a communication control apparatus that performs VPN communication.
- the communication control device is provided in, for example, a monitoring device provided as a monitoring target of the monitoring system, and transmits monitoring information to a remote monitoring center by VPN.
- a monitoring terminal installed in the monitoring target communicates with the monitoring center.
- the monitoring terminal transmits a monitoring video, a security-related signal detected by the sensor, and the like to the monitoring center.
- the monitoring information packet is encapsulated. Then, the encapsulated packet is communicated between the monitoring center and the monitoring terminal through the VPN tunnel.
- virtual IP addresses hereinafter referred to as virtual IP addresses
- a local network (LAN) of a user is provided for a monitoring target such as a store or a factory (the user here is a user for the monitoring system, for example, the monitoring target is a store) In some cases, the user is the store owner, etc.).
- a monitoring terminal to the LAN to be monitored and connect to the Internet via the LAN to perform VPN communication with the monitoring center.
- the packet is encapsulated by referring to the network part of the destination address of the packet. That is, if the network part of the destination address corresponds to the network part of the VPN virtual IP address, the packet is encapsulated. Therefore, if the network portion overlaps between the local IP address of the LAN to be monitored and the virtual IP address of the VPN, communication becomes impossible.
- the virtual IP address is generally assigned so as not to overlap with the local IP address of the monitored LAN.
- the LAN to be monitored is managed by the user and is independent of the monitoring center. Therefore, even if avoiding duplication on the VPN side when assigning a virtual IP address, the network environment to be monitored is subsequently rebuilt for the convenience of the user, the local IP address is changed, and as a result, There is a possibility that the local IP address overlaps with the virtual IP address of the VPN of the monitoring system. In such a case, VPN communication cannot be performed and there is a possibility that the monitoring work may be hindered.
- the monitoring system also plays a role of security etc., and the level of demand for the safety and stability of the system is high. For this reason, it is desirable to prevent communication from being disabled as much as possible even if addresses overlap due to circumstances on the monitored network side as described above.
- An object of the present invention is to provide a technique capable of preventing communication from being disabled due to address duplication in a configuration in which a VPN communication control apparatus is connected to a local network.
- the communication control device includes a packet processing unit that converts an input packet into a transmission packet, a storage unit that stores a virtual IP address of the communication control device in the VPN, a source address in the transmission packet, and a virtual stored in the storage unit
- the determination unit that compares the IP address and determines whether both the network part and the host part of the source address match both the network part and the host part of the virtual IP address, and the determination result by the determination unit is And an encapsulating unit that encapsulates the packet when they match.
- the monitoring device is connected to a local network to be monitored, and transmits monitoring information acquired by the monitoring target to a remote monitoring center via the wide area network from the local network.
- the monitoring device includes a monitoring control unit that generates monitoring information to be transmitted to the monitoring center, and a communication control unit that performs VPN communication with the monitoring center.
- a packet processing unit that converts an input packet including monitoring information from the control unit into a transmission packet to be transmitted to the monitoring center, a storage unit that stores a virtual IP address of the monitoring device in the VPN, and a source address in the transmission packet;
- the virtual IP addresses stored in the storage unit are compared, and both the network part and the host part of the source address
- FIG. 1 is a diagram showing an overall configuration of a monitoring system according to the present embodiment.
- FIG. 2 is a block diagram showing the configuration of the monitoring system more specifically.
- FIG. 3 is a diagram illustrating a situation in which the address of the monitoring target LAN is changed in the monitoring system.
- FIG. 4 is a diagram illustrating the local IP address of the monitoring target LAN and the virtual IP address of the VPN in the monitoring system.
- FIG. 5 is a diagram showing a configuration of an IP line unit corresponding to the communication control apparatus of the present invention.
- FIG. 6 is a flowchart showing the operation of the IP line unit.
- FIG. 7 is a diagram illustrating an example of the operation of the IP line unit.
- a communication control apparatus of the present invention is a communication control apparatus that is connected to a local network and is connected to a wide area network via the local network and performs VPN communication, and a packet processing unit that converts an input packet into a transmission packet;
- the storage unit that stores the virtual IP address of the communication control device in the VPN, the transmission source address in the transmission packet, and the virtual IP address stored in the storage unit are compared, and both the network part and the host part of the transmission source address Includes a determination unit that determines whether or not both the network part and the host part of the virtual IP address match, and an encapsulation unit that encapsulates the transmission packet when the determination result by the determination unit matches .
- the source address in the transmission packet is compared with the virtual IP address, and both the network part and the host part of the source address are compared with the network part and the host part of the virtual IP address. It is determined whether or not both match, and if the determination result matches, the transmission packet is encapsulated. Accordingly, even if the network part of the destination address of the transmission packet transmitted to the VPN overlaps with the network part of the local IP address due to the change of the address of the local network, VPN communication is possible. In this way, it is possible to prevent communication from being disabled due to duplication of addresses in the configuration in which the VPN communication control device is connected to the local network.
- the storage unit may further store a virtual IP address of a target device connected by VPN, and the determination unit is further stored in the storage unit and a destination address included in the transmission packet.
- the virtual IP addresses of the target devices may be compared to determine whether both the network portion and the host portion of the destination address match both the network portion and the host portion of the virtual IP address of the target device.
- the destination address and the virtual IP address of the target device are also compared.
- both the network portion and the host portion are to be compared. If the comparison results match, the transmission packet is encapsulated. Therefore, in the configuration in which the VPN communication control device is connected to the local network, it is possible to more reliably avoid communication failure due to address duplication.
- the communication control device of the present invention may be connected to the information processing device through a dedicated communication path different from the local network, and the packet processing unit uses the dedicated communication packet for the dedicated communication channel as an input packet from the information processing device.
- the transmission packet to be sent to the VPN may be extracted from the data area of the dedicated communication packet.
- the communication control apparatus is connected to the information processing apparatus via a dedicated communication path different from the local network, and the dedicated communication packet is input as an input packet from the information processing apparatus.
- VPN communication can be suitably performed, and it is possible to prevent communication from being disabled due to address duplication.
- a monitoring device including the communication control device and the information processing device is provided as a monitoring target.
- the information processing apparatus functions as a monitoring control apparatus to generate monitoring information, and the communication control apparatus transmits the monitoring information to a remote monitoring center via VPN.
- the dedicated communication path is a communication path in the monitoring apparatus, and this may be a local network in a monitoring apparatus different from the local network to be monitored.
- the communication control apparatus of the present invention may further include a reissue request unit, which is configured so that both the network part and the client address part of the local IP address of the communication control apparatus in the local network communicate with each other in the VPN.
- a reissue request unit which is configured so that both the network part and the client address part of the local IP address of the communication control apparatus in the local network communicate with each other in the VPN.
- both the network part and client address part of the local IP address of the communication control device coincide with both the network part and client address part of the virtual IP address of the communication control device in the VPN and the VPN is disconnected. Even in such a case, VPN communication can be performed by reissuing the virtual IP address. Therefore, it is possible to avoid communication failure due to address duplication.
- another aspect of the present invention is a monitoring apparatus that is connected to a local network to be monitored and transmits monitoring information acquired by the monitoring target to a remote monitoring center from the local network via a wide area network.
- the monitoring apparatus includes a monitoring control unit that generates monitoring information to be transmitted to the monitoring center, and a communication control unit that performs VPN communication with the monitoring center.
- the communication control unit receives monitoring information from the monitoring control unit.
- a packet processing unit that converts the input packet including the packet to be transmitted to the monitoring center, a storage unit that stores the virtual IP address of the monitoring device in the VPN, a source address in the transmission packet, and a storage unit
- the determination unit that compares the virtual IP address and determines whether both the network part and the host part of the source address match both the network part and the host part of the virtual IP address, and the determination result by the determination unit is
- An encapsulating unit that encapsulates a transmission packet when they match. Also in this aspect, the various configurations of the present invention described above may be provided.
- the present invention is applied to a monitoring system, and more specifically, to a monitoring device connected to a monitoring center. Monitoring information is transmitted from the monitoring device to the monitoring center. At this time, the source address in the monitoring information transmission packet is compared with the virtual IP address, and both the network part and the host part of the source address match both the network part and the host part of the virtual IP address. If it is determined that the determination results match, the transmission packet is encapsulated. Since such a determination is performed, it is possible to prevent communication from being disabled because the monitored local IP address and the VPN virtual IP address of the monitoring apparatus overlap.
- the monitoring system also plays a role of security and the like, and the level of demand for the safety and stability of the system is high, and the present invention can suitably meet such needs.
- the present invention is not limited to the communication control device and the monitoring device described above.
- the present invention may be expressed in the form of other apparatuses or systems, and the present invention may be realized in the form of a method, a program, or a computer-readable recording medium on which the program is recorded.
- the present invention is applied to a monitoring system.
- the monitoring target and the monitoring center communicate monitoring information.
- the communication control device of the present embodiment is provided in the monitoring device on the monitoring target side. First, the configuration of the monitoring system will be described.
- FIG. 1 shows the overall configuration of the monitoring system of the present invention.
- the monitoring system 1 communication is performed among the monitoring center 3, the monitoring target 5, and the user base 7.
- the user means a user of the monitoring service of the monitoring target 5 by the monitoring system 1.
- the monitoring target 5 is a store
- the user base 7 is an office of the store owner.
- the monitoring center 3 is provided with a communication management device 11 and a plurality of center devices 13, which are connected so as to be communicable.
- the communication management device 11 and the plurality of center devices 13 may be arranged at geographically distant locations.
- the plurality of center devices 13 may be respectively arranged in a plurality of assigned areas. Further, the plurality of center devices 13 may share functions. For example, one center device 13 may function as a control center device that processes a security-related signal, and another center device 13 may function as an image center device that mainly processes monitoring video.
- One center device 13 may be used within the scope of the present invention.
- a monitoring device 15 and a user device 17 are provided in the monitoring target 5 and the user base 7, respectively.
- the monitoring device 15 and the user device 17 correspond to terminals in the monitoring system 1.
- the monitoring device 15 sends monitoring information to the center device 13 and the user device 17.
- the monitoring information is, for example, an image of a monitoring camera and a monitoring signal detected by the monitoring target 5.
- the monitoring signal is, for example, a guard signal indicating that an abnormality has occurred, and the guard signal is generated based on a detection signal from a sensor installed in the monitoring target 5 or generated when an alarm button (switch) is operated. Is done.
- the user device 17 sends a control signal and an audio signal to the monitoring device 15. Such a signal from the user device 17 to the monitoring device 15 is also included in the monitoring information.
- FIG. 1 shows one monitoring target 5 and one user base 7.
- the monitoring center 3 communicates with a plurality of monitoring targets 5 and a plurality of user bases 7.
- the communication management device 11 also communicates with the plurality of monitoring devices 15 and the plurality of user devices 17.
- Each monitoring device 15 communicates with an associated user device 17 (store owner's terminal).
- the monitoring device 15 detects an abnormality by a sensor signal or the like.
- a guard signal is transmitted as monitoring information to the monitoring center 3 together with the video of the monitoring target 5.
- the operator confirms the security signal and video on the monitor of the center device 13, and gives necessary instructions to the security guard.
- the guard who received the instruction rushes to the monitoring object 5 and deals with the abnormality.
- the monitoring device 15 sends the video of the monitoring target 5 to the user device 17 periodically or according to other settings. For example, when a visitor is detected by the sensor, an image or the like is sent to the user device 17. In addition, transmission of video or the like may be requested from the user device 17.
- the owner can grasp the state of the store from the video or the like. Further, the owner can send a voice or the like from the user device 17 to the monitoring device 15 to instruct the store clerk about necessary items.
- the communication management device 11, the monitoring device 15, and the user device 17 are connected to the Internet.
- the communication management device 11 is connected to the monitoring device 15 and the user device 17 by a center terminal VPN (virtual private network) 21 on the Internet.
- VPN virtual private network
- the communication management device 11 is provided with a VPN server function, and the monitoring device 15 and the user device 17 are provided with a VPN client function.
- VPN a VPN tunnel is constructed, encrypted communication is performed, and high security is realized.
- the monitoring device 15 and the user device 17 perform SIP communication 23 via the communication management device 11.
- the SIP communication 23 is performed via the center terminal VPN 21 described above.
- the communication management device 11 has a SIP server function.
- the monitoring device 15 and the user device 17 are directly connected by the inter-terminal VPN 25 without going through the communication management device 11.
- the user device 17 is provided with a VPN server function
- the monitoring device 15 is provided with a VPN client function.
- the VPN 21 between the center terminals is always connected with a VPN tunnel constructed, and is used for communication between the center device 13, the monitoring device 15, and the user device 17.
- the inter-terminal VPN 25 is constructed only when necessary.
- the reason for using the inter-terminal VPN 25 will be described.
- the monitoring system 1 a large amount of data such as video is communicated.
- the center terminal VPN 21 is used for all communications, the load of the communication management apparatus 11 becomes enormous. Therefore, communication between the monitoring device 15 and the user device 17 is performed by the inter-terminal VPN 25, thereby reducing the load on the communication management device 11 while ensuring security.
- the role of the SIP communication 23 in the present embodiment is a special one different from a normal IP phone or the like. That is, the present embodiment positions SIP signaling as a preparation process before VPN connection. More specifically, when establishing a session of the SIP communication 23, signaling is performed. Two-way communication is performed by this signaling, and an INVITE (invite) message and an OK message are exchanged. On the other hand, in order to establish a VPN connection, it is necessary to exchange information. In this embodiment, the IP address and the electronic certificate are exchanged.
- the signaling of the SIP communication 23 is used as an information exchange means for establishing a VPN connection. That is, an INVITE message with an IP address and an electronic certificate added is transmitted from the SIP connection source to the connection destination. In response to the INVITE message, an OK message to which an IP address and an electronic certificate are added is returned from the SIP connection destination to the connection source, thereby establishing information exchange.
- the overall configuration of the monitoring system 1 has been described above.
- two types of VPN are used.
- One connects the communication management device 11 and the terminal (the monitoring device 15 or the user device 17), and the other connects the terminals (the monitoring device 15 and the user device 17). Therefore, in FIG. 1, in order to distinguish these two VPNs, terms such as the center terminal VPN 21 and the terminal VPN 25 are used.
- terms such as VPN21 and VPN25 may be used.
- the communication management apparatus 11 includes a firewall 31, an HTTP server 33, a VPN server 35, a SIP server 37, a STUN server 39, an account management server 41, a database 43, and a log server 45.
- the firewall 31 is a device that blocks data other than communication data used between the communication management device 11, the monitoring device 15, and the user device 17.
- the HTTP server 33 is configured for Internet connection.
- the VPN server 35 is a server that performs authentication and encryption for VPN tunnel construction.
- the VPN server 35 is configured to realize the center terminal VPN 21, constructs a VPN between the communication management device 11 and the monitoring device 15, and constructs a VPN between the communication management device 11 and the user device 17. .
- a signal from the monitoring device 15 is decrypted by the VPN server 35 and transmitted to the center device 13.
- a signal from the center device 13 is encrypted by the VPN server 35 and transmitted to the monitoring device 15.
- encryption is performed by the VPN server 35.
- the VPN server 35 similarly performs encryption and decryption.
- the SIP server 37 performs signaling processing according to the SIP protocol, and connects the monitoring device 15 and the user device 17.
- the SIP server 37 performs a SIP connection control function when the user device 17 requests connection to the monitoring device 15 or when the monitoring device 15 requests connection to the user device 17.
- the STUN server 39 provides a STUN function in order to correspond to the NAT function of the routers of the monitoring device 15 and the user device 17.
- the account management server 41 is a server that manages various types of information such as authentication.
- Information to be managed is stored in the database 43.
- Information to be managed includes an IP line account, a digital certificate for VPN connection (tunnel construction), and key pair information. Further, in the process of SIP signaling, authentication and authorization are performed for connections between terminals. Information for this processing is also stored in the database 43 and used by the account management server 41.
- the log server 45 is a server for storing a log generated by the monitoring device 15.
- the center device 13 includes a monitoring console 51 and a line connection device 53.
- a monitoring console 51 is connected to the communication management device 11 via the line connection device 53.
- the monitoring video is supplied to the monitoring console 51 and managed by the monitoring console 51.
- the center device 13 is a control center
- security-related information is supplied to the monitoring console 51.
- the monitoring video is also suitably displayed on the control center monitor.
- the monitoring video or the like may be communicated between the center devices.
- the monitoring device 15 is connected to the monitoring target LAN 61.
- the monitored LAN 61 is a local network (LAN) of the monitored object 5 and includes a router 63 for a broadband line, and the router 63 is connected to the Internet as a wide area network (WAN) as a gateway.
- the monitoring device 15 is connected to the router 63.
- a monitoring target PC (personal computer) 65 is also connected to the router 63.
- the monitoring target PC 65 is a PC installed on the monitoring target 5.
- the monitoring target 5 may be a store and the monitoring target PC 65 may be a store PC. Still other devices may be connected to the monitored LAN 61.
- the monitoring device 15 includes a controller 71, an IP line unit 73, a peripheral device 75, and a multi-line adapter 77.
- the controller 71 is configured by a computer and realizes a monitoring function in cooperation with the peripheral device 75.
- the controller 71 is connected to the monitoring center 3 via the IP line unit 73.
- the controller 71 is also connected to the user device 17 via the IP line unit 73.
- a monitoring camera 81, a sensor 83, and an alarm button 85 are illustrated as the peripheral devices 75.
- the controller 71 performs an image recognition process on the monitoring video to detect an abnormality. Further, the controller 71 detects an abnormality based on the detection signal input from the sensor 83. An abnormality is also detected when the alarm button 85 is pressed. Other peripheral devices may be used for abnormality detection. When an abnormality occurs, the controller 71 communicates with the center device 13 and transmits a security signal and an image signal. A microphone is provided together with the monitoring camera 81, and an audio signal is also transmitted. In this way, the controller 71 implements the security function of the monitoring target 5.
- the monitoring video and audio are transmitted when requested by the center device 13. Furthermore, the monitoring video and audio are also sent to the user device 17. Transmission to the user device 17 is performed, for example, periodically, or according to other settings. For example, when a visitor is detected by the sensor 83, an image or the like is sent to the user device 17. Also, when requested by the user device 17, the monitoring device 15 transmits a video or the like.
- the IP line unit 73 constructs a VPN tunnel for the controller 71 to communicate with the communication management apparatus 11. In addition, a VPN tunnel is established for the controller 71 to communicate with the user device 17.
- the former corresponds to the inter-terminal VPN 21, and the latter corresponds to the inter-terminal VPN 25. In these connections, the IP line unit 73 realizes a VPN client function.
- the IP line unit 73 is shown as an internal configuration of the controller 71. This represents a physical arrangement. As a communication configuration, the IP line unit 73 is disposed between the controller 71 and the router 63.
- the multi-line adapter 77 is connected to the center device 13 via a mobile phone network.
- the multi-line adapter 77 is used for transmitting a security signal when the broadband line is disconnected.
- a security signal is transmitted from the controller 71 to the multi-line adapter 77 via the IP line unit 73 and transmitted from the multi-line adapter 77 to the center device 13.
- the user device 17 includes a VPN terminal device (hereinafter referred to as VTE) 91 and a user PC (personal computer) 93.
- VTE VPN terminal device
- user PC 93 is connected to VTE 91
- VTE 91 is connected to router 95
- router 95 is connected to the Internet.
- the router 95 is a router for a broadband line, and is a LAN gateway at the user base 7.
- VTE 91 is a line termination device for broadband connection. Then, the VTE 91 constructs a VPN tunnel with the VPN server 35 of the communication management apparatus 11 and constructs a VPN tunnel with the IP line unit 73 of the monitoring apparatus 15. In the former, the VTE 91 functions as a VPN client, and in the latter, the VTE 91 functions as a VPN server.
- the VTE 91 transfers the video, audio and control signal received from the controller 71 of the monitoring device 15 to the user PC 93. Further, the VTE 91 transfers the voice and control signal received from the user PC 93 to the controller 71.
- the user base 7 is a store owner's office or the like. Therefore, the user PC 93 may be a store owner's PC.
- the user PC 93 is used by the owner to view the monitoring video of the monitoring target 5.
- the user PC 93 is installed with application software capable of displaying and switching the monitoring video of the monitoring target 5 by communicating with the controller 71.
- the user device 17 is fixed.
- the function of the user device 17 may be incorporated in a mobile terminal or the like and movable.
- the IP line unit 73 of the monitoring device 15 corresponds to the communication control device of the present invention.
- the IP line unit 73 is connected to the monitoring target LAN 61 and is connected to the Internet via the monitoring target LAN 61 to perform VPN communication.
- the virtual IP address for VPN is set so as not to overlap with the local IP address of the monitored LAN 61.
- the present embodiment is effective in such a case, and can prevent the VPN communication from being disabled. This will be described in detail below.
- FIG. 3 corresponds to a part of the monitoring system 1.
- the monitoring target LAN 61 includes a router 63 as a gateway to the Internet.
- the router 63 is connected to the monitoring target PC 65 and is connected to the IP line unit 73 (the communication control device of the present invention) of the monitoring device 15.
- a controller 71 is connected to the IP line unit 73.
- the IP line unit 73 is shown as the internal configuration of the controller 71 in order to express the physical arrangement.
- the IP line unit 73 and the controller 71 are in communication with each other.
- the IP line unit 73 of the monitoring device 15 is connected to the communication management device 11 of the monitoring center 3 via the router 63 and the Internet. Then, a VPN is constructed between the IP line unit 73 and the communication management device 11.
- IP addresses are assigned to the IP line unit 73 and the monitored PC 65.
- VPN virtual IP addresses are assigned to the IP line unit 73 and the monitoring center 3 (communication management apparatus 11).
- the local IP address has been changed. Such a change may occur, for example, when the monitoring target LAN 61 is reconfigured for the convenience of the user.
- the address change as shown in FIG. 3 is performed, the following problem occurs.
- IP line unit 192.168.0.3 Monitored PC: 192.168.0.1
- virtual IP address is as follows.
- the IP line unit 73 needs to determine that the packet is a VPN encapsulation target as a VPN process.
- the network part of the destination address of the packet is referred to for such a determination. If the network part of the destination address is the network part (10.180) of the virtual IP address, the packet is encapsulated and sent out to the VPN tunnel.
- the destination of the packet is the VPN monitoring center 3 (communication management device 11)
- the destination address is “10.800.1” and includes the network part of the virtual IP address.
- the packet is encapsulated and sent out to the VPN tunnel.
- the local IP address and virtual IP address In order to perform the above VPN processing normally, the local IP address and virtual IP address must not have overlapping network parts. If the network part overlaps, VPN communication becomes impossible. Therefore, when connecting a VPN-compatible device to the LAN, a virtual IP address is set so that the local IP address and the network portion do not overlap. In the example of FIG. 4, the network portion of the local IP address is “192.168.”. Therefore, the network part of the virtual IP address is set to “10.180”.
- the local IP address is changed, and as a result, the local IP address and the virtual IP address are as follows.
- Local IP address IP line unit 10.180.0.5 Monitored PC: 10.180.0.2
- Virtual IP address IP line unit 10.180.0.3
- Monitoring center 10.180.1
- the network part of the local IP address matches the network part of the virtual IP address. For this reason, the IP line unit 73 cannot perform VPN communication.
- the monitoring target LAN 61 belongs to the monitoring target 5 and is owned by the user. For this reason, it is conceivable that the local IP address is changed without considering the VPN with the monitoring center 3, and as a result, an address duplication phenomenon occurs.
- the IP line unit 73 is configured as follows in order to prevent the above problems.
- FIG. 5 shows the configuration of the IP line unit 73 together with the controller 71 and the router 63.
- the IP line unit 73 corresponds to the communication control device of the present invention, and also corresponds to the communication control unit of the present invention.
- the controller 71 corresponds to the information processing apparatus and the monitoring control unit of the present invention.
- the IP line unit 73 and the controller 71 are connected by a LAN (Ethernet, registered trademark).
- This LAN is a separate LAN from the monitored LAN 61.
- the LAN between the controller 71 and the IP line unit 73 is referred to as an intra-monitoring device LAN 201.
- the intra-monitoring device LAN 201 can also be referred to as an intra-controller LAN.
- the IP line unit 73 includes a packet processing unit 101, a storage unit 103, a determination unit 105, an encapsulation unit 107, and a reissue processing unit 109.
- the packet processing unit 101 receives a packet from the controller 71 and converts the input packet (input packet) into a monitoring information packet (transmission packet) to be sent to the monitoring center 3 by VPN. Here, as will be described later, a process of extracting a transmission packet from the data area of the input packet is performed.
- the packet processing unit 101 may also input a packet for the monitoring target LAN 61 and a packet for a WAN other than the VPN. These packets are composed of a header area and a data area, and a source IP address and a destination IP address are stored in the header area.
- the storage unit 103 stores various types of information processed by the IP line unit 73. In relation to the present embodiment, the storage unit 103 stores the local IP address and virtual IP address of the IP line unit 73.
- the determination unit 105 compares the transmission source address in the transmission packet obtained by converting the packet input by the packet processing unit 101 with the virtual IP address stored in the storage unit 103. Then, the determination unit 105 determines whether both the network part and the host part of the source address match with both the network part and the host part of the virtual IP address.
- the determination unit 105 supplies the packet to the encapsulation unit 107 if the determination results match. If the determination results do not match, the determination unit 105 sends the packet to the router 63 as it is.
- the encapsulation unit 107 is configured to encapsulate a packet for transmission to the VPN tunnel.
- the packet is supplied from 105 to the encapsulation unit 107 and encapsulated by the encapsulation unit 107 only when the determination result of the determination unit 105 is the same.
- the packet is encrypted. Then, the global IP address of the VPN connection partner is added (encapsulated). In the example of the present embodiment, the global IP address of the communication management device 11 is given. The capsule created in this way is sent to the router 63.
- the reissue processing unit 109 is configured to request the VPN server 35 of the communication management apparatus 11 to reissue the virtual IP address.
- the reissue processing unit 109 will be described in detail later.
- IP line unit 73 The configuration of the IP line unit 73 that is characteristic in the present embodiment has been described above with reference to FIG.
- FIG. 6 is a flowchart showing processing of each packet.
- the packet input by the packet processing unit 101 is converted into a transmission packet (S1).
- the determination unit 105 acquires a transmission source address in the packet (S3).
- the determination unit 105 determines whether both the network part and the host part of the transmission source address match both the network part and the host part of the virtual IP address of the IP line unit 73 (S5). If the determination result in step S5 is No, the packet is transmitted as it is to the router 63 (S9). If the determination result in step S5 is Yes, the packet is encapsulated by the encapsulation unit 107 (S7), and the encapsulated packet is transmitted to the router 63 (S9).
- FIG. 7 shows the above processing more specifically.
- an input packet 121 from the controller 71 is shown.
- the controller 71 and the IP line unit 73 are connected by the LAN 201 within the monitoring apparatus.
- the input packet 121 is a LAN packet of the in-monitoring device LAN 201.
- the input packet 121 has a header area 123 and a data area 125.
- the addresses of the controller 71 and the IP line unit 73 set in the monitoring apparatus LAN 201 are attached to the header area 123 as a transmission source and a destination (these addresses are addresses described below). (Omitted from the figure to avoid confusion).
- the data area 125 includes data of a packet to be processed by the IP line unit 73, that is, a packet to be sent to the router 63.
- the controller 71 generates a packet to be processed by the IP line unit 73, adds information that the transmission source is the controller 71 and the destination is the IP line unit 73 to the header area 123 of this packet, and the IP line unit 73 73.
- the packet processing unit 101 extracts (extracts) the packet 131 in the data area of the input packet 121.
- the packet 131 includes a source address 133 and a destination address 135 in the header area 132. These are the addresses of communication ahead from the IP line unit 73, unlike the addresses of the LAN 201 in the monitoring apparatus.
- the data area 137 includes monitoring information to be transmitted to the monitoring center 3.
- the data area of the input packet 121 includes the packet 131 transmitted to the router 63.
- the packet processing unit 101 rewrites the information in the header area of the input packet 121. May be. That is, in the packet processing unit 101, if the transmission source attached to the header area 123 of the input packet 121 is the controller 71, the transmission area in the header area is the virtual IP address of the IP line unit 73 and the destination is the monitoring center 3. The packet 131 may be rewritten to the virtual IP address and transmitted to the router 63.
- the determination unit 105 compares the source address 133 included in the header area in the packet 131 with the virtual IP address of the IP line unit 73 stored in the storage unit 103. As shown in the figure, the comparison target is the network part and the host part in the address, that is, all the digits of the address.
- the determination unit 105 determines whether the network part and host part of the source address match the network part and host part of the virtual IP address. If they do not match, the packet is sent to the router 63 as it is. If they match, the packet is sent to the encapsulation unit 107.
- FIG. 7 shows three types of packets addressed to WAN, LAN, and VPN.
- the upper row shows the source address and the lower row shows the destination address.
- the local IP address of the IP line unit 73 is the same as that after the change in FIGS. 3 and 4 (10.180.0.5).
- the virtual IP address is also the same as in the example of FIGS. 3 and 4 (10.180.0.3). Therefore, in the conventional process, since the network address of the local network and the VPN is the same, communication is impossible. However, in this embodiment, communication is possible as follows.
- the source address is the local IP address of the IP line unit 73, and the destination address is the global IP address.
- the source address does not match the virtual IP address. Therefore, the packet is sent to the router 63.
- the source address is the local IP address of the IP line unit 73
- the destination address is the local IP address for the monitored LAN 61. Also in this case, the source address does not match the virtual IP address. Therefore, the packet is sent to the router 63.
- the source address is the virtual IP address of the IP line unit 73
- the destination address is the virtual IP address of the monitoring center 3 (communication management device 11).
- the transmission source address matches the virtual IP address of the packet processing unit 101. Therefore, the packet is sent to the encapsulation unit 107.
- the encapsulation unit 107 encrypts the packet.
- the global IP address of the monitoring center 3 (communication management device 11) is given to the encrypted packet (encapsulation).
- the packet created in this way is sent to the router 63 and sent to the monitoring center 3.
- the determination unit 105 compares the packet source address with the virtual IP address, and particularly compares both the network part and the host part in the address. . Thereby, even when the local IP address is changed, the function of the IP line unit 73 can be suitably maintained.
- the reissue processor 109 functions when the local IP address of the monitored LAN 61 is changed.
- the local IP address of the IP line unit 73 is also changed, and the local IP address of the storage unit 103 is also rewritten.
- the reissue processing unit 109 compares the updated local IP address of the IP line unit 73 with the virtual IP address of the IP line unit 73. Then, the reissue request unit 109 determines whether both the network part and the client address part of the local IP address match both the network part and the client address part of the virtual IP address. If the determination results are the same, the reissue processor 109 requests reissue of the VPN address.
- the reissue request is issued to the VPN server 35 of the communication management apparatus 11.
- the reissue processing unit 109 stores the new virtual IP address in the storage unit 103. Then, the IP line unit 73 performs VPN processing using the new virtual IP address. The above determination and the like are also performed using a new virtual IP address.
- the processing of the reissue request unit 109 is performed as follows using the VPN function in an actual device.
- VPN communication is disabled and the VPN connection is disconnected.
- VPN connection processing is performed.
- a new virtual IP address is acquired from the VPN server 35 of the communication management apparatus 11 and stored in the storage unit 103.
- Such a VPN disconnection and reconnection function corresponds to the reissue request unit 109 in FIG.
- the reissue request unit 109 functions appropriately. Then, the VPN communication function of the IP line unit 73 can be secured by changing the virtual IP address side.
- the determination target of the determination unit 105 is the packet source address.
- the determination unit 105 may also determine the destination address of the packet as a determination target. This will be described below.
- the storage unit 103 of the IP line unit 73 stores the virtual IP address of the VPN connection partner.
- the virtual IP address of the communication management apparatus 11 is stored.
- the determination unit 105 compares the destination address of the packet with the virtual IP address of the connection partner stored in the storage unit 103. Here, it is determined whether or not a virtual IP address that matches the destination address is registered in the storage unit 103. Also, in this process, the determination unit 105 determines whether both the network part and the host part of the destination address match both the network part and the host part of the connection partner virtual IP address stored in the storage unit 103. Determine.
- the determination unit 105 passes the packet to the encapsulation unit 107 when the determination result of the transmission source address matches and the determination result of the destination address also matches.
- the present invention is applied to the inter-center-terminal VPN 21 between the monitoring device 15 and the monitoring center 3 (communication management device 11).
- the present invention is not limited to the above example.
- the present invention is also preferably applied to the inter-terminal VPN 25 between the monitoring device 15 and the user device 17. Further, the present invention may be applied to other than the monitoring system.
- the present invention is particularly useful when the local IP address is changed due to a change in the LAN or the like outside the management of the VPN virtual IP address setter.
- the VPN communication control device (IP line unit 73 in the embodiment) compares the source address in the transmission packet with the virtual IP address, and the network portion of the source address. Both the host part and the host part determine whether or not they match both the network part and the host part of the virtual IP address, and if the determination results match, the transmission packet is encapsulated. Therefore, it is possible to prevent communication from being disabled due to address duplication due to the change of the local IP address.
- the communication control device is connected to the information processing device through a dedicated communication path.
- a dedicated communication packet for the dedicated communication path is input from the information processing apparatus to the communication control apparatus as an input packet.
- a packet to be transmitted to the VPN is extracted from the data area of the dedicated communication packet.
- an address included in the data area in the dedicated communication packet is a comparison target with the virtual IP address.
- the information processing apparatus is the controller 71
- the dedicated communication path is the LAN 201 in the monitoring apparatus
- the dedicated communication packet is a packet in the LAN 201 in the monitoring apparatus.
- both the network portion and the client address portion of the local IP address of the communication control device in the local network are provided.
- VPN communication can be performed by reissuing the virtual IP address. Therefore, it is possible to avoid communication failure due to address duplication.
- the destination address and the virtual IP address of the target device are also included. Compare. In the latter comparison process, both the network portion and the host portion are to be compared. If the comparison results match, the transmission packet is encapsulated. With such a configuration, it is possible to more reliably avoid communication failure due to address duplication in a configuration in which a VPN communication control device is connected to a local network.
- the present invention is preferably applied to the monitoring system as described above. Then, it is possible to prevent communication from being disabled because the monitored local IP address and the VPN virtual IP address of the monitoring apparatus overlap.
- the monitoring system also plays a role of security and the like, and the level of demand for the safety and stability of the system is high, and the present invention can suitably meet such needs.
- the monitoring system according to the present invention is useful for monitoring a store or the like from a remote place using communication.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
IP回線ユニット:192.168.0.3
監視対象PC :192.168.0.1
一方、仮想IPアドレスは以下の通りである。
IP回線ユニット:10.180.0.3
監視センタ :10.180.0.1
・ローカルIPアドレス
IP回線ユニット:10.180.0.5
監視対象PC :10.180.0.2
・仮想IPアドレス
IP回線ユニット:10.180.0.3
監視センタ :10.180.0.1
3 監視センタ
5 監視対象
7 利用者拠点
11 通信管理装置
13 センタ装置
15 監視装置
17 利用者装置
21 センタ端末間VPN
23 SIP通信
25 端末間VPN
33 HTTPサーバ
35 VPNサーバ
37 SIPサーバ
41 アカウント管理サーバ
43 データベース
61 監視対象LAN
63 ルータ
65 監視対象PC
71 コントローラ
73 IP回線ユニット
91 VPN終端装置(VTE)
93 利用者PC
95 ルータ
101 パケット処理部
103 記憶部
105 判定部
107 カプセル化部
109 再発行処理部
Claims (5)
- ローカルネットワークに接続され、該ローカルネットワークを介して広域ネットワークに接続されてVPNの通信を行う通信制御装置であって、
前記通信制御装置は、
入力パケットを送信パケットに変換するパケット処理部と、
前記VPNにおける前記通信制御装置の仮想IPアドレスを記憶する記憶部と、
前記送信パケット中の送信元アドレスと、前記記憶部に記憶された前記仮想IPアドレスとを比較し、前記送信元アドレスのネットワーク部分及びホスト部分の両方が、前記仮想IPアドレスのネットワーク部分及びホスト部分の両方と一致するか否かを判定する判定部と、
前記判定部による判定結果が一致である場合に前記パケットをカプセル化するカプセル化部と、
を有することを特徴とする通信制御装置。 - 前記記憶部は、更に、前記VPNにて接続される対象機器の仮想IPアドレスを記憶しており、
前記判定部は、更に、前記送信パケットに含まれる宛先アドレスと、前記記憶部に記憶された前記対象機器の仮想IPアドレスとを比較し、前記宛先アドレスのネットワーク部分及びホスト部分の両方が、前記対象機器の仮想IPアドレスのネットワーク部分及びホスト部分の両方と一致するか否かを判定することを特徴とする請求項1に記載の通信制御装置。 - 前記通信制御装置は、前記ローカルネットワークとは別の専用通信路で情報処理装置と接続されており、
前記パケット処理部は、前記専用通信路のための専用通信パケットを前記入力パケットとして前記情報処理装置より入力し、前記専用通信パケットのデータ領域から前記VPNに送出されるべき前記送信パケットを抽出することを特徴とする請求項1に記載の通信制御装置。 - 前記ローカルネットワークにおける前記通信制御装置のローカルIPアドレスのネットワーク部分及びクライアントアドレス部分の両方が、前記VPNにおける前記通信制御装置の仮想IPアドレスのネットワーク部分及びクライアントアドレス部分の両方と一致して前記VPNが切断された場合に前記VPNアドレスの再発行をVPNサーバに要求する再発行処理部を有することを特徴とする請求項1に記載の通信制御装置。
- 監視対象のローカルネットワークに接続され、前記監視対象で取得された監視情報を前記ローカルネットから広域ネットワークを介して遠隔の監視センタに送信する監視装置であって、
前記監視装置は、
前記監視センタに送信すべき監視情報を生成する監視制御部と、
前記監視センタとVPNの通信を行う通信制御部と、
を有し、
前記通信制御部は、
前記監視制御部からの前記監視情報を含む入力パケットを前記監視センタに送信すべき送信パケットに変換するパケット処理部と、
前記VPNにおける前記監視装置の仮想IPアドレスを記憶する記憶部と、
前記送信パケット中の送信元アドレスと、前記記憶部に記憶された前記仮想IPアドレスを比較し、前記送信元アドレスのネットワーク部分及びホスト部分の両方が、前記仮想IPアドレスのネットワーク部分及びホスト部分の両方と一致するか否かを判定する判定部と、
前記判定部による判定結果が一致である場合に、前記送信パケットをカプセル化するカプセル化部と、
を有することを特徴とする監視装置。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020117023869A KR101444089B1 (ko) | 2009-03-30 | 2010-03-25 | 통신 제어 장치 및 감시 장치 |
CN2010800148051A CN102439912B (zh) | 2009-03-30 | 2010-03-25 | 通信控制装置及监视装置 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009-081312 | 2009-03-30 | ||
JP2009081312A JP4750869B2 (ja) | 2009-03-30 | 2009-03-30 | 通信制御装置及び監視装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010116643A1 true WO2010116643A1 (ja) | 2010-10-14 |
Family
ID=42935944
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2010/002122 WO2010116643A1 (ja) | 2009-03-30 | 2010-03-25 | 通信制御装置及び監視装置 |
Country Status (4)
Country | Link |
---|---|
JP (1) | JP4750869B2 (ja) |
KR (1) | KR101444089B1 (ja) |
CN (1) | CN102439912B (ja) |
WO (1) | WO2010116643A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789530A (zh) * | 2016-12-16 | 2017-05-31 | 广东欧珀移动通信有限公司 | 一种网络连接方法、装置及移动终端 |
CN110650065A (zh) * | 2019-09-24 | 2020-01-03 | 中国人民解放军战略支援部队信息工程大学 | 面向互联网的网络设备众测系统及测试方法 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6393475B2 (ja) * | 2013-12-17 | 2018-09-19 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | 通信アダプタ装置、通信システム、トンネル通信方法、及びプログラム |
JP6298334B2 (ja) * | 2014-03-26 | 2018-03-20 | 株式会社 日立産業制御ソリューションズ | 監視システム及び監視システムの制御方法 |
KR102447179B1 (ko) | 2015-11-19 | 2022-09-26 | 삼성전자 주식회사 | 무선 통신 방법 및 이를 제공하는 전자 장치 |
CN105933198B (zh) * | 2016-04-21 | 2020-01-14 | 浙江宇视科技有限公司 | 一种建立直连vpn隧道的装置 |
JP7220997B2 (ja) * | 2018-05-31 | 2023-02-13 | アズビル株式会社 | 施設監視システム、および、施設監視システムにおける通信方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006203313A (ja) * | 2005-01-18 | 2006-08-03 | Nec Infrontia Corp | 警備監視システム、仮想専用線アダプタ、および警備監視方法 |
JP2008301165A (ja) * | 2007-05-31 | 2008-12-11 | Fuji Xerox Co Ltd | 仮想ネットワーク接続装置及びプログラム |
JP2008301024A (ja) * | 2007-05-30 | 2008-12-11 | Fuji Xerox Co Ltd | 仮想ネットワーク接続システム及び装置 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1310526A (zh) * | 2001-04-06 | 2001-08-29 | 北京网警创新信息安全技术有限公司 | 网络违法行为侦知监控追踪取证应急反应系统及方法 |
JP4046731B2 (ja) * | 2003-01-29 | 2008-02-13 | 富士通株式会社 | パケット識別装置およびパケット識別方法 |
JP4339234B2 (ja) * | 2004-12-07 | 2009-10-07 | 株式会社エヌ・ティ・ティ・データ | Vpn接続構築システム |
JP4193832B2 (ja) * | 2005-09-14 | 2008-12-10 | 三菱マテリアル株式会社 | ネットワークシステム及びデータ転送方法 |
JP2007156681A (ja) * | 2005-12-02 | 2007-06-21 | Shinji Kudo | インターネットの不正アクセス処理システム及び処理方法 |
JP2010510760A (ja) * | 2006-11-21 | 2010-04-02 | ウェイポート,インコーポレーテッド | インテリジェントなサービス品質管理 |
CN101304388B (zh) * | 2008-06-20 | 2010-08-04 | 成都市华为赛门铁克科技有限公司 | 解决ip地址冲突的方法、装置及系统 |
-
2009
- 2009-03-30 JP JP2009081312A patent/JP4750869B2/ja active Active
-
2010
- 2010-03-25 WO PCT/JP2010/002122 patent/WO2010116643A1/ja active Application Filing
- 2010-03-25 CN CN2010800148051A patent/CN102439912B/zh active Active
- 2010-03-25 KR KR1020117023869A patent/KR101444089B1/ko active IP Right Grant
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006203313A (ja) * | 2005-01-18 | 2006-08-03 | Nec Infrontia Corp | 警備監視システム、仮想専用線アダプタ、および警備監視方法 |
JP2008301024A (ja) * | 2007-05-30 | 2008-12-11 | Fuji Xerox Co Ltd | 仮想ネットワーク接続システム及び装置 |
JP2008301165A (ja) * | 2007-05-31 | 2008-12-11 | Fuji Xerox Co Ltd | 仮想ネットワーク接続装置及びプログラム |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789530A (zh) * | 2016-12-16 | 2017-05-31 | 广东欧珀移动通信有限公司 | 一种网络连接方法、装置及移动终端 |
CN106789530B (zh) * | 2016-12-16 | 2019-07-16 | Oppo广东移动通信有限公司 | 一种网络连接方法、装置及移动终端 |
CN110650065A (zh) * | 2019-09-24 | 2020-01-03 | 中国人民解放军战略支援部队信息工程大学 | 面向互联网的网络设备众测系统及测试方法 |
Also Published As
Publication number | Publication date |
---|---|
JP2010233168A (ja) | 2010-10-14 |
CN102439912A (zh) | 2012-05-02 |
CN102439912B (zh) | 2013-12-25 |
KR101444089B1 (ko) | 2014-11-03 |
JP4750869B2 (ja) | 2011-08-17 |
KR20110133043A (ko) | 2011-12-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4750869B2 (ja) | 通信制御装置及び監視装置 | |
EP3432523B1 (en) | Method and system for connecting a terminal to a virtual private network | |
US10097517B2 (en) | Secure tunnels for the internet of things | |
US7028337B2 (en) | Method of virtual private network communication in security gateway apparatus and security gateway apparatus using the same | |
US7751540B2 (en) | “Always-on” telemetry system and method | |
CN102378982B (zh) | 监视系统及通信管理装置 | |
US10506082B2 (en) | High availability (HA) internet protocol security (IPSEC) virtual private network (VPN) client | |
US10122688B2 (en) | Communication system | |
US9088429B2 (en) | Method for operating, monitoring and/or configuring an automation system of a technical plant | |
JP5357619B2 (ja) | 通信障害検出システム | |
WO2005113400A1 (ja) | 昇降機の遠隔監視制御システム | |
JP2011124770A (ja) | Vpn装置、vpnネットワーキング方法、プログラム、及び記憶媒体 | |
CN114143050B (zh) | 一种视频数据加密系统 | |
JP2010283762A (ja) | 通信経路設定装置、通信経路設定方法、プログラム、及び記憶媒体 | |
JP2011160286A (ja) | 呼制御サーバ、中継サーバ、vpn装置、vpn通信システム、vpnネットワーキング方法、プログラム、及び記憶媒体 | |
JP2009177239A (ja) | ネットワーク中継装置 | |
JP5302076B2 (ja) | 通信障害検出システム | |
JP2005130511A (ja) | コンピュータネットワークを管理する方法及びシステム | |
JP2006352710A (ja) | パケット中継装置及びプログラム | |
JP2017163186A (ja) | 端末間通信システム及び端末間通信方法及びコンピュータプログラム | |
JP2007281685A (ja) | ゲートウェイ装置および情報共有システムおよび方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080014805.1 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10761351 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20117023869 Country of ref document: KR Kind code of ref document: A |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10761351 Country of ref document: EP Kind code of ref document: A1 |