WO2011021378A1 - ネットワーク装置、判断方法、プログラム、集積回路 - Google Patents
ネットワーク装置、判断方法、プログラム、集積回路 Download PDFInfo
- Publication number
- WO2011021378A1 WO2011021378A1 PCT/JP2010/005059 JP2010005059W WO2011021378A1 WO 2011021378 A1 WO2011021378 A1 WO 2011021378A1 JP 2010005059 W JP2010005059 W JP 2010005059W WO 2011021378 A1 WO2011021378 A1 WO 2011021378A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- index value
- peripheral device
- difference
- identification information
- unit
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2807—Exchanging configuration information on appliance services in a home automation network
Definitions
- the present invention relates to a network device such as a home server used by being connected to another device via a network, and more particularly to a technique for ensuring the security of information held by the own device.
- the home server is an apparatus that stores and distributes various contents such as movies and music by communicating with a recording / playback apparatus or a digital camera connected as needed via a home network. Since some contents include personal information, a security function is required to protect the contents in anticipation of theft of the home server.
- authentication is used as a means of ensuring security for content protection.
- it is troublesome for a user to perform authentication every time it is used, regardless of use in a home where security is originally ensured.
- Patent Document 1 The first conventional apparatus described in Patent Document 1 is based on the premise that it is always connected to a network, and issues an alarm when physically disconnected from the network to suppress theft.
- this technique has a drawback that even if an alarm is issued, the content cannot be protected if it is actually stolen.
- Patent Document 2 describes a device that takes such theft into consideration.
- the second conventional apparatus described in Patent Document 2 acquires position information by receiving radio waves from a base station, determines whether or not it is used at the correct position, and restricts access based on the result. It is a device to perform. When the position information indicates a specific place, the content can be accessed. Further, in the case of theft or the like, the location information acquired by receiving radio waves from the base station does not indicate the specific location, so that access to the content becomes impossible.
- the present invention has been made in view of such a problem, and an object of the present invention is to provide a network device whose function is limited in a special case such as theft.
- a network device is a network device for restricting access to predetermined information held by the own device, and is the same LAN (Local Area ⁇ ⁇ Network) that can communicate with the own device. )
- the access restriction for each of the peripheral devices from which the identification information is acquired by the acquisition unit that acquires the identification information of each peripheral device by communicating with the peripheral device that is one or more devices existing in Index value used to determine whether or not to perform the index value calculation means for calculating the index value for estimating the presence rate of the peripheral device based on the past communication, and for each peripheral device, Holding means for holding the identification information acquired by the acquisition means in the past and the index value calculated by the index value calculation means; and the current peripheral device acquired by the acquisition means
- a difference specifying means for specifying a difference between the identification information of the container and the identification information of the past peripheral devices held by the holding means, and the access based on the index value of the device specified as the difference by the difference specifying means Judgment means for judging whether or not
- FIG. 1 The figure which shows the normal operating environment of the network apparatus 100 which concerns on Embodiment 1.
- FIG. 1 The figure which shows the operating environment which the network apparatus 100 judges as "abnormality" Block diagram of network device 100
- the figure which shows the data structure and content example of the peripheral device information 20 Flow chart showing operation of network device 100 Abnormality judgment flowchart
- FIG. 1 The figure which shows the normal operating environment of the network apparatus 100 which concerns on Embodiment 1.
- FIG. 1 The figure which shows the operating environment which the network apparatus 100 judges as "abnormality" Block diagram of network device 100
- the figure which shows the data structure and content example of the peripheral device information 20 Flow chart showing operation of network device 100 Abnormality judgment flowchart
- Block diagram of network device 600 Block diagram of network device 600 according to Embodiment 3
- Flow chart showing operation of network device 600 Abnormality determination flowchart The figure which shows the data structure and content example of the surrounding device information 50 in the case of determining an index value according to the type of device.
- FIG. 1 is a diagram illustrating an example of a normal operating environment of the network device 100 according to the first embodiment
- FIG. 2 is a diagram illustrating an example of an operating environment in which the network device 100 determines “abnormal”.
- the network device 100 is used as a home server or the like, and is a device that restricts access by determining an abnormality in order to protect the content held by itself.
- the network device 100 is configured to communicate with peripheral devices that can communicate with each other (herein, a device existing in the same LAN is referred to as a peripheral device or a device). Get Media Access Control address).
- the network device 100 compares the peripheral device identification information acquired at the time of startup with the past peripheral device identification information acquired up to the current startup, and is connected in the past but not at the current startup.
- a device is identified as a difference, and it is determined whether or not to restrict access based on the number of devices identified as the difference and an index value for estimating the presence rate of the device identified as the difference.
- the index value of the device specified as the difference is higher than the threshold and there is another device specified as the difference in the abnormality determination, that is, in the past operating environment (here, the network device 100). And connection environment with peripheral devices), if the current operating environment has changed to a level that exceeds a certain reference range, it is judged as “abnormal”, and access to the stored content is restricted. Do.
- a home server used in the home will be described as an example of the network device 100. As shown in FIG. 1, the home server 100 is connected to the LAN side of the router 120. In addition, a recording / playback device 130, a printer 140, a display 150, and a mobile terminal 160 are connected to the LAN side of the router 120.
- the home server 100, the printer 140, and the display 150 are wired, and the recording / playback apparatus 130 and the portable terminal 160 are connected wirelessly.
- Each has a MAC address as identification information, and the address value is as shown after [MAC address] in FIG.
- the server device also has a MAC address, it is not related to the subject of the invention and is omitted.
- the home server 100 communicates with each of the above-described devices in the LAN including the router 120 via the LAN, and distributes and accumulates various contents. At the same time, the establishment of communication is attempted, the history is recorded together with the MAC address of each device, and whether or not access is restricted is determined based on the history.
- FIG. 3 is a block diagram of the home server 100 that executes the above processing.
- the home server 100 includes a memory, a processor, a hard disk, a small LCD, etc., not shown.
- the home server 100 includes a network interface (NW-IF) 101, an acquisition unit 102, a temporary holding unit 103, an index value calculating unit 104, a holding unit 105, a difference specifying unit 106, a determination Unit 107, condition holding unit 108, control unit 109, output unit 110, and input unit 111.
- NW-IF network interface
- each function of the acquisition unit 102, the temporary storage unit 103, the index value calculation unit 104, the storage unit 105, the difference identification unit 106, the determination unit 107, and the control unit 109 is executed by a program stored in a memory (not shown). This is realized by being executed.
- the network interface 101 is a LAN card and has a function of communicating with peripheral devices such as a router and a printer.
- the acquisition unit 102 has a function of attempting to communicate with a peripheral device via the network interface 101 and acquiring a MAC address as identification information of the peripheral device that has been able to communicate.
- the temporary storage unit 103 includes a memory area, and has a function of temporarily storing the MAC address acquired by the acquisition unit 102 in the area.
- the index value calculation unit 104 calculates an index value for estimating the presence rate of each peripheral device based on the MAC address held by the temporary holding unit 103, and the holding unit 105 holds the calculated index value. It has a function of updating the peripheral device information 20 (described later).
- the holding unit 105 has a function of holding the peripheral device information 20, that is, the index value corresponding to the MAC address of each peripheral device as one record for each peripheral device, and the MAC address held by the temporary holding unit 103. 2 includes a function for registering a record corresponding to the corresponding MAC address in the peripheral device information 20 when the peripheral device information 20 includes a MAC address that has not yet been registered.
- the difference identification unit 106 is responsible for part of the abnormality determination, and is registered in the current information 10 that is the MAC address held by the temporary holding unit 103 and the peripheral device information 20 held by the holding unit 105. It has a function of comparing a MAC address and specifying a difference.
- the determination unit 107 is responsible for part of the abnormality determination, acquires a threshold value corresponding to the index value from the condition holding unit 108, and the existence probability of the peripheral device information 20 of the device specified as a difference by the difference specifying unit 106 25 and the number of times of measurement 24. Specifically, there are a plurality of devices identified as differences by the difference identifying unit 106, and at least one of them includes a device whose index value is higher than the threshold value. It has a function to judge “abnormal” when it is detected.
- the condition holding unit 108 is an area of the flash memory, and has a function of holding a threshold value corresponding to an index value used for abnormality determination.
- the input unit 111 has a function of accepting authentication information input by a keyboard, a pointing device, or the like.
- the output unit 110 has a function of outputting an authentication information input request received from the control unit 109, that is, outputting a message indicating the authentication information input request to a small LCD or the like.
- control unit 109 has a function of restricting access to content held by the own device from surrounding devices based on the abnormality determination result of the determination unit 107. Specifically, if the abnormality determination result is “abnormal”, an authentication information input request is sent to the output unit 110, and authentication is performed based on the authentication information input to the user received from the input unit 111. . If the authentication fails, turn off the power of the machine, and if the abnormality judgment result is “no abnormality”, or if the authentication is successful, the current operating environment can be judged as “no abnormality” An instruction signal for instructing to update the peripheral device information 20 with the current information 10 held is sent to the temporary holding unit 103.
- FIG. 4A shows a data configuration and content example of the current information 10 used by the home server 100 having the above-described configuration for abnormality determination.
- the current information 10 is identification information of each peripheral device, that is, the MAC address of the router 120, the recording / playback apparatus 130, the printer 140, the display 150, and the portable terminal 160, and is acquired by the acquisition unit 102 at the time of activation.
- the first record is the MAC address of the router 120
- the second record is the MAC address of the recording / playback apparatus 130
- the third record is the MAC address of the printer 140.
- the first is the MAC address of the display 150
- the fifth record is the MAC address of the mobile terminal 160.
- FIG. 4B shows current information 10 acquired when the home server 100 is started in the operating environment of FIG. 2, the first record is the MAC address of the router 170, and the second record is a personal computer terminal. 180 is the MAC address, and the third record is the MAC address of the scanner 190.
- FIG. 5A shows a data configuration and content example of the peripheral device information 20 used by the home server 100.
- the peripheral device information 20 is composed of records for each peripheral device, and each record is associated with the identification information 21 of the peripheral device, the presence number 22, the non-existence number 23, the measurement number 24, and the existence probability 25. Information, which is held by the holding unit 105 in the flash memory.
- the identification information 21 is the MAC address of the peripheral device, and when the holding unit 105 receives the current information 10 from the temporary holding unit 103, the identification information 21 is not registered in the peripheral device information 20 in the received current information 10. When the MAC address is included, the corresponding MAC address is additionally registered.
- the number of existences 22 is the total number of peripheral devices that existed in a communicable state when the acquisition unit 102 attempted acquisition, and is registered in the peripheral device information 20. 1 is added to the existence count 22 when the existing MAC address is included in the information 10.
- the non-existence count 23 is the total number of times that a peripheral device has not existed in a communicable state from the initial registration to the present when the acquisition unit 102 attempts acquisition, and is registered in the peripheral device information 20. 1 is added to the non-existing count 23 when the current MAC address is not included in the information 10.
- the measurement count 24 is a value obtained by adding the presence count 22 and the non-existence count 23.
- the existence probability 25 is a value obtained by dividing the existence number 22 by a value obtained by adding the existence number 22 and the non-existence number 23.
- the presence probability 25 is used as an index value for estimating the presence rate, that is, the probability that a peripheral device exists in a state where it can communicate with the home server 100.
- FIG. 6 is a flowchart illustrating the operation of the home server 100 according to the first embodiment.
- the acquiring unit 102 acquires a MAC address by communicating with a communicable peripheral device (step S201). For example, the acquisition unit 102 inquires a DHCP (Dynamic Host Configuration Protocol) server or the like, acquires a range of IP addresses (Internet Protocol Protocol Address) used in the same LAN, and uses this to use an ARP (Address Resolution Protocol). The request is broadcasted, a response signal to the transmitted ARP request, that is, RARP (Reverse Address Resolution Protocol) is received, and the MAC address is acquired.
- DHCP Dynamic Host Configuration Protocol
- IP addresses Internet Protocol Address
- ARP Address Resolution Protocol
- the acquisition unit 102 sends the acquired MAC address to the temporary holding unit 103, and the temporary holding unit 103 holds the received MAC address as the current information 10 and sends it to the difference specifying unit 106 while holding the current information 10.
- the current information 10 at this time will be described with reference to FIG.
- the difference identifying unit 106 has a MAC address registered in the peripheral device information 20 that is information on the past peripheral devices received from the holding unit 105, and the current information 10 received from the temporary holding unit 103 includes the MAC address. Whether the device is not identified as a difference, and the determination unit 107 performs access restriction based on the number of devices identified as the difference and an index value for estimating the existence rate of the devices identified as the difference. It is determined whether or not there is an abnormality (step S202). Details of the abnormality determination process will be described later.
- step S203 If the result of the abnormality determination is “abnormal” (Yes in step S203), the user is requested to authenticate and the access is restricted (step S204).
- step S204 for authentication, the control unit 109 sends an authentication information input request to the output unit 110, and the output unit 110 outputs a message indicating the input request received from the control unit 109 to the small LCD.
- the input unit 111 sends the authentication information input by the user to the control unit 109, and the control unit 109 displays “authentication successful” when the authentication information received from the input unit 111 matches the authentication information set in advance by the user. "If there is no match," Authentication failed ".
- control unit 109 turns off the power of its own device, that is, shuts off the power supply path (step S214).
- the home server 100 repeats the processing from Step S205 to Step S213 during operation.
- the control unit 109 When the result of the abnormality determination is “no abnormality” or “authentication success”, the control unit 109 temporarily outputs an instruction signal instructing to update the peripheral device information 20 based on the current information 10. Send to. After receiving the instruction signal, the temporary storage unit 103 sends the stored current information 10 to the index value calculation unit 104 and the storage unit 105.
- the holding unit 105 determines whether the current information 10 received from the temporary holding unit 103 includes a MAC address that is not registered in the held peripheral device information 20 (step S205). If there is an unregistered MAC address, a record corresponding to the corresponding MAC address is additionally registered in the peripheral device information 20 (step S206).
- the holding unit 105 stores the peripheral device information 20 in the peripheral device information 20.
- a record corresponding to the MAC address 00: 00: 0C: 07: BD: 3C of the portable terminal 160 is additionally registered (see FIG. 5B).
- the index value calculation unit 104 updates the peripheral device information 20. Specifically, when the current information 10 received from the temporary storage unit 103 includes the MAC address registered in the peripheral device information 20, 1 is added to the existing number 22 and is not included. In the case of a failure, 1 is added to the nonexistence count 23. Further, a value obtained by dividing the presence count 22 by the value obtained by adding the presence count 22 and the non-existence count 23 is calculated as an existence probability 25 (step S207), and a value obtained by adding the presence count 22 and the non-existence count 23 is calculated as the measurement count 24. (Step S208). The index value calculation unit 104 updates the peripheral device information 20 with the calculated presence number 22, non-existence number 23, measurement number 24, and presence probability 25 (step S209).
- the MAC address 00: 00: 0C: 07: AC: 0B of the router 120 registered in the first record of the peripheral device information 20 is included in the current information 10
- the MAC address 00 of the router 120 is displayed. 1 is added to the existence number 22 corresponding to 0: 00: 0C: 07: AC: 0B to be 100 times, the number of measurement times 24 is 101 times, and the existence probability 25 is calculated as 99%.
- the recording / reproducing apparatus 130, the printer 140, and the display 150 are updated in the same manner (see FIG. 5B).
- step S210 when there is a request for access to the content from the peripheral device (step S210), the reading / writing to the content is controlled (step S211).
- step S212 When the time T after the update of the peripheral device information 20 has elapsed (Yes in step S212), the acquisition unit 102 tries to acquire the MAC address of the peripheral device (step S213), and the acquired MAC address is stored in the temporary storage unit 103.
- the sending and temporary holding unit 103 sends the received MAC address to the index value calculating unit 104 and the holding unit 105.
- This time T is, for example, one hour, and means that the processing from step S205 to step S213 is repeated every other hour.
- the MAC address can be acquired as a result of attempting to acquire by repeating the processing from step S205 to step S213, for example, every 1 hour, 1 is added to the number of existing times 22, and if it cannot be acquired, it is not. 1 is added to the existence count 23, and the measurement count 24 and the existence probability 25 are updated accordingly. This increases the possibility of distinguishing between a device that is always connected and a device that is connected at any time. That is, the accuracy of estimation of the presence rate is increased.
- step S202 the processing details of the abnormality determination (step S202) will be described.
- FIG. 7 is a flowchart of abnormality determination.
- the difference specifying unit 106 corresponds to the corresponding MAC address.
- differences are identified as differences (step S301).
- the peripheral device information 20 FIG. 5A
- the current information 10 FIG. 4A
- all the MAC addresses registered in the peripheral device information 20 are included in the current information 10. Therefore, there is no device identified as a difference, and it is determined that “no abnormality” (step S309).
- step S302 If there is a device identified as a difference, pay attention to one of the devices identified as a difference (step S302) and make the following determination.
- step S303 It is determined whether or not the existence probability 25 that is the index value of the device specified as the difference is higher than the threshold value for the existence probability 25 acquired from the condition holding unit 108 (step S303).
- the existence probability 25 of the device specified as the difference is higher than the threshold value, it is determined whether or not the number of measurement times 24 of the device specified as the difference is greater than the threshold value for the measurement number 24 acquired from the condition holding unit 108. Is performed (step S304). If the number of measurements 24 for the device identified as the difference is greater than the threshold, it is determined whether there are other devices identified as the difference (step S305). If there is another device identified as a difference in step S305, it is determined that “abnormality exists” (step S308).
- step S303 When the existence probability 25 of the device identified as the difference in step S303 is not higher than the threshold for the existence probability 25, and the number of measurements 24 of the device identified as the difference in step S304 is not greater than the threshold for the number of measurements 24. If there is a device identified as a difference that has not been focused yet (step S306), the new device is focused (step S307), and the processing from step S303 is repeated.
- step S301 If there is no device identified as a difference in step S301, if the presence probability 25 of the device identified as a difference last focused in step S303 is not higher than the threshold for the existence probability 25, the last in step S304 If the number of measurements 24 of the device identified as a difference is not greater than the threshold for the number of measurements 24, or if there is no other device identified as a difference in step S305, that is, identify as a difference.
- the connected device is temporarily disconnected due to a failure or replacement, or the power is turned off, it is determined that there is no abnormality (step S309).
- the peripheral device information 20 is in the state of FIG. 5A, the threshold of the existence probability 25 is 80%, and the threshold of the number of measurement 24 is 50.
- a MAC address not registered in the peripheral device information 20 of FIG. 5A is acquired and registered in the peripheral device information 20.
- the MAC address of the device has not been acquired.
- the existence probability 25 of the router 120 registered in the first record of the peripheral device information 20 is higher than the threshold value (see step S303), and the measurement count 24 is higher than the threshold value (see step S304).
- the determination unit 107 determines that the operating environment is “abnormal”.
- the determination unit 107 determines that the operating environment is “no abnormality”.
- the determination unit 107 determines that the operating environment is “no abnormality”.
- the determination unit 107 determines that the operating environment is “no abnormality”.
- the index value calculation method for estimating the presence rate is modified for the home server 100 shown in the first embodiment.
- the existence probability 25 is used as the index value.
- the accumulated communication time between the home server 100 and the peripheral devices is accumulated for all the peripheral devices registered in the peripheral device information 30 (described later).
- a communication time ratio that is a value divided by the total communication time is used.
- the hardware configuration and functional configuration are the same as those of the home server 100 shown in the first embodiment.
- the index value calculation unit 104 By partially modifying the index value calculation unit 104, measurement of the communication time between the own device and the surrounding devices and calculation of the communication time ratio are realized.
- the index value calculation unit 104 measures the communication time when communication is performed between the home server 100 and the peripheral device, and updates the communication time 32 of the peripheral device information 30. A function of calculating a communication time ratio 33 by dividing the communication time 32 by the sum of the communication times 32 of all the peripheral devices registered in the peripheral device information 30. ⁇ Data> Hereinafter, the peripheral device information 30 used for abnormality determination will be described.
- FIG. 8A shows an example of the data structure and contents of the peripheral device information 30 used by the home server 100.
- the peripheral device information 30 is composed of records for each peripheral device, and each record is information in which the identification information 31 is associated with the communication time 32 and the communication time ratio 33 and is held by the holding unit 105.
- the identification information 31 is the MAC address of the peripheral device, and when the holding unit 105 receives the current information 10 from the temporary holding unit 103, the MAC that is not registered in the peripheral device information 30 in the received current information 10
- the MAC address of the communication destination is not registered in the peripheral device information 30
- a record corresponding to the corresponding MAC address is registered in the peripheral device information 30.
- the communication time 32 is an accumulated communication time during which the peripheral device communicates with the home server 100.
- the communication time is measured by the index value calculation unit 104. Then, the measured communication time is added to the communication time 32 corresponding to the peripheral device identification information 31.
- the communication time ratio 33 is a value obtained by dividing the communication time 32 of each peripheral device by the sum of the communication times 32 of all the peripheral devices registered in the peripheral device information 30.
- the communication time ratio 33 is used as an index value for estimating the presence rate of surrounding devices.
- FIG. 9 is a flowchart illustrating the operation of the home server 100 according to the second embodiment.
- the home server 100 When the home server 100 is activated, the home server 100 acquires the MAC address of the peripheral device, and performs an abnormality determination described later based on the acquired MAC address and the peripheral device information 30 held by the holding unit 105. If the abnormality determination result is “abnormal”, the user is requested to authenticate, and if “authentication failed”, the power of the own device is turned off. When the abnormality determination result is “no abnormality” or “authentication successful”, if the unregistered MAC address is included in the peripheral device information 30 in the current information 10, the corresponding MAC is included in the peripheral device information 30. A record corresponding to the address is additionally registered (steps S401 to S406 and S414).
- steps S401 to S406 and S414 have the same processing contents as steps S201 to S206 and S214 described in FIG. However, only the process details of the abnormality determination (step S402) described later are different processes.
- the home server 100 repeats the processing from step S407 to step S413 when the abnormality determination result is “no abnormality” (No in step S403) or “authentication successful” (Yes in step S404).
- the home server 100 When there is a request for access to the content from the peripheral device (step S407), the home server 100 starts control of reading / writing to the content (step S408).
- the index value calculation unit 104 determines whether or not the communication destination MAC address is registered in the peripheral device information 30 (step S409), and measures the communication time (step S411). If the MAC address of the communication destination is not registered in the peripheral device information 30, a record corresponding to the corresponding MAC address is registered in the peripheral device information 30 (step S410).
- the index value calculation unit 104 divides the communication time 32 of each peripheral device by the sum of the communication times 32 of all the devices registered in the peripheral device information 30, and calculates a communication time ratio 33 (step S412).
- the device information 30 is updated (step S413).
- the peripheral device information 30 is in the state shown in FIG.
- the MAC address of the communication destination of the communication by the access request to the content is 00: 00: 0C: 06: BC: 1D
- the communication time measured by the index value calculation unit 104 is 20 seconds
- the unit 104 adds the communication time measured this time to the communication time 32 corresponding to the MAC address 00: 00: 0C: 06: BC: 1D to calculate 70 seconds, and the communication time 32 is registered in the peripheral device information 30.
- the communication time ratio 33 is calculated as 32% by dividing by the total (100 + 70 + 40 + 10) of the communication time 32 of all peripheral devices.
- the communication time ratio 33 of all the devices registered in the peripheral device information 30 is calculated (see FIG. 8B).
- step S407 By repeating the processing from step S407 to step S413, it is possible to estimate the presence rate of peripheral devices from the communication time ratio 33 and to restrict access according to the actual use.
- step S402 the processing details of the abnormality determination (step S402) will be described.
- FIG. 10 is a flowchart of abnormality determination.
- the difference identification unit 106 has a MAC address registered in the peripheral device information 30 received from the holding unit 105, and there is a device that does not include the MAC address in the current information 10 received from the temporary holding unit 103.
- the corresponding device is identified as a difference (step S501).
- attention is paid to one of the devices identified as a difference (step S502), and the following determination is made.
- step S503 It is determined whether the communication time ratio 33 of the devices specified as the difference is higher than the threshold acquired from the condition holding unit 108 (step S503). If the communication time ratio 33 of the device specified as the difference is higher than the threshold value, it is determined whether there is another device specified as the difference (step S504). If there is another device identified as a difference in step S504, it is determined that “abnormality exists” (step S507).
- step S503 In the case where the communication time ratio 33 of the device identified as the difference in step S503 is not higher than the threshold, when there is a device identified as the difference that has not yet been focused on (step S505), the new device is focused ( The processing is repeated from step S506) and step S503.
- Step S501 If there is no device identified as a difference in step S501, the communication time ratio 33 of the device identified as the difference focused last in step S503 is not higher than the threshold value, or identified as a difference in step S504 If there is no other device, that is, if the device specified as a difference is temporarily disconnected due to failure or replacement, or the power is considered to have been turned off, it is determined that there is no abnormality ( Step S508).
- a MAC address not registered in the peripheral device information 30 of FIG. 8A is acquired and registered in the peripheral device information 30.
- the MAC address of the device has not been acquired.
- the communication time ratio 33 of the router 120 registered in the first record of the peripheral device information 30 is higher than the threshold (see step S503), and there are other devices not currently included in the information 10 such as the recording / playback device 130 (step S503).
- the determination unit 107 determines that the operating environment is “abnormal” (see S504).
- the determination unit 107 determines that the operating environment is “no abnormality”.
- the home server 600 will be described in which a function for performing an abnormality determination based on a host name corresponding to the global IP address of the own device is added to the home server 100 illustrated in the first embodiment. ⁇ Configuration> Hereinafter, the home server 600 will be described.
- FIG. 11 is a block diagram of the home server 600.
- the hardware configuration is the same as in the first embodiment.
- the home server 600 includes a detection unit 601, a temporary storage unit 602, a common unit identification unit 603, a storage unit 604, a determination unit 605, a determination unit 606, and a control unit 607, and includes a network interface.
- 101 to the difference specifying unit 106, the condition holding unit 108, the output unit 110, and the input unit 111 are the same as the home server 100 (FIG. 3) shown in the first embodiment.
- each function of the detection unit 601, the temporary storage unit 602, the common unit identification unit 603, the storage unit 604, the determination unit 605, the determination unit 606, and the control unit 607 is executed by a processor stored in a memory (not shown). Is realized.
- the detecting unit 601 has a function of detecting a host name based on the global IP address of the own device.
- the temporary storage unit 602 has a function of temporarily storing the host name detected by the detection unit 601.
- the common part specifying unit 603 has a function of specifying a part common to the host name registered in the host name log 41 (described later) stored in the storage unit 604.
- the storage unit 604 stores the host name information 40, that is, the host name log 41, which is a plurality of host names detected by the temporary storage unit 602, and the common unit 42 identified by the common unit identification unit 603 in the flash memory. It has the function to do.
- the determination unit 605 has a function of determining an abnormality based on the host name stored in the temporary storage unit 602 and the host name information 40 stored in the storage unit 604, specifically, in the host name information 40 stored in the storage unit 604. There is no host name that matches the host name stored in the temporary storage unit 602 in the host name log 41, and the common unit 42 in the host name information 40 stored in the storage unit 604 and the host stored in the temporary storage unit 602. It has a function of determining “abnormal” when a part corresponding to the common part 42 of the names does not match. That is, the determination unit 605 determines whether or not an ISP (Internet Service Provider) that connects a LAN connected to the own device to the Internet has been changed.
- ISP Internet Service Provider
- the determination unit 606 has a function of sending an abnormality determination result to the control unit 607 in addition to the function of the determination unit 107 shown in the first embodiment.
- control unit 607 has a function of restricting access to the content held by the peripheral device based on the abnormality determination result of the determination unit 605. .
- ⁇ Data> the host name information 40 used for the abnormality determination by the home server 600 having the above-described configuration will be described.
- FIG. 12A shows an example of the data structure and contents of the host name information 40 used by the home server 600.
- the host name information 40 is a common unit 42 with the host name log 41 and is stored in the storage unit 604.
- the host name information 40 is used for abnormality determination by the determination unit 605.
- the host name log 41 is a plurality of host names detected so far, and the host name specified by the common unit 42 described later is deleted from the host name log 41.
- the common part 42 is a common part of the host name log 41 specified based on a predetermined standard by the common part specifying part 603. For example, in the host name registered in the host name log 41, when there are three or more host names that have 10 characters or more in common from the rear, the portion that has 10 or more characters in common is the common part. 42.
- the acquisition unit 102 acquires a MAC address by communicating with a peripheral device capable of communication (step S701).
- the detection unit 601 After acquiring the MAC address, the detection unit 601 makes an inquiry to a DNS (Domain Name System) server and detects a host name corresponding to the global IP address of the own device (step S702).
- DNS Domain Name System
- the home server 600 makes an abnormality determination based on the MAC address acquired in step S701 and the peripheral device information 20 held by the holding unit 105. If the abnormality determination result is “abnormal”, the user is requested to authenticate, and if “authentication failed”, the power of the own device is turned off. (Step S703, Step S704, Step S707 and Step S718).
- Step S701, step S703, step S704, step S707, and step S718 described above are the same processing contents as step S201, step S202, step S203, step S204, and step S214 described in FIG.
- step S705 If the abnormality determination result by the determination unit 606 is “no abnormality”, an abnormality determination described later is performed (step S705).
- the control unit 607 sends an instruction signal to the temporary storage unit 602 when the abnormality determination result is “no abnormality” (No in Step S706) or “authentication success” (Yes in Step S707).
- the temporary storage unit 602 sends the stored host name to the storage unit 604, and the storage unit 604 matches the common unit 42 with the portion corresponding to the common unit 42 of the received host name. If not, the received host name is saved as the host name log 41 (step S708).
- the common part specifying unit 603 specifies a common part of the host names registered in the host name log 41.
- a part of the host name log 41 that has a predetermined number or more of host names that matches a predetermined number of characters from the back for example, a part of three or more host names that have 10 or more characters in common from the back. If there is, the common part 42 is identified as the common part.
- the common unit specifying unit 603 deletes the host name for which the common unit 42 has been specified from the host name log 41.
- the home server 600 repeats the processing from step S709 to step S717 during operation.
- the home server 600 After storing the host name, the home server 600 additionally registers and updates the peripheral device information 20 based on the current information 10 (steps S709 to S713). In addition, when there is a request for access to the content from the peripheral device, read / write control to the content is performed, and when the time T has elapsed since the last update of the peripheral device information 20, the MAC address of the peripheral device is acquired. Then, the peripheral device information 20 is additionally registered and updated (steps S714 to S717).
- Steps S709 to S717 described above are the same processing contents as steps S205 to S213 described in FIG.
- FIG. 14 is a flowchart of abnormality determination.
- the determination unit 605 determines whether there is a host name that matches the current host name detected this time in the host name log 41 of the host name information 40 (step S801). If there is no host name that matches the host name log 41, it is determined whether or not the common part 42 matches the part corresponding to the common part 42 of the current host name detected this time (step S802). If they do not match, it is determined that “abnormality exists” (step S804).
- step S803 If there is a host name that matches the current host name in the host name log 41 in step S801, and if the common part 42 and the part corresponding to the common part 42 of the current host name detected this time match, It is determined that “no abnormality” (step S803).
- the host name log 41 contains 4.tokyo. There is no host name that matches .panasonic.com (see step S801), but the part corresponding to the common part 42 of 4.tokyo.panasonic.com matches * .tokyo.panasonic.com of the common part 42 It is determined that “no abnormality” (see step S802).
- the network device As described above, by performing an abnormality determination based on the host name corresponding to the global IP address of the own device, it is possible to confirm whether the ISP of the home server 600 has been changed, and an abnormality based on the peripheral device information 20 By performing the determination and the abnormality determination based on the host name information 40 of the own device, the ISP is normally considered not to be frequently changed. Therefore, if there is a change, it can be estimated that there is a possibility of theft, and the content can be more reliably Protection can be performed. ⁇ Supplement> As described above, the network device according to the present invention has been described by taking the home server as an example in the first, second, and third embodiments. However, the exemplified home server, that is, the network device can be modified as follows. It goes without saying that the invention is not limited to the network device as shown in the above embodiment.
- the index values shown in the above-described embodiment may be other values as long as they can estimate the presence rate of surrounding devices, such as being determined based on the type of device. For example, mobile devices are connected only when needed, not always connected, routers are always connected, and it can be considered that they are usually not frequently replaced. Can be estimated.
- FIG. 15A is a diagram showing a data configuration and example contents of the peripheral device information 50 when the index value is determined based on the device type
- FIG. 15B is a device-specific index value table 60. It is a figure which shows the data structure and content example of this.
- the peripheral device information 50 is information in which the type 52 is associated with the identification information 51 of the peripheral device
- the device-specific index value table 60 is information in which the index value 62 is associated with the type 61.
- the acquisition unit 102 acquires the type 52 of each peripheral device by communication or the like that complies with DLNA (DigitalDLiving Network Alliance) guidelines.
- the abnormality determination by the determination unit 107 may be performed based on the index value 62 corresponding to the type 61 of the device-specific index value table 60 that matches the device type 52 specified as the difference by the difference specifying unit 106. Good.
- the type 52 corresponding to the MAC address 00: 00: 0C: 07: AC: 0B is a router.
- the corresponding index value from the device-specific index value table 60 is A.
- the threshold value is A and the index value is A> B> C
- the threshold value is A and the index value of the device identified as the difference is B
- the peripheral device information shown in the above-described embodiment may use the latest data from the present to a predetermined period, for example, two weeks before, when performing abnormality determination.
- the identification information of each peripheral device registered in the peripheral device information 20 is associated with the current information acquisition date, the number of times of existence, and the number of times of absence. If the current information acquisition date is no longer applicable two weeks before the present date, the presence count and non-existence count counted on the current information acquisition date are set as the presence count 22 and the non-exist count of the peripheral device information 20, respectively. 23, it is necessary to perform a subtraction process.
- the peripheral device information 20 of the device that satisfies the certain standard may not be updated thereafter.
- the router 120 of the peripheral device information 20 and the recording / playback device 130 shown in FIG. 5A satisfy the standard, and thereafter the router 120 of the peripheral device information 20
- the record corresponding to the MAC address and the record corresponding to the MAC address of the recording / playback apparatus 130 are not updated.
- the network device retains the content without encrypting it.
- the content is encrypted and retained, and when there is an access request, execution of a decryption algorithm having tamper resistance is performed.
- the content may be decrypted by the functional unit and respond to the access request. As a result, when the power is turned off as an access restriction, decryption becomes impossible and content can be protected more reliably.
- the network device has turned off its own power supply, but does not need to respond to an access request in order to prohibit rewrite and copy.
- the held content may be deleted.
- the threshold value 1 is 80%
- the threshold value 2 is 50%
- the access restriction corresponding to the threshold value 1 is content deletion
- the access restriction corresponding to the threshold value 2 is copy-prohibited.
- the device identified as “abnormal” includes a device with an index value of 90% that exceeds the threshold value 1 as the device identified as the difference
- the content is deleted and determined as “abnormal”.
- the device identified as “1” includes a device that does not exceed the threshold value 1 but exceeds the threshold value 2, for example, a device having an index value of 65% and does not include a device that exceeds the threshold value 1, the copy is prohibited.
- authentication is performed when it is determined as “abnormal” in the abnormality determination, and when the authentication is successful, the peripheral device information of the device specified as a difference at the time of abnormality determination is deleted. If the authentication is successful, the peripheral device information of the device specified as a difference at the time of abnormality determination may be deleted.
- the ARP is used and the MAC address is acquired as the identification information.
- the identification information can uniquely identify the device such as the name given to each device by the user. Any other identification information may be used. Any other acquisition method may be used as long as the protocol can acquire the identification information of each peripheral device.
- the peripheral device information and the threshold value are stored in the flash memory.
- the information is not limited to the nonvolatile memory, and may be stored in a storage medium such as a hard disk.
- the accuracy of the existence rate estimation is improved by repeating the processing from step S205 to step S213. However, only the processing from step S210 to step S211 is repeated, and steps S212 and S213 are repeated. The processing load may be reduced by not performing the processing.
- a threshold is also set for the communication time 32. If the communication time 32 does not exceed the threshold, it may not be determined that “abnormality exists”. Good.
- the communication time is measured when communication is made in response to an access request from the peripheral device to the network device.
- the communication time is measured between the network device and the peripheral device.
- Other communication may be used as long as the communication is between.
- the abnormality determination is performed based on a specific host name that can be understood by a person corresponding to the global IP address of the own device.
- a subnet mask corresponding to the global IP address can be obtained by inquiring a broadband router or the like.
- the global IP address and subnet mask may be used instead of the host name.
- authentication is performed when the abnormality determination result is “abnormal”. However, when the abnormality determination result is “abnormal”, the host name information 40 is authenticated before authentication. Abnormality determination may be performed based on the determination. At this time, when the abnormality determination result is “abnormal”, authentication is performed, and when the abnormality determination result is “no abnormality”, access restriction is not performed. As a result, if the operating environment changes beyond a certain reference range due to equipment failure or replacement, the normal service ISP does not change and authentication is performed. Without using the network device.
- the abnormality determination based on the peripheral device information may not be performed, and only the abnormality determination based on the host name information 40 may be performed. In this case, authentication is performed when the abnormality determination result is “abnormal”, and access restriction is not performed when the abnormality determination result is “no abnormality”.
- Consists of program code for causing the processor of the network device to execute the home server operation (FIGS. 6, 7, 9, 10, 13, and 14) shown in the first to third embodiments.
- the control program can be recorded on a recording medium, or can be distributed and distributed via various communication paths. Examples of such a recording medium include an IC card (Integrated Circuit Card), a hard disk, an optical disc, a flexible disk, and a ROM (Read Only Memory).
- the distributed and distributed control program is used by being stored in a memory or the like that can be read by the processor, and the processor executes the control program to perform the operations shown in the embodiments. Become so.
- the network device shown in FIG. 16 is realized by an integrated circuit (IC, LSI (Large Scale Integration) or the like) mounted and used in the device, not part or all of the functional configuration as a single device. It is good as well.
- IC integrated circuit
- LSI Large Scale Integration
- the network device is a network device for restricting access to predetermined information held by the own device, and is the same as that capable of communicating with the own device.
- An acquisition unit acquisition unit 901 that acquires identification information of each peripheral device by communicating with the peripheral device that is one or more devices existing in the LAN, and each peripheral device from which the identification information is acquired by the acquisition unit
- an index value calculation means index for calculating an index value for estimating the presence rate of the peripheral device, which is an index value used for determining whether to perform the access restriction, based on past communication.
- a difference specifying means (difference specifying means 904) for specifying a difference between the current peripheral device identification information acquired by the stage and the past peripheral device identification information held by the holding means; and the difference specifying means Determination means (determination means 905) for determining whether to perform the access restriction based on the index value of the device specified as Therefore, this network device is used even in locations where radio waves from the base station do not reach, in order to ensure security by making an abnormality determination based on the communication status with surrounding devices and restricting access based on the abnormality determination result. It becomes possible.
- the acquisition unit 901 includes, for example, the acquisition unit 102 and the temporary holding unit 103 according to the first embodiment
- the index value calculation unit 902 includes, for example, the index value calculation unit 104 according to the first embodiment.
- the difference specifying unit 904 is configured by, for example, the difference specifying unit 106 of the first embodiment
- the determining unit 905 is, for example, the determination unit 107 of the first embodiment.
- the condition holding unit 108 is configured.
- the index value calculation means counts the number of times identification information can be acquired for each peripheral device, calculates an index value for each peripheral device by obtaining a ratio to the number of attempts to acquire, and identifies the difference
- the means includes a device having identification information that is included in the identification information of the past peripheral device held by the holding device and is not included in the identification information of the current peripheral device acquired by the acquisition device. Necessary for determining that the access restriction is performed when the difference is specified as the difference, and the determination unit includes a device whose index value is higher than a predetermined threshold among the devices specified as the difference by the difference determination unit. It may be determined as a condition whether or not the access restriction is performed.
- the presence rate of each peripheral device can be estimated, it is possible to restrict access according to the actual usage. For example, when a device with a low presence rate that is connected only when necessary, such as a mobile device, is not in the LAN at the time of startup this time, it is determined as “abnormal” because there is no such device. It becomes possible to prevent this.
- the index value calculation means calculates the number of times of acquisition as the number of times of measurement, and the determination means has an index value higher than a predetermined threshold among the devices identified as differences by the difference identification means. Furthermore, it may be set as a necessary condition for determining that the access restriction is performed, that there is a device whose number of measurement is greater than a predetermined number. As a result, by setting a threshold value for the number of measurements and using it for abnormality determination, a device whose existence probability is high because the number of measurement times is small, for example, a device whose number of measurement times is 1 and the existence probability is 100%. Even if it is not in the LAN at the time of startup this time, it can be determined that there is “abnormal” because there is no corresponding device.
- the acquisition unit acquires identification information of peripheral devices within a predetermined period from the time of activation
- the difference specifying unit is configured to acquire the peripheral devices acquired by the acquisition unit within a predetermined period from the time of activation.
- the identification information of the current peripheral device is identified as the current peripheral device identification information and compared with the past peripheral device identification information acquired up to the time of the current activation held by the holding unit, the difference is specified, An index value is calculated based on communication up to the time of startup this time, and the determination means determines whether or not to perform the access restriction based on the index value of the device specified as the difference after a predetermined period of time has elapsed since startup. It is good also as judging. Thereby, since the presence rate of each peripheral device can be estimated, it is possible to restrict access according to the actual usage.
- the acquisition means may perform the acquisition even after a predetermined period of time has elapsed since the start. As a result, information on peripheral devices is acquired and updated at any time while the network device is in operation, so that it is possible to improve the accuracy of the existence rate estimation.
- the network device further includes control means for restricting access when it is determined by the determination means that access restriction is required, and the control means is the number of devices specified as differences by the difference specifying means.
- One of a plurality of processes related to access restriction may be performed based on the index value. As a result, when it is determined that “there is an abnormality”, the same access restriction is not always performed, but an access restriction according to the index value of the device that has made a difference is possible.
- the difference specifying unit specifies the difference by comparing the identification information of the current peripheral device acquired by the acquisition unit with the identification information of the past peripheral device acquired from a predetermined time to the present. Also good. Thereby, since the index value is calculated based on the recent usage status, it is possible to restrict the access according to the recent usage status.
- the index value calculating means includes a measuring means for measuring the communication time with the own device for each peripheral device, and the accumulated communication time with the own device for each peripheral device is the sum of the accumulated communication times of all the peripheral devices.
- the index value may be calculated by dividing, and the determining unit may determine that access restriction is not performed unless the index value of the device specified as the difference by the difference specifying unit is higher than a predetermined threshold value. Good. Thereby, since the presence rate of each peripheral device can be estimated, it is possible to restrict access according to the actual usage.
- the index value calculating means includes a measuring means for measuring the number of communication with the own device for each peripheral device, and the cumulative communication count with the own device for each peripheral device is the sum of the cumulative communication counts of all the peripheral devices.
- the index value may be calculated by dividing, and the determination unit may determine that access restriction is not performed unless the index value of the device specified as the difference by the difference specifying unit is greater than a predetermined number of times. Good. Thereby, since the presence rate of each peripheral device can be estimated, it is possible to restrict access according to the actual usage.
- the holding unit may not hold the identification information of the current peripheral device that forms the basis of the determination.
- the peripheral device information is not updated based on the peripheral device identification information acquired at the time of starting this time. By repeating, the peripheral device information in the operating environment is saved, and it is prevented that “no abnormality” is determined from a certain point in time.
- the network device when it is determined by the determining means that access restriction is necessary, supplies power to at least a part of the circuit of the own device for accessing predetermined information held by the own device Control means for cutting off supply may be provided. As a result, when it is determined that access restriction is necessary, the power of the own device is turned off, so that it is possible to protect the held content during theft.
- the control means outputs an input request for predetermined authentication information, performs an authentication process based on the input authentication information, and does not shut off the power supply when the authentication is successful. Good.
- access is not restricted when authentication is successful. For example, instead of being stolen, the operating environment is constant due to equipment failure or replacement. Even if it changes to a level exceeding the reference range, it is possible to use the network device by performing authentication.
- the control means includes a detecting means for detecting a host name corresponding to the global IP address of the own device, a common part specifying means for specifying a common part from a plurality of host names detected by the detecting means in the past, Saving means for saving the host name detected by the detecting means and the common part specified by the common part specifying means, a part corresponding to the common part of the current host name detected by the detecting means, and saving by the saving means
- an abnormality determination based on the host name is performed before the authentication process. For example, instead of being stolen, a device failure or replacement When the operating environment has changed to a level exceeding a certain reference range, but the ISP has not changed, the network device can be used without performing authentication.
- Predetermined information held by the network device is encrypted, and when receiving an access request to the predetermined information, decryption means for decrypting the predetermined information and making a request response is provided. It is good. As a result, when the power is turned off due to access restrictions, for example, it is impossible to decrypt the content stored in the hard disk, so that the content can be protected more reliably.
- the network device includes a detecting unit that detects a host name corresponding to a global IP address of the own device, a common unit specifying unit that specifies a common unit from a plurality of host names detected by the detecting unit in the past, Saving means for saving the host name detected by the detecting means and the common part specified by the common part specifying means, a part corresponding to the common part of the current host name detected by the detecting means, and saving by the saving means
- a determination unit that determines whether or not they match, and the determination unit determines whether or not to perform the access restriction based on a result of the determination unit. Also good.
- both the abnormality determination based on the index value for estimating the presence rate and the abnormality determination for determining whether the ISP has been changed based on the host name corresponding to the global IP address of the own device are performed. Therefore, it is possible to determine whether or not to restrict access more reliably.
- the network device according to the present invention can be applied to a home server or the like that holds information to be protected and requires security.
Abstract
Description
以下、実施形態1に係るネットワーク装置100について説明する。
<概要>
図1は、実施形態1に係るネットワーク装置100の通常の動作環境の一例を示す図であり、図2はネットワーク装置100が「異常あり」と判断する動作環境の一例を示す図である。
<構成>
以下、ネットワーク装置100として、家庭内で用いられるホームサーバを例にとり説明する。図1に示すように、ホームサーバ100は、ルータ120のLAN側に接続されている。ルータ120のLAN側には、その他に録画再生装置130、プリンタ140、ディスプレイ150、携帯端末160が接続されている。
<データ>
上述した構成を備えるホームサーバ100が異常判断に使用する現在情報10のデータ構成及び内容例を図4(a)に示す。
<動作>
図6は、実施形態1に係るホームサーバ100の動作を示すフローチャートである。
<実施形態2>
以下、実施形態1に示したホームサーバ100について、存在率推定のための指標値の算出方法を変形した実施形態について説明する。実施形態1では、指標値として存在確率25を用いたが、実施形態2では、ホームサーバ100と周囲機器との累積通信時間を周囲機器情報30(後述)に登録されている全周囲機器の累積通信時間の合計で除算した値である通信時間割合を用いる。
<構成>
ハードウエア構成及び機能構成に関しては、実施形態1で示したホームサーバ100と同様である。指標値算出部104の部分的な変形により、自機と周囲機器との通信時間の計測、及び、通信時間割合の算出を実現する。
<データ>
以下、異常判断に使用する周囲機器情報30について説明する。
<動作>
図9は、実施形態2に係るホームサーバ100の動作を示すフローチャートである。
<実施形態3>
以下、実施形態1に示したホームサーバ100に、自機のグローバルIPアドレスに対応するホスト名に基づく異常判定を行う機能を追加したホームサーバ600について説明する。
<構成>
以下、ホームサーバ600について説明する。
<データ>
以下、上述した構成を備えるホームサーバ600が異常判定に使用するホスト名情報40について説明する。
<動作>
図13は、ホームサーバ600の動作を示すフローチャートである。
上記のように、自機のグローバルIPアドレスに対応するホスト名に基づいて異常判定を行うことで、ホームサーバ600のISPが変更されていないか確認することができ、周囲機器情報20に基づく異常判断と自機のホスト名情報40に基づく異常判定とを行うことにより、ISPは通常頻繁に変更されないと考えられるため、変更があれば盗難の可能性があると推定でき、より確実にコンテンツの保護を行うことが可能となる。
<補足>
以上、本発明に係るネットワーク装置について、実施形態1,2及び3において、ホームサーバを例として説明したが、例示したホームサーバ、つまりネットワーク装置を以下のように変形することも可能であり、本発明は上述の実施形態で示した通りのネットワーク装置に限られないことは勿論である。
101 ネットワークインターフェース
102 取得部
103 一時保持部
104 指標値算出部
105 保持部
106 差違特定部
107、606 判断部
108 条件保持部
109、607 制御部
110 出力部
111 入力部
601 検出部
602 一時保存部
603 共通部特定部
604 保存部
605 判定部
Claims (18)
- 自機の保持している所定の情報へのアクセス制限をするためのネットワーク装置であり、
自機と通信可能な同一LAN(Local Area Network)内に存在する1以上の機器である周囲機器と通信することにより、各周囲機器の識別情報を取得する取得手段と、
前記取得手段により識別情報が取得された周囲機器毎に、前記アクセス制限を行うか否かの判断に用いられる指標値であって、当該周囲機器の存在率を推定するための指標値を、過去の通信に基づいて算出する指標値算出手段と、
周囲機器毎に、過去に前記取得手段により取得した識別情報と前記指標値算出手段により算出した指標値とを保持する保持手段と、
前記取得手段により取得した現在の周囲機器の識別情報と前記保持手段により保持されている過去の周囲機器の識別情報との差違を特定する差違特定手段と、
前記差違特定手段により差違として特定された機器の指標値に基づいて前記アクセス制限を行うか否かを判断する判断手段とを備えることを特徴とするネットワーク装置。 - 前記指標値算出手段は、前記周囲機器毎に識別情報の取得できた回数をカウントし、取得を試みた回数に対する比を求めることで周囲機器毎の指標値を算出し、
前記差違特定手段は、前記保持手段により保持されている過去の周囲機器の識別情報には含まれていて、前記取得手段により取得した現在の周囲機器の識別情報には含まれていない識別情報を有する機器を差違として特定し、
前記判断手段は、前記差違特定手段により差違として特定された機器の中に、指標値が所定の閾値より高い機器があることを、前記アクセス制限を行うと判断するための必要条件とし、前記アクセス制限を行うか否かを判断する
ことを特徴とする請求項1に記載のネットワーク装置。 - 前記指標値算出手段は、取得を試みた回数を計測回数として算出し、
前記判断手段は、前記差違特定手段により差違として特定された機器の中に、指標値が所定の閾値より高く、更に計測回数が所定の回数より多い機器があることを、前記アクセス制限を行うと判断するための必要条件とする
ことを特徴とする請求項2に記載のネットワーク装置。 - 前記取得手段は、起動時から所定の期間内に、周囲機器の識別情報の取得を行い、
前記差違特定手段は、前記取得手段が今回起動時から所定の期間内に取得した周囲機器の識別情報を現在の周囲機器の識別情報として、前記保持手段が保持している今回起動時までに取得した過去の周囲機器の識別情報と比較し差違を特定し、
前記指標値算出手段は、今回起動時までの通信に基づいて指標値を算出し、
前記判断手段は、起動時から所定の期間経過後に、前記差違として特定された機器の指標値に基づいて前記アクセス制限を行うか否かを判断する
ことを特徴とする請求項3に記載のネットワーク装置。 - 前記取得手段は、更に起動時から所定の期間の経過後も前記取得を行う
ことを特徴とする請求項4に記載のネットワーク装置。 - 前記ネットワーク装置は、更に前記判断手段によりアクセス制限が必要と判断された場合にアクセス制限を行う制御手段を備え、
前記制御手段は、前記差違特定手段により差違として特定された機器の数と前記指標値に基づいてアクセス制限に係る複数の処理のうちいずれかを行う
ことを特徴とする請求項4に記載のネットワーク装置。 - 前記差違特定手段は、前記取得手段により取得した現在の周囲機器の識別情報と所定時から現在までに取得した過去の周囲機器の識別情報とを比較することで差違を特定する
ことを特徴とする請求項3に記載のネットワーク装置。 - 前記指標値算出手段は、周囲機器毎に自機との通信時間を計測する計測手段を備え、周囲機器毎の自機との累積通信時間を周囲機器全ての累積通信時間の合計で除算することにより前記指標値を算出し、
前記判断手段は、前記差違特定手段によって差違として特定された機器の指標値が所定の閾値より高くなければ、アクセス制限は行わないと判断する
ことを特徴とする請求項1に記載のネットワーク装置。 - 前記指標値算出手段は、周囲機器毎に自機との通信回数を計測する計測手段を備え、周囲機器毎の自機との累積通信回数を周囲機器全ての累積通信回数の合計で除算することによって前記指標値を算出し、
前記判断手段は、前記差違特定手段によって差違として特定された機器の指標値が所定の回数より多くなければ、アクセス制限は行わないと判断する
ことを特徴とする請求項1に記載のネットワーク装置。 - 前記保持手段は、前記判断手段によりアクセス制限が必要と判断された場合には、当該判断の基礎をなした現在の周囲機器の識別情報を保持しない
ことを特徴とする請求項1に記載のネットワーク装置。 - 前記ネットワーク装置は、前記判断手段によりアクセス制限が必要と判断された場合に、自機の保持している所定の情報へアクセスするための自機の回路の、少なくとも一部への電源供給を断つ制御手段を備える
ことを特徴とする請求項1に記載のネットワーク装置。 - 前記制御手段は、所定の認証情報の入力要求を出力し、入力された認証情報に基づき認証処理を行い、認証に成功した場合には、前記電源供給の遮断を行わない
ことを特徴とする請求項11に記載のネットワーク装置。 - 前記制御手段は、
自機のグローバルIPアドレスに対応するホスト名を検出する検出手段と、
過去に前記検出手段により検出した複数のホスト名から共通部を特定する共通部特定手段と、
前記検出手段により検出したホスト名と前記共通部特定手段により特定した共通部とを保存する保存手段と、
前記検出手段により検出した現在のホスト名の共通部に相当する部分と前記保存手段により保存されている共通部とを比較し、一致するか否か判定する判定手段とを備え、
前記判定手段によって、前記現在のホスト名の共通部に相当する部分と前記保存手段により保存されている共通部とが一致すると判定した場合に、前記入力要求の出力を抑止し、前記電源供給の遮断を行わない
ことを特徴とする請求項12に記載のネットワーク装置。 - 前記ネットワーク装置の保持する所定の情報は暗号化されており、
前記所定の情報へのアクセス要求を受けた場合に、前記所定の情報を復号して要求応答をする復号手段を備える
ことを特徴とする請求項11に記載のネットワーク装置。 - 前記ネットワーク装置は、
自機のグローバルIPアドレスに対応するホスト名を検出する検出手段と、
過去に前記検出手段により検出した複数のホスト名から共通部を特定する共通部特定手段と、
前記検出手段により検出したホスト名と前記共通部特定手段により特定した共通部とを保存する保存手段と、
前記検出手段により検出した現在のホスト名の共通部に相当する部分と前記保存手段により保存されている共通部とを比較し、一致するか否か判定する判定手段とを備え、
前記判断手段は、前記判定手段の結果にも基づいて前記アクセス制限を行うか否かを判断する
ことを特徴とする請求項1に記載のネットワーク装置。 - ネットワーク装置において、当該ネットワーク装置の保持している所定の情報へのアクセス制限を行うか否かを判断するための判断方法であって、
当該ネットワーク装置と通信可能な同一LAN内に存在する1以上の機器である周囲機器と通信することにより、各周囲機器の識別情報を取得する取得ステップと、
前記取得ステップにより識別情報が取得された周囲機器毎に、前記アクセス制限を行うか否かの判断に用いられる指標値であって、当該周囲機器の存在率を推定するための指標値を、過去の通信に基づいて算出する指標値算出ステップと、
周囲機器毎に、過去に前記取得ステップにより取得した識別情報と前記指標値算出ステップにより算出した指標値とを保持する保持ステップと、
前記取得ステップにより取得した現在の周囲機器の識別情報と前記保持ステップにより保持されている過去の周囲機器の識別情報との差違を特定する差違特定ステップと、
前記差違特定ステップにより差違として特定された機器の指標値に基づいて前記アクセス制限を行うか否かを判断する判断ステップとを含むことを特徴とする判断方法。 - プロセッサを有するネットワーク装置において、当該ネットワーク装置の保持している所定の情報へのアクセス制限を行うか否かを判断する判断処理を実行させるためのプログラムであって、
当該ネットワーク装置と通信可能な同一LAN内に存在する1以上の機器である周囲機器と通信することにより、各周囲機器の識別情報を取得する取得ステップと、
前記取得ステップにより識別情報が取得された周囲機器毎に、前記アクセス制限を行うか否かの判断に用いられる指標値であって、当該周囲機器の存在率を推定するための指標値を、過去の通信に基づいて算出する指標値算出ステップと、
周囲機器毎に、過去に前記取得ステップにより取得した識別情報と前記指標値算出ステップにより算出した指標値とを保持する保持ステップと、
前記取得ステップにより取得した現在の周囲機器の識別情報と前記保持ステップにより保持されている過去の周囲機器の識別情報との差違を特定する差違特定ステップと、
前記差違特定ステップにより差違として特定された機器の指標値に基づいて前記アクセス制限を行うか否かを判断する判断ステップとを含むことを特徴とするプログラム。 - ネットワーク装置において、当該ネットワーク装置の保持している所定の情報へのアクセス制限を行うか否かを判断するために使用される集積回路であって、
当該ネットワーク装置と通信可能な同一LAN内に存在する1以上の機器である周囲機器と通信することにより、各周囲機器の識別情報を取得する取得手段と、
前記取得手段により識別情報が取得された周囲機器毎に、前記アクセス制限を行うか否かの判断に用いられる指標値であって、当該周囲機器の存在率を推定するための指標値を、過去の通信に基づいて算出する指標値算出手段と、
周囲機器毎に、過去に前記取得手段により取得した識別情報と前記指標値算出手段により算出した指標値とを保持する保持手段と、
前記取得手段により取得した現在の周囲機器の識別情報と前記保持手段により保持されている過去の周囲機器の識別情報との差違を特定する差違特定手段と、
前記差違特定手段により差違として特定された機器の指標値に基づいて前記アクセス制限を行うか否かを判断する判断手段とを備えることを特徴とする集積回路。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/122,806 US8505072B2 (en) | 2009-08-20 | 2010-08-12 | Network apparatus, assessment method, program, and integrated circuit |
CN201080002951.2A CN102204173B (zh) | 2009-08-20 | 2010-08-12 | 网络装置、判断方法、集成电路 |
JP2011527576A JP5296877B2 (ja) | 2009-08-20 | 2010-08-12 | ネットワーク装置、判断方法、プログラム、集積回路 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009-191116 | 2009-08-20 | ||
JP2009191116 | 2009-08-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011021378A1 true WO2011021378A1 (ja) | 2011-02-24 |
Family
ID=43606838
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2010/005059 WO2011021378A1 (ja) | 2009-08-20 | 2010-08-12 | ネットワーク装置、判断方法、プログラム、集積回路 |
Country Status (4)
Country | Link |
---|---|
US (1) | US8505072B2 (ja) |
JP (1) | JP5296877B2 (ja) |
CN (1) | CN102204173B (ja) |
WO (1) | WO2011021378A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014524211A (ja) * | 2011-12-16 | 2014-09-18 | ゼットティーイー コーポレイション | デジタルリビングネットワークアライアンスの権限制御方法及び装置 |
JP2014191628A (ja) * | 2013-03-27 | 2014-10-06 | Nifty Corp | 通信装置、通信システム、情報処理方法、及びプログラム |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9094091B2 (en) * | 2012-10-11 | 2015-07-28 | Htc Corporation | Method and apparatus for performing hands-free profile control, and associated computer program product |
CN105138933B (zh) * | 2015-09-25 | 2018-07-06 | 联想(北京)有限公司 | 一种电子设备及信息处理方法 |
CN106127088B (zh) * | 2016-06-23 | 2019-12-03 | 北京小米移动软件有限公司 | 智能设备追踪方法及装置 |
US11265722B2 (en) * | 2020-03-19 | 2022-03-01 | Jinan University | Peripheral-free secure pairing protocol by randomly switching power |
WO2022260944A1 (en) * | 2021-06-11 | 2022-12-15 | Arris Enterprises Llc | System and method to operate a radio on several frequency bands |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007181143A (ja) * | 2005-12-28 | 2007-07-12 | Canon Inc | 通信装置及びその制御方法とプログラム |
JP2007219985A (ja) * | 2006-02-20 | 2007-08-30 | Matsushita Electric Ind Co Ltd | サーバー、コントローラ、およびそのプログラム |
JP2009169896A (ja) * | 2008-01-21 | 2009-07-30 | Sharp Corp | サーバ、システム、及びコンテンツ表示制御方法 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AUPM402394A0 (en) * | 1994-02-23 | 1994-03-17 | Monaad Corporation Pty Limited | Security access arrangement |
US5467341A (en) * | 1994-04-14 | 1995-11-14 | Toshiba America Information Systems, Inc. | Apparatus and method for alerting computer users in a wireless LAN of a service area transition |
JP2776763B2 (ja) | 1995-07-13 | 1998-07-16 | 日本電気フィールドサービス株式会社 | 盗難防止装置 |
US5745559A (en) * | 1996-07-24 | 1998-04-28 | Weir; Earline Madsen | Restricted access telephones for logical telephone networks |
JP2931276B2 (ja) * | 1997-09-04 | 1999-08-09 | 豊喜 笹倉 | 機器の使用制限装置 |
US6011473A (en) * | 1998-01-13 | 2000-01-04 | Micron Electronics, Inc. | Method for generating an alarm in a portable computer system |
US6865673B1 (en) * | 2000-03-21 | 2005-03-08 | 3Com Corporation | Method for secure installation of device in packet based communication network |
GB2363504A (en) * | 2000-06-16 | 2001-12-19 | Nokia Mobile Phones Ltd | A mobile phone including a device for preventing loss or theft |
US6614350B1 (en) * | 2000-11-08 | 2003-09-02 | 3Com Corporation | Method and system for effecting a security system upon multiple portable information devices |
GB2377776A (en) * | 2001-07-18 | 2003-01-22 | Wizard Mobile Solutions Ltd | A combination of a portable data storage device and a wireless backup device having an out of range alert |
US20060240806A1 (en) * | 2001-07-18 | 2006-10-26 | Saban Demirbasa | Data security device |
US8032084B2 (en) * | 2001-07-18 | 2011-10-04 | Data Transfer & Communications Limited | Data security device |
US7895360B2 (en) * | 2001-12-12 | 2011-02-22 | Thomson Licensing | Method and apparatus for adaptively configuring a router |
US20050203870A1 (en) * | 2004-03-05 | 2005-09-15 | Ntt Docomo, Inc. | Place management apparatus and place management method |
JP4188924B2 (ja) | 2004-03-05 | 2008-12-03 | 株式会社エヌ・ティ・ティ・ドコモ | 場の管理装置および場の管理方法 |
US8086536B2 (en) | 2004-09-16 | 2011-12-27 | Microsoft Corporation | Location based licensing |
US7810138B2 (en) * | 2005-01-26 | 2010-10-05 | Mcafee, Inc. | Enabling dynamic authentication with different protocols on the same port for a switch |
US7715831B2 (en) * | 2006-03-24 | 2010-05-11 | Sony Ericssson Mobile Communications, Ab | Methods, systems, and devices for detecting and indicating loss of proximity between mobile devices |
-
2010
- 2010-08-12 US US13/122,806 patent/US8505072B2/en not_active Expired - Fee Related
- 2010-08-12 WO PCT/JP2010/005059 patent/WO2011021378A1/ja active Application Filing
- 2010-08-12 CN CN201080002951.2A patent/CN102204173B/zh not_active Expired - Fee Related
- 2010-08-12 JP JP2011527576A patent/JP5296877B2/ja not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007181143A (ja) * | 2005-12-28 | 2007-07-12 | Canon Inc | 通信装置及びその制御方法とプログラム |
JP2007219985A (ja) * | 2006-02-20 | 2007-08-30 | Matsushita Electric Ind Co Ltd | サーバー、コントローラ、およびそのプログラム |
JP2009169896A (ja) * | 2008-01-21 | 2009-07-30 | Sharp Corp | サーバ、システム、及びコンテンツ表示制御方法 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014524211A (ja) * | 2011-12-16 | 2014-09-18 | ゼットティーイー コーポレイション | デジタルリビングネットワークアライアンスの権限制御方法及び装置 |
US9323940B2 (en) | 2011-12-16 | 2016-04-26 | Zte Corporation | Rights control method and apparatus for digital living network alliance |
JP2014191628A (ja) * | 2013-03-27 | 2014-10-06 | Nifty Corp | 通信装置、通信システム、情報処理方法、及びプログラム |
Also Published As
Publication number | Publication date |
---|---|
CN102204173B (zh) | 2014-06-18 |
US8505072B2 (en) | 2013-08-06 |
JPWO2011021378A1 (ja) | 2013-01-17 |
CN102204173A (zh) | 2011-09-28 |
JP5296877B2 (ja) | 2013-09-25 |
US20110197262A1 (en) | 2011-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5296877B2 (ja) | ネットワーク装置、判断方法、プログラム、集積回路 | |
US8832796B2 (en) | Wireless communication terminal, method for protecting data in wireless communication terminal, program for having wireless communication terminal protect data, and recording medium storing the program | |
US11651094B2 (en) | Communication control device, data security system, communication control method, and computer product | |
CN100484159C (zh) | 便携式信息终端和数据保护方法 | |
US9514001B2 (en) | Information processing device, data management method, and storage device | |
US20080289038A1 (en) | Method and apparatus for checking integrity of firmware | |
JP2011040918A (ja) | 無線lanアクセスポイント、無線lan端末、無線lan不正防止システム、方法及びプログラム | |
JP4897813B2 (ja) | データ転送装置 | |
JP5543294B2 (ja) | 通信端末、通信システム及びプログラム | |
US20170264438A1 (en) | Location-locked data | |
JP2008099156A (ja) | 情報漏洩防止システム | |
JP2013084115A (ja) | 判定プログラム及び判定装置 | |
US10235541B2 (en) | System and method for confidential data management | |
JP5120144B2 (ja) | 機密情報管理システム、機密情報管理方法、及びプログラム | |
JP2006059379A (ja) | 情報送信装置、情報送信方法、及びプログラム | |
CN111611577B (zh) | 鉴权方法、装置、系统、电子设备及计算机可读存储介质 | |
JP7395984B2 (ja) | 無線ネットワーク通信装置設定システム | |
JP4713916B2 (ja) | データ保護サービスシステム及びデータ保護方法 | |
JP4765585B2 (ja) | 携帯電話装置及びそれに用いるソフトウェア不正書換え防止方法並びにそのプログラム | |
US20130179950A1 (en) | Network connection apparatus | |
CN117956471A (en) | Wireless access point access method, storage medium and server | |
KR20200130180A (ko) | 감시 장치 및 감시 방법 | |
KR101025162B1 (ko) | 휴대단말의 디지털 저작권 관리 타임 확보 방법 및 장치 | |
JP5011214B2 (ja) | 情報機器管理システム、情報処理装置、及びicカード | |
CN116015885A (zh) | 一种安全防护控制方法、装置及设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080002951.2 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011527576 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13122806 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10809725 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10809725 Country of ref document: EP Kind code of ref document: A1 |