WO2012042633A1 - Machine management system, machine management device and machine management method - Google Patents

Machine management system, machine management device and machine management method Download PDF

Info

Publication number
WO2012042633A1
WO2012042633A1 PCT/JP2010/067049 JP2010067049W WO2012042633A1 WO 2012042633 A1 WO2012042633 A1 WO 2012042633A1 JP 2010067049 W JP2010067049 W JP 2010067049W WO 2012042633 A1 WO2012042633 A1 WO 2012042633A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
machine
common key
machine management
key
Prior art date
Application number
PCT/JP2010/067049
Other languages
French (fr)
Japanese (ja)
Inventor
延之 太田
Original Assignee
株式会社日立製作所
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社日立製作所 filed Critical 株式会社日立製作所
Priority to PCT/JP2010/067049 priority Critical patent/WO2012042633A1/en
Priority to JP2012536079A priority patent/JP5681198B2/en
Publication of WO2012042633A1 publication Critical patent/WO2012042633A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction

Definitions

  • the present invention relates to a machine management system, a machine management apparatus, and a machine management method.
  • the monitoring observation information portal site monitors equipment owner machines via a network, acquires observation information, processes the secondary information based on the observation information, Provide to users of monitoring observation information. Even if the number of machines increases, the existing monitoring observation information users can immediately use the secondary information. On the other hand, even if the number of monitoring observation information users increases, the monitoring observation information users Secondary information of existing machines can be used immediately.
  • the monitoring observation information portal site cannot collect the observation information directly via the network.
  • an arbitrary information collector collects observation information from the machine and transmits it to the monitoring observation information portal site.
  • the information collector browses the observation information at this time.
  • the information collector here also often serves as a person who performs maintenance of the machine using the secondary information, that is, a monitoring observation information user.
  • the present invention provides an information collector who also obtains machine observation information in a state where the information collector cannot view it, while the secondary information processed based on the observation information serves as a user of the observation information.
  • the purpose is to provide a mechanism that can be browsed freely.
  • the machine management system of the present invention is a management target machine that is a management target, an information collection and utilization device that acquires observation information of the management target machine, and uses secondary information generated based on the observation information;
  • a machine management device that generates the secondary information based on the observation information, and the machine management device and the managed machine have a first common key for encrypting and decrypting the observation information.
  • the machine management device and the information collection and utilization device share and store a second common key for encrypting and decrypting the secondary information
  • the managed machine Encrypts the observation information using the first common key
  • the information collection and utilization device receives the input of the encrypted observation information and transmits the received observation information to the machine management device
  • the machine management Uses the first common key to decrypt the transmitted observation information, generates the secondary information based on the decrypted observation information, and uses the second common key
  • the generated secondary information is encrypted, and the encrypted secondary information is transmitted to the information collection and utilization device.
  • the information collection and utilization device uses the second common key, Decoding the transmitted secondary information, and using the decoded secondary information, outputting information used when executing a service for the managed machine .
  • the information collector obtains the machine observation information in a state where it cannot be browsed by itself, while the secondary information processed based on the observation information serves as the user of the observation information. It becomes possible to provide a mechanism that can be viewed freely.
  • FIG. 1 It is a figure for demonstrating the outline of this embodiment. It is a lineblock diagram of the machine management system concerning this embodiment.
  • A is a figure which shows an example of the table for machine owners of the common key database stored in the machine management apparatus based on this embodiment.
  • B is a figure which shows an example of the table for information collection users of the common key database stored in the machine management apparatus based on this embodiment. It is a figure which shows an example of the random number database which concerns on this embodiment. It is a figure which shows an example of the observation information database stored in the machine management apparatus based on this embodiment. It is a figure which shows an example of the public key / private key database which concerns on this embodiment.
  • the parties are a machine manufacturer, a machine owner, and an information collection user.
  • the machine maker is a manufacturer of managed machines.
  • the machine manufacturer delivers the managed machine to the machine owner.
  • a machine owner is a person who owns and uses a managed machine.
  • a “maintenance contract” is signed between the machine owner and the information collection user to the effect that the information collection user maintains the managed machine.
  • the information collection user requests the machine manufacturer to process the secondary information based on the observation information, and performs maintenance of the managed machine using the secondary information.
  • Managed machines are general machines including industrial machines such as machine tools, consumer machines such as personal computers, and the like, and generate observation information indicating the operation state.
  • This observation information includes information that the machine owner or machine manufacturer does not want to be known to the information collection user (for example, confidential information on design, personal information of the machine owner, etc.).
  • the managed machine because, for example, which is installed outdoors, the information collection utilizing device and machine management device shall not connected by a communication line. Or, even if connected, it shall be in an environment where only a very small amount of data can be transmitted and received. Therefore, the transfer of the observation information from the management target machine to the information collection and utilization apparatus is executed by, for example, an operator using a recording medium such as a memory card (details will be described later).
  • the information collection and utilization device collects observation information and transfers it to the machine management device as the first function. At this time, the observation information is encrypted, and security is guaranteed. That is, the information collection and utilization device cannot know the contents of the observation information.
  • the information collection and utilization device receives secondary information from the machine management device and uses the secondary information.
  • the secondary information is, for example, information indicating an abnormality of the management target machine. Using the secondary information includes, for example, displaying information indicating the abnormality of the management target machine and allowing the worker to browse the information. It is. At this time, the information use collection device is not subject to any browsing restrictions on the secondary information.
  • the machine management device receives the observation information from the information collection and utilization device, processes the secondary information based on the observation information, and transmits the secondary information to the information collection and utilization device.
  • the machine management device and the information collection and utilization device are connected by a communication line, and a large amount of data can be delivered.
  • “common key cryptosystem” and “public key cryptosystem” exist as technologies for encryption / decryption of secret data.
  • the key used for encryption and the key used for decryption are the same. These are called “common keys”, and one of the two parties exchanging secret data generates a common key and transmits the common key to the other.
  • a key used for encryption and a key used for decryption are different. However, they are paired and are called “secret key” and “public key”.
  • Secret data is encrypted using one of the “secret key” and “public key”, and the secret data is decrypted using the other.
  • One of the two parties exchanging secret data generates a “secret key” and a “public key”, holds the “secret key” by itself, and transmits the “public key” to the other party.
  • a common key cryptosystem is used between the machine management device and the managed machine for security of observation information.
  • the common key is generated by the machine management apparatus.
  • a common key cryptosystem is also used between the machine management apparatus and the information collection and utilization apparatus for the security of secondary information.
  • the common key is generated by the information collection and utilization device.
  • a public key cryptosystem is used between the machine management device and the information collection and utilization device for the security of the common key itself for encrypting the secondary information.
  • the secret key and the public key are generated by the machine management apparatus. That is, there are three encryption targets: (1) observation information, (2) secondary information, and (3) a common key for encrypting secondary information, and the encryption method is only for (3). Is a “public key cryptosystem” and the others are “common key cryptosystems”.
  • the machine management system 1 includes a machine management device 2, an information collection and utilization device 3, and a management target machine 4.
  • the communication line 5 connects the machine management device 2 and the managed machine 4.
  • the communication line 5 is assumed to be a network such as a satellite communication line or a mobile phone network, which has a small line capacity and a cost for mass data communication. For this reason, communication via the communication line 5 is communication with a small amount of data.
  • the communication line 6 connects the machine management device 2 and the information collection and utilization device 3.
  • the communication line 6 various networks such as a dedicated line, a WAN (Wide Area Network), a power line network, a wireless network, and a public line network can be adopted in addition to the Internet and a LAN (Local Area Network). For this reason, communication via the communication line 6 is communication with a large amount of data.
  • the machine management device 2 is a general computer and includes a central control device 11, a main storage device 12, an auxiliary storage device 13, a communication device 14, an input device 15, and an output device 16. These are connected to each other by a bus.
  • the auxiliary storage device 13 stores a common key database 31, a random number database 32, an observation information database 33, and a public / private key database 34 (detailed later).
  • the A common key generation unit 21, the random number matching unit 22, the A / key decryption unit 23, the secondary information generation unit 24, and the B encryption unit 25 are programs.
  • the central controller 11 reads out each program from the auxiliary storage device 13 and loads it into the main storage device 12, and then the function of each program (detailed later). (This also applies to the information collection and utilization device 3 and the management target machine 4 described later).
  • the information collection and utilization device 3 is a general computer and includes a central control device 41, a main storage device 42, an auxiliary storage device 43, a communication device 44, an input device 45, and an output device 46. These are connected to each other by a bus.
  • the auxiliary storage device 43 stores a common key database 55 (details described later).
  • the B common key generation unit 51, the key encryption unit 52, the B decryption unit 53, and the secondary information utilization unit 54 are programs.
  • the managed machine 4 is a general machine for industrial use and consumer use. However, in the present embodiment, the managed machine 4 refers to a sensor part and a computer part (so-called microcomputer part) that obtain observation information about a mechanical part that performs the original function of such a machine. .
  • the managed machine 4 includes a central control device 61, a main storage device 62, an auxiliary storage device 63, a communication device 64, an input device 65, an output device 66, and a sensor 67. These are connected to each other by a bus.
  • the auxiliary storage device 63 stores an observation information database 74 (details described later).
  • the A encryption unit 71 and the random number generation unit 72 are programs. It should be noted that the words “A” and “B” in the names of programs across the machine management device 2, the information collection and utilization device 3, and the management target machine 4 are “related to observation information” and “secondary information”, respectively. It has the meaning.
  • the machine management device 2 is configured to exist. However, the machine management device 2 may have a configuration divided into a plurality of cases. For example, there may be one or a plurality of apparatuses that store programs and one or a plurality of apparatuses that store a database or the like. The same applies to the information collection and utilization device 3. Only one managed machine 4 is shown in FIG. 2, but there are actually one or a plurality of managed machines 4.
  • the common key database 31 will be described with reference to FIG.
  • the common key database 31 is divided into a machine owner table 35 (FIG. 3A) and an information collection user table 36 (FIG. 3B).
  • the machine ID column 102 in association with the machine owner ID stored in the machine owner ID column 101, the machine ID column 102 has a machine ID, the manufacturing number column 103 has a manufacturing number, and an algorithm column 104. Is the name of the algorithm, and the common key column 105 stores the common key.
  • the machine owner ID in the machine owner ID column 101 is an identifier that uniquely identifies the machine owner.
  • the machine ID in the machine ID column 102 is an identifier that uniquely identifies the type of the management target machine 4.
  • the serial number in the serial number column 103 is a number indicating the order in which the managed machine 4 is manufactured among the same type of managed machines 4.
  • the managed machine 4 is uniquely specified by the combination of the machine ID and the production number.
  • the name of the algorithm in the algorithm column 104 is the name of an algorithm that is an encryption / decryption procedure.
  • the algorithm itself is stored in association with the name of the algorithm in the auxiliary storage device 13 of the machine management device 2 or in an external system.
  • the machine management device 2 can freely specify the algorithm if the name of the algorithm can be specified. It is assumed that it can be used (the same applies to the description of the algorithm below).
  • This algorithm is adopted by the machine manufacturer.
  • the common key in the common key column 105 is a parameter read by the algorithm at the time of encryption / decryption. The common key is generated by the machine manufacturer and is shared by the machine management device 2 and the managed machine 4.
  • the algorithm name is stored in the algorithm field 107 and the common key is stored in the common key field 108 in association with the information collection user ID stored in the information collection user ID field 106.
  • the information collection user ID in the information collection user ID column 106 is an identifier that uniquely identifies the information collection user.
  • the name of the algorithm in the algorithm column 107 is the name of an algorithm that is an encryption / decryption procedure. This algorithm is adopted by the information collecting user.
  • the common key in the common key column 108 is a parameter read by the algorithm at the time of encryption / decryption. The common key is generated by the information collecting user and is shared by the machine management device 2 and the information collecting and using device 3.
  • the random number database 32 will be described with reference to FIG.
  • the machine ID column 112 in association with the machine owner ID stored in the machine owner ID column 111, the machine ID column 112 has a machine ID, the manufacturing number column 113 has a manufacturing number, and the random number column 114 has a random number. Is remembered.
  • the machine owner ID in the machine owner ID column 111 is the same as the machine owner ID in FIG.
  • the machine ID in the machine ID column 112 is the same as the machine ID in FIG.
  • the serial number in the serial number column 113 is the same as the serial number in FIG.
  • the random number in the random number column 114 is a string of numbers generated immediately before the managed machine 4 encrypts the observation information. Individual numbers included in the string of numbers are randomly generated, and it is practically impossible for anyone other than the managed machine 4 to know them by themselves.
  • observation information database 33 The observation information database 33 will be described with reference to FIG.
  • the machine ID field 122 in association with the machine owner ID stored in the machine owner ID field 121, the machine ID field 122 has a machine ID, the production number field 123 has a production number, and the part ID field 124. Shows the part ID, the temperature column 125 stores the temperature, the pressure column 126 stores the pressure, the position column 127 stores the position, and the observation time column 128 stores the observation time.
  • the machine owner ID in the machine owner ID column 121 is the same as the machine owner ID in FIG.
  • the machine ID in the machine ID column 122 is the same as the machine ID in FIG.
  • the serial number in the serial number column 123 is the same as the serial number in FIG.
  • the component in the component ID column 124 is an identifier that uniquely identifies the component of the managed machine 4 in the same managed machine 4.
  • the temperature in the temperature column 125 is a temperature when the parts of the managed machine 4 are observed by the sensor 67 that observes the temperature.
  • the pressure in the pressure column 126 is a pressure when a substance such as a gas in a part of the managed machine 4 is observed by the sensor 67 that observes the pressure.
  • the position in the position column 127 is the latitude and longitude of the place where the managed machine 4 is located.
  • the latitude and longitude are observed by a GPS (Global Positioning System) (not shown).
  • the observation time in the observation time column 128 is the time when the temperature, pressure and position are observed.
  • the public key / private key database 34 will be described with reference to FIG.
  • the public key is stored in the public key column 132 and the secret key is stored in the secret key column 133 in association with the algorithm name stored in the algorithm column 131.
  • the name of the algorithm in the algorithm column 131 is the name of an algorithm that is an encryption / decryption procedure. This algorithm is adopted by the machine manufacturer.
  • the public key in the public key column 132 is a parameter read by the algorithm at the time of encryption / decryption.
  • the public key is generated by the machine maker and is transmitted to the information collection and utilization apparatus 3.
  • the secret key in the secret key column 133 is a parameter read by the algorithm at the time of encryption / decryption.
  • the secret key is generated by the machine manufacturer and is not disclosed to others.
  • the public health and the secret health are paired.
  • the data (the common key for security of the secondary information itself) is encrypted using the public key, and the secret key is used to encrypt the data. Data is decrypted.
  • the observation information database 74 will be described with reference to FIG. While the observation information database 33 described in FIG. 5 is stored in the machine management apparatus 2, the observation information database 74 is stored in the managed machine 4.
  • the configuration of the observation information database 74 is the same as the configuration of the observation information database 33 except that there is no column corresponding to the machine owner ID column 121 in FIG. That is, the description of the column 122 to the column 128 of FIG. 5 is applied as it is to the column 141 to the column 147 of FIG.
  • the common key database 55 will be described with reference to FIG.
  • the common key database 31 described in FIG. 3 is stored in the machine management apparatus 2, whereas the common key database 55 is stored in the information collection and utilization apparatus 3.
  • the configuration of the common key database 55 does not have the configuration of the machine owner table 35 shown in FIG.
  • the algorithm name 152 is stored in the algorithm column 152 and the common key is stored in the common key column 153 in association with the machine manufacturer ID stored in the machine manufacturer ID column 151.
  • the machine maker ID in the machine maker ID column 151 is an identifier that uniquely identifies the machine maker.
  • the name of the algorithm in the algorithm column 152 is the name of the algorithm that is the procedure of encryption / decryption.
  • the common key in the common key column 153 is a parameter read by the algorithm at the time of encryption / decryption.
  • the common key is generated by the information collecting user and is shared by the machine management device 2 and the information collecting and using device 3.
  • Outline of processing procedure There are the following three processing procedures. That is, (1) for the security of observation information, the machine management device 2 generates a common key shared with the managed machine 4 (see FIG. 9), (2) the security of secondary information Therefore, the information collection and utilization device 3 generates a common key shared with the machine management device 2, and the machine management device 2 attaches a public key for encrypting the common key itself to the information collection and utilization device. And (3) the information collection and utilization device 3 acquires observation information from the managed machine 4, and the information collection and utilization device 3 obtains the observation information from the machine management device 2 And the machine management device 2 processes the secondary information based on the observation information and transmits the processed secondary information to the information collection and utilization device 3, and the information collection and utilization device 3 uses the secondary information (FIG. 3). 11). In order to execute the third processing procedure, it is assumed that the first processing procedure and the second processing procedure have been completed.
  • the first processing procedure will be described with reference to FIG.
  • the first processing procedure is executed only once when the machine manufacturer delivers the managed machine 4 to the machine owner.
  • the A common key generation unit 21 of the machine management device 2 generates a common key.
  • the A common key generation unit 21 first accepts that the machine owner ID, the machine ID, and the manufacturing number are input via the input device 15.
  • an algorithm to be adopted is determined and a common key is generated.
  • a new record of the machine owner table 35 (FIG. 3A) of the common key database 31 is created, and a machine owner ID column 101, a machine ID column 102, a production number column 103, and an algorithm column 104 are created.
  • the common key column 105 the received machine owner ID, machine ID, serial number, determined algorithm name, and generated common key are stored.
  • step S202 the A common key generation unit 21 stores the common key in the managed machine 4. Specifically, the A common key generation unit 21 stores the name of the algorithm determined in step S201 and the common key generated in step S201 in the managed machine 4. At the time of the storage, it is assumed that the communication device 14 of the machine management device 2 and the communication device 64 of the managed machine 4 are directly connected (by a cable or the like).
  • step S203 the A encryption unit 71 of the managed machine 4 stores the common key. Specifically, the A encryption unit 71 stores the name of the algorithm and the common key stored in step S202 in the auxiliary storage device 63. Thereafter, the first processing procedure is terminated.
  • the second processing procedure will be described with reference to FIG.
  • the second processing procedure is performed once when the information collection user signs a “maintenance contract” with the machine owner and the machine manufacturer of the machine 4 to be managed by the machine owner is new to the information collection user. Only executed.
  • step S301 the B common key generation unit 51 of the information collection and utilization device 3 generates a common key.
  • the B common key generation unit 51 first accepts that the machine manufacturer ID is input via the input device 45. Second, an algorithm to be adopted is determined and a common key is generated. Third, a new record is created in the common key database 55 (FIG. 8), and the machine maker ID column 151, the algorithm column 152, and the common key column 153 are respectively received the machine maker ID, the name of the determined algorithm, and Store the generated common key.
  • step S302 the key encryption unit 52 of the information collection and utilization device 3 requests the public key of the machine manufacturer. Specifically, the key encryption unit 52 transmits a signal requesting a public key to the machine management device 2. The key encryption unit 52 may send the name of a specific algorithm to the signal. The transmission is performed via the communication line 6.
  • step S303 the A / key decryption unit 23 of the machine management device 2 transmits the public key. Specifically, the A / key decryption unit 23 first obtains the public key and algorithm name from an arbitrary record in the public key / private key database 34 (FIG. 6). If the name of a specific algorithm is transmitted in step S302, the public key / private key database 34 is searched using the name of the algorithm as a search key, and the public key of the corresponding record is acquired. The machine management apparatus 2 accepts that the machine maker inputs the algorithm name, public key, and secret key via the input device 15 in advance, and sets a record in the public key / secret key database 34. Secondly, the name of the algorithm used as (or acquired) the search key and the acquired public key are transmitted to the information collection and utilization apparatus 3. The transmission is performed via the communication line 6.
  • step S304 the key encryption unit 52 of the information collection and utilization device 3 receives the public key. Specifically, the key encryption unit 52 receives the algorithm name and the public key transmitted in step S303.
  • step S305 the key encryption unit 52 encrypts the common key. Specifically, the key encryption unit 52 first acquires the algorithm name and the common key stored in step S301 from the common key database 55 (FIG. 8). Second, using the algorithm corresponding to the algorithm name received in step S304 and the public key received in step S304, the algorithm name and common key acquired in “first” of step S305 are encrypted. To do.
  • step S306 the key encryption unit 52 transmits the common key. Specifically, the key encryption unit 52 transmits the algorithm name and the common key encrypted in step S305 to the machine management apparatus 2 together with the information collection user ID. The transmission is performed via the communication line 6.
  • step S307 the A / key decryption unit 23 of the machine management device 2 receives the common key. Specifically, the A / key decryption unit 23 receives the algorithm name and the common key transmitted in step S306 together with the information collection user ID.
  • step S308 the A / key decryption unit 23 of the machine management device 2 decrypts the common key. Specifically, first, the A / key decryption unit 23 obtains the secret key of the record including the public key acquired in “first” in step S303 from the public key / private key database 34 (FIG. 6). get. Second, the algorithm name and the common key received in step S307 are decrypted using the acquired secret key. Third, a new record of the information collection user table 36 (FIG. 3B) of the common key database 31 is created, and the information collection user ID column 106, the algorithm column 107, and the common key column 108 are respectively stored. The information collection user ID, the name of the decrypted algorithm and the common key are stored. Thereafter, the second processing procedure is terminated.
  • the third processing procedure is executed at a timing determined by the information collection user. For example, it is executed each time an information collection user (a worker) goes to the site where the managed machine 4 is installed and collects observation information.
  • step S401 the random number generation unit 72 of the managed machine 4 generates a random number. Specifically, the random number generation unit 72 first generates a random number. Secondly, the machine ID and the production number stored in advance in the auxiliary storage device 63 at the time of production of the managed machine 4 are acquired. Third, it transmits random number generated, the acquired machine ID and serial number, without encrypting the machine management device 2 with mechanical holders ID. The transmission is performed via the communication line 5 (communication capacity is small).
  • the random number matching unit 22 of the machine management device 2 receives a random number. Specifically, the random number matching unit 22 first receives the random number, the machine ID, the manufacturing number, and the machine owner ID transmitted in step S401. Secondly, a new record of the random number database 32 (FIG. 4) is created, and the received machine owner ID, machine ID field 111, machine ID field 112, serial number field 113, and random number field 114 are respectively received. Machine ID, serial number and random number are stored.
  • step S403 the A encryption unit 71 of the managed machine 4 encrypts the observation information.
  • the A encryption unit 71 firstly has a machine ID, serial number, part ID, temperature, pressure, position, and observation time stored in all records of the observation information database 74 (FIG. 7).
  • the collected information is collectively referred to as “observation information”).
  • the algorithm name and the common key stored in step S203 are acquired from the auxiliary storage device 63.
  • the observation information acquired in “first” in step S403 and the random number generated in “first” in step S401 are the algorithm and step corresponding to the name of the algorithm acquired in “second” in step S403. Encryption is performed using the common key acquired in “second” in S403.
  • the encrypted observation information and random numbers are output via the communication device 64 to a recording medium such as a memory card.
  • the recording medium is manually removed from the managed machine 4 by an information collection user (operator) and transported to the information collection and utilization apparatus 3.
  • the observation information (in plain text) that is the object of encryption is deleted.
  • step S404 the secondary information utilization unit 54 of the information collection and utilization device 3 acquires and transmits observation information. Specifically, the secondary information utilization unit 54 first accepts that the information collection user (the worker) inputs the recording medium via the communication device 44 (broken line in FIG. 2). Second, the secondary information utilization unit 54 reads the observation information and the random number that are encrypted from the recording medium. Then, the information collection user ID, the read observation information, and the random number are transmitted to the machine management device 2. The transmission is performed via the communication line 6. At this time, the information collection and utilization apparatus 3 cannot know the contents of observation information and the contents of random numbers.
  • step S405 the A / key decryption unit 23 of the machine management device 2 decrypts the observation information. Specifically, first, the A / key decryption unit 23 receives the information collection user ID, the encrypted observation information, and the random number transmitted in “second” in step S404. Second, in the “second” in step S402, the machine owner ID, machine ID, serial number and random number stored in the new record of the random number database 32 (FIG. 4) are acquired (these are encrypted). Absent). Third, the machine owner table 35 (FIG. 3A) of the common key database 31 is searched using the machine owner ID, machine ID, and manufacturing number acquired in “second” in step S405 as search keys. The algorithm name and common key of the corresponding record are acquired.
  • step S405 decodes the observation information and the random number received.
  • step S405 compares the random number decrypted, the random number acquired in the "second" in step S405, to ensure that they match. If the two match, it can be determined that the encrypted observation information and random number have been acquired through the correct route. If they do not match, for example, there is a possibility that the worker had entered into the communication device 44 erroneously recording medium for another managed machine 4. In this case, the A / key decryption unit 23 displays an error message on the output device 16 and the output device 46, and ends the third processing procedure.
  • records of the observation information database 33 (FIG.
  • step S405 are newly created for the number of records included in the received observation information, and the decoded observation information is stored in the machine ID column 122 to the observation information column 128.
  • the machine owner ID acquired in the “second” in step S405 is stored in the machine owner ID column 121.
  • step S406 the secondary information generation unit 24 of the machine management device 2 generates secondary information.
  • the secondary information generation unit 24 first reads, for example, the records created in “Sixth” in step S405 of the records in FIG. Produce information that forms the basis for graphing changes. (For the graph, see FIG. 12 (a). Detailed description below).
  • the observation times of the four records are all the same. However, this is merely an example, and when there are a plurality of records having a plurality of observation times for a specific part, it is assumed that the temperature change of the part is known in time series.
  • an observation time, a machine owner ID, a machine ID, and a production number of a record whose temperature exceeds a predetermined threshold for the first time are acquired.
  • surface like FIG.12 (b) is produced
  • Information that is the basis of such graphs and tables (FIGS. 12A and 12B) is secondary information.
  • the specific content of the secondary information is not limited to this example.
  • a temperature increase rate per unit time is calculated based on a plurality of observation times and a difference of “temperature” corresponding to these observation times, and it is detected that the temperature increase rate exceeds a predetermined threshold. Also good.
  • the temperature is described as an example, but “temperature” may be replaced with “pressure”.
  • the secondary information may be anything that can be processed based on the observation information.
  • step S407 the B encryption unit 25 of the machine management device 2 encrypts the secondary information.
  • the B encryption unit 25 firstly uses the information collection user ID received in “first” of step S405 as a search key, and the information collection user table 36 ( 3B) is searched, and the algorithm name and common key of the corresponding record are acquired.
  • the secondary information generated in step S406 is encrypted using the algorithm and the common key corresponding to the algorithm name acquired in “first” in step S407.
  • the machine maker ID and the encrypted secondary information are transmitted to the information collection and utilization device 3. The transmission is performed via the communication line 6.
  • step S408 the B decoding unit 53 of the information collection and utilization device 3 decodes the secondary information. Specifically, the B decrypting unit 53 first receives the machine manufacturer ID and the encrypted secondary information transmitted in “third” in step S407. Second, the common key database 55 (FIG. 8) is searched using the received machine manufacturer ID as a search key, and the algorithm name and common key of the corresponding record are acquired. Third, the received secondary information is decrypted using the algorithm and the common key corresponding to the name of the algorithm acquired in “second” in step S408.
  • the secondary information utilization unit 54 of the information collection and utilization device 3 utilizes the secondary information. Specifically, the secondary information utilization unit 54 processes a graph or a table based on the decrypted secondary information and displays it on the output device 46.
  • FIG. 12A is an example of the graph.
  • the horizontal axis of the graph is the date and time (observation time).
  • the vertical axis of the graph represents the degree of abnormality (for example, temperature).
  • a broken line 161 is a predetermined temperature threshold.
  • FIG. 12B is an example of the table.
  • the secondary information utilization unit 54 sets the observation time, machine owner ID, machine ID, and manufacturing number acquired in “second” in step S406 to the abnormality detection date / time column 171, the machine owner ID column 172, and the machine ID column, respectively. 173 and the serial number column 174.
  • the observation time in the abnormality detection date / time column 171 corresponds to the observation time indicated by “abnormality detection” in FIG.
  • step S410 the managed machine 4 sends and receives services.
  • an information collection user who visually recognizes the graph or table displayed in step S 409 performs an optimal service for the management target machine 4. Accept. For example, when the graph indicates a temperature abnormality, a service such as checking the parts of the cooling system is accepted.
  • information gathering user worker accepts the return the recording medium such as a detached memory card in step S403. Thereafter, the third processing procedure is terminated.
  • the present invention is not limited to the above-described embodiment, and can be modified without departing from the gist of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Storage Device Security (AREA)

Abstract

A machine management system of the present invention comprises: a machine to be managed; an information collection and utilization device which acquires observation information of the machine to be managed, and uses a secondary information generated on the basis of the observation information; and a machine management device which generates secondary information from the observation information. Given that a shared key used for encrypting and decrypting the observation information is shared between the machine management device and the machine to be managed, the information collection and utilization device may acquire the observation information but may not know the content thereof. The machine management device generates secondary information based on the observation information acquired through the information collection and utilization device, and transmits the secondary information to the information collection and utilization device. Given that a shared key used for encrypting and decrypting the secondary information is shared between the machine management device and the information collection and utilization device, the information collection and utilization device may browse the content of the second information.

Description

機械管理システム、機械管理装置及び機械管理方法Machine management system, machine management apparatus, and machine management method
 本発明は、機械管理システム、機械管理装置及び機械管理方法に関する。 The present invention relates to a machine management system, a machine management apparatus, and a machine management method.
 近年、ネットワーク技術の発展により、遠隔地に所在する機械の状態を遠隔監視することが可能になっている。さらに、遠隔監視により観測された観測情報を基にして、観測情報よりも使用価値の高い二次情報を加工することも可能である。例えば、特許文献1においては、監視観測情報ポータルサイトは、設備保有者の機械をネットワーク経由で監視し、観測情報を取得し、観測情報を基に二次情報に加工し、二次情報を、監視観測情報利用者に提供する。機械が新たに増えても、その二次情報を既存の監視観測情報利用者が即座に利用可能であり、一方、新たに監視観測情報利用者が増えても、その監視観測情報利用者は、既存の機械の二次情報を即座に利用することができる。 In recent years, with the development of network technology, it is possible to remotely monitor the state of machines located in remote locations. Furthermore, it is possible to process secondary information having a higher use value than the observation information based on the observation information observed by remote monitoring. For example, in Patent Document 1, the monitoring observation information portal site monitors equipment owner machines via a network, acquires observation information, processes the secondary information based on the observation information, Provide to users of monitoring observation information. Even if the number of machines increases, the existing monitoring observation information users can immediately use the secondary information. On the other hand, even if the number of monitoring observation information users increases, the monitoring observation information users Secondary information of existing machines can be used immediately.
特開2003-22332号公報JP 2003-22332 A
 特許文献1の技術においては、例えば機械が屋外に設置されている等、機械がネットワークに接続できない状況にある場合、監視観測情報ポータルサイトが直接ネットワーク経由で観測情報を収集することができない。このとき、任意の情報収集者に、観測情報を機械から収集して監視観測情報ポータルサイトに送信させることになる。しかしながら、この際に情報収集者が観測情報を閲覧してしまうことになる。そして、ここでいう情報収集者は、二次情報を用いて機械の保守を行う者、すなわち、監視観測情報利用者を兼ねることが多い。 In the technique of Patent Document 1, when the machine cannot be connected to the network, for example, when the machine is installed outdoors, the monitoring observation information portal site cannot collect the observation information directly via the network. At this time, an arbitrary information collector collects observation information from the machine and transmits it to the monitoring observation information portal site. However, the information collector browses the observation information at this time. The information collector here also often serves as a person who performs maintenance of the machine using the secondary information, that is, a monitoring observation information user.
 そこで、本発明は、情報収集者が、自らは閲覧できない状態で機械の観測情報を取得する一方で、観測情報を基に加工された二次情報を、観測情報の利用者を兼ねる情報収集者が自由に閲覧できる仕組みを提供することを目的とする。 Therefore, the present invention provides an information collector who also obtains machine observation information in a state where the information collector cannot view it, while the secondary information processed based on the observation information serves as a user of the observation information. The purpose is to provide a mechanism that can be browsed freely.
 本発明の機械管理システムは、管理の対象である管理対象機械と、前記管理対象機械の観測情報を取得し、前記観測情報に基づいて生成される二次情報を使用する情報収集利用装置と、前記観測情報に基づいて前記二次情報を生成する機械管理装置と、を有し、前記機械管理装置及び前記管理対象機械は、前記観測情報を暗号化し復号化するための第1の共通鍵を共有して記憶しており、前記機械管理装置及び前記情報収集利用装置は、前記二次情報を暗号化し復号化するための第2の共通鍵を共有して記憶しており、前記管理対象機械は、前記第1の共通鍵を使用して前記観測情報を暗号化し、前記情報収集利用装置は、前記暗号化された観測情報の入力を受け付け、前記受け付けた観測情報を前記機械管理装置に送信し、前記機械管理装置は、前記第1の共通鍵を使用して、前記送信された観測情報を復号化し、前記復号化された観測情報に基づいて前記二次情報を生成し、前記第2の共通鍵を使用して、前記生成された二次情報を暗号化し、前記暗号化された二次情報を前記情報収集利用装置に送信し、前記情報収集利用装置は、前記第2の共通鍵を使用して、前記送信された二次情報を復号化し、前記復号化された二次情報を使用して、前記管理対象機械に対してサービスを実行する際に使用される情報を出力すること、を特徴とする。 The machine management system of the present invention is a management target machine that is a management target, an information collection and utilization device that acquires observation information of the management target machine, and uses secondary information generated based on the observation information; A machine management device that generates the secondary information based on the observation information, and the machine management device and the managed machine have a first common key for encrypting and decrypting the observation information. The machine management device and the information collection and utilization device share and store a second common key for encrypting and decrypting the secondary information, and the managed machine Encrypts the observation information using the first common key, and the information collection and utilization device receives the input of the encrypted observation information and transmits the received observation information to the machine management device And the machine management Uses the first common key to decrypt the transmitted observation information, generates the secondary information based on the decrypted observation information, and uses the second common key Then, the generated secondary information is encrypted, and the encrypted secondary information is transmitted to the information collection and utilization device. The information collection and utilization device uses the second common key, Decoding the transmitted secondary information, and using the decoded secondary information, outputting information used when executing a service for the managed machine .
 本発明によれば、情報収集者が、自らは閲覧できない状態で機械の観測情報を取得する一方で、観測情報を基に加工された二次情報を、観測情報の利用者を兼ねる情報収集者が自由に閲覧できる仕組みを提供することが可能になる。 According to the present invention, the information collector obtains the machine observation information in a state where it cannot be browsed by itself, while the secondary information processed based on the observation information serves as the user of the observation information. It becomes possible to provide a mechanism that can be viewed freely.
本実施形態の概略を説明するための図である。It is a figure for demonstrating the outline of this embodiment. 本実施形態に係る機械管理システムの構成図である。It is a lineblock diagram of the machine management system concerning this embodiment. (a)は、本実施形態に係る、機械管理装置に格納される共通鍵データベースの機械保有者用テーブルの一例を示す図である。(b)は、本実施形態に係る、機械管理装置に格納される共通鍵データベースの情報収集利用者用テーブルの一例を示す図である。(A) is a figure which shows an example of the table for machine owners of the common key database stored in the machine management apparatus based on this embodiment. (B) is a figure which shows an example of the table for information collection users of the common key database stored in the machine management apparatus based on this embodiment. 本実施形態に係る乱数データベースの一例を示す図である。It is a figure which shows an example of the random number database which concerns on this embodiment. 本実施形態に係る、機械管理装置に格納される観測情報データベースの一例を示す図である。It is a figure which shows an example of the observation information database stored in the machine management apparatus based on this embodiment. 本実施形態に係る公開鍵・秘密鍵データベースの一例を示す図である。It is a figure which shows an example of the public key / private key database which concerns on this embodiment. 本実施形態に係る、管理対象機械に格納される観測情報データベースの一例を示す図である。It is a figure which shows an example of the observation information database stored in the management object machine based on this embodiment. 本実施形態に係る、情報収集利用装置に格納される共通鍵データベースの一例を示す図である。It is a figure which shows an example of the common key database stored in the information collection utilization apparatus based on this embodiment. 本実施形態に係る第1の処理手順のフローチャートである。It is a flowchart of the 1st processing procedure concerning this embodiment. 本実施形態に係る第2の処理手順のフローチャートである。It is a flowchart of the 2nd processing procedure which concerns on this embodiment. 本実施形態に係る第3の処理手順のフローチャートである。It is a flowchart of the 3rd process sequence which concerns on this embodiment. (a)は、本実施形態に係る、二次情報を基に作成されたグラフの一例を示す図である。(b)は、本実施形態に係る、二次情報を基に作成された表の一例を示す図である。(A) is a figure which shows an example of the graph produced based on secondary information based on this embodiment. (B) is a figure which shows an example of the table | surface created based on secondary information based on this embodiment.
 以降、本発明を実施するための形態(「本実施形態」という)を、図等を参照しながら詳細に説明する。 Hereinafter, a mode for carrying out the present invention (referred to as “the present embodiment”) will be described in detail with reference to the drawings.
(本実施形態の概略)
 図1に沿って、本実施形態の概略を説明する。まず、機械管理システム1の運用に関連する当事者について説明する。当事者は、機械メーカ、機械保有者及び情報収集利用者の三者である。
 機械メーカは、管理対象機械の製造者である。機械メーカは、管理対象機械を機械保有者に納入する。機械保有者は、管理対象機械を保有し、使用する者である。機械保有者と情報収集利用者との間には、情報収集利用者が管理対象機械を保守する旨の「保守契約」が締結されている。情報収集利用者は、観測情報を基に二次情報を加工することを機械メーカに対して依頼し、二次情報を使用して管理対象機械の保守を実行する。
(Outline of this embodiment)
The outline of this embodiment is demonstrated along FIG. First, the parties related to the operation of the machine management system 1 will be described. The parties are a machine manufacturer, a machine owner, and an information collection user.
The machine maker is a manufacturer of managed machines. The machine manufacturer delivers the managed machine to the machine owner. A machine owner is a person who owns and uses a managed machine. A “maintenance contract” is signed between the machine owner and the information collection user to the effect that the information collection user maintains the managed machine. The information collection user requests the machine manufacturer to process the secondary information based on the observation information, and performs maintenance of the managed machine using the secondary information.
 機械メーカ、機械保有者及び情報収集利用者のもとには、それぞれ、機械管理装置、管理対象機械及び情報収集利用装置が存在する。
 管理対象機械は、工作機械などの産業用機械、パソコンなどの民生用機械等を含む機械一般であり、その運転状態である観測情報を生成する。この観測情報には、機械保有者又は機械メーカにとって情報収集利用者には知られたくない情報(例えば、設計上の秘密情報、機械保有者の個人情報等)が含まれている。そして、本実施形態においては、管理対象機械は、屋外に設置されている等の理由により、情報収集利用装置及び機械管理装置とは通信回線によって接続されていないものとする。又は、接続されているとしても、極めて少量のデータしか送受信できない環境におかれているものとする。よって、管理対象機械から情報収集利用装置への観測情報の引き渡しは、例えば作業員がメモリーカードのような記録媒体を使用することによって実行される(詳細後記)。
Under a machine manufacturer, a machine owner, and an information collection user, there are a machine management device, a managed machine, and an information collection and utilization device, respectively.
Managed machines are general machines including industrial machines such as machine tools, consumer machines such as personal computers, and the like, and generate observation information indicating the operation state. This observation information includes information that the machine owner or machine manufacturer does not want to be known to the information collection user (for example, confidential information on design, personal information of the machine owner, etc.). Then, in this embodiment, the managed machine, because, for example, which is installed outdoors, the information collection utilizing device and machine management device shall not connected by a communication line. Or, even if connected, it shall be in an environment where only a very small amount of data can be transmitted and received. Therefore, the transfer of the observation information from the management target machine to the information collection and utilization apparatus is executed by, for example, an operator using a recording medium such as a memory card (details will be described later).
 情報収集利用装置は、第1の機能として、観測情報を収集したうえで機械管理装置に対して転送する。この際、観測情報は暗号化されており、セキュリティが保証されている。つまり、情報収集利用装置は、観測情報の内容を知り得ない。情報収集利用装置は、第2の機能として、機械管理装置から二次情報を受信し、その二次情報を利用する。二次情報とは、例えば、管理対象機械の異常を示す情報であり、その二次情報を利用するとは、例えば、管理対象機械の異常を示す情報を表示して、作業員に閲覧させること等である。この際、情報利用収集装置は、二次情報について、なんら閲覧制限を受けることはない。 The information collection and utilization device collects observation information and transfers it to the machine management device as the first function. At this time, the observation information is encrypted, and security is guaranteed. That is, the information collection and utilization device cannot know the contents of the observation information. As a second function, the information collection and utilization device receives secondary information from the machine management device and uses the secondary information. The secondary information is, for example, information indicating an abnormality of the management target machine. Using the secondary information includes, for example, displaying information indicating the abnormality of the management target machine and allowing the worker to browse the information. It is. At this time, the information use collection device is not subject to any browsing restrictions on the secondary information.
 機械管理装置は、情報収集利用装置から観測情報を受信し、観測情報を基に二次情報を加工し、二次情報を情報収集利用装置に送信する。機械管理装置及び情報収集利用装置は通信回線によって接続されており、大量のデータの引き渡しが可能である。 The machine management device receives the observation information from the information collection and utilization device, processes the secondary information based on the observation information, and transmits the secondary information to the information collection and utilization device. The machine management device and the information collection and utilization device are connected by a communication line, and a large amount of data can be delivered.
(暗号方式について)
 周知のように、秘密データの暗号化・復号化の技術として、「共通鍵暗号方式」及び「公開鍵暗号方式」が存在する。共通鍵暗号方式では、暗号化に使用される鍵と、復号化に使用される鍵とは同一のものである。そしてこれらは「共通鍵」と呼ばれ、秘密データを交換する2の当事者の一方が共通鍵を生成し、他方に対して共通鍵を送信しておく。公開鍵暗号方式では、暗号化に使用される鍵と、復号化に使用される鍵とは別のものである。しかしながら、これらはペアになっており、「秘密鍵」及び「公開鍵」と呼ばれる。「秘密鍵」及び「公開鍵」のうちのいずれか一方を使用して秘密データが暗号化され、他方を使用して秘密データが複号化される。秘密データを交換する2の当事者の一方が「秘密鍵」及び「公開鍵」を生成し、「秘密鍵」を自らが保持し、「公開鍵」を当事者の他方に送信しておく。
(About encryption method)
As is well known, “common key cryptosystem” and “public key cryptosystem” exist as technologies for encryption / decryption of secret data. In the common key cryptosystem, the key used for encryption and the key used for decryption are the same. These are called “common keys”, and one of the two parties exchanging secret data generates a common key and transmits the common key to the other. In the public key cryptosystem, a key used for encryption and a key used for decryption are different. However, they are paired and are called “secret key” and “public key”. Secret data is encrypted using one of the “secret key” and “public key”, and the secret data is decrypted using the other. One of the two parties exchanging secret data generates a “secret key” and a “public key”, holds the “secret key” by itself, and transmits the “public key” to the other party.
 本実施形態においては、機械管理装置及び管理対象機械の間では、観測情報のセキュリティのために、共通鍵暗号方式が使用される。当該共通鍵は、機械管理装置によって生成されたものである。機械管理装置及び情報収集利用装置の間でもまた、二次情報のセキュリティのために、共通鍵暗号方式が使用される。当該共通鍵は、情報収集利用装置によって生成されたものである。さらに、機械管理装置及び情報収集利用装置の間では、二次情報を暗号化する共通鍵自身のセキュリティのために、公開鍵暗号方式が使用される。秘密鍵及び公開鍵は、機械管理装置によって生成されたものである。
 すなわち、暗号化の対象は、(1)観測情報、(2)二次情報、及び(3)二次情報を暗号化する共通鍵の3つであり、暗号化方式は、(3)についてのみが「公開鍵暗号方式」であり、他については、「共通鍵暗号方式」である。
In this embodiment, a common key cryptosystem is used between the machine management device and the managed machine for security of observation information. The common key is generated by the machine management apparatus. A common key cryptosystem is also used between the machine management apparatus and the information collection and utilization apparatus for the security of secondary information. The common key is generated by the information collection and utilization device. Further, a public key cryptosystem is used between the machine management device and the information collection and utilization device for the security of the common key itself for encrypting the secondary information. The secret key and the public key are generated by the machine management apparatus.
That is, there are three encryption targets: (1) observation information, (2) secondary information, and (3) a common key for encrypting secondary information, and the encryption method is only for (3). Is a “public key cryptosystem” and the others are “common key cryptosystems”.
(機械管理システム)
 図2に沿って、機械管理システム1の構成を説明する。機械管理システム1は、機械管理装置2、情報収集利用装置3及び管理対象機械4を有する。通信回線5は、機械管理装置2と管理対象機械4を接続する。通信回線5としては、衛星通信回線や携帯電話網等、回線容量が小さく大量データ通信にはコストがかかるネットワークを想定する。このため、通信回線5を介する通信は、小さなデータ量の通信となる。
 通信回線6は、機械管理装置2と情報収集利用装置3を接続する。通信回線6としては、インターネットやLAN(Local Area Network)の他、専用回線、WAN(Wide Area Network)、電灯線ネットワーク、無線ネットワーク、公衆回線網など様々なネットワークを採用することができる。このため、通信回線6を介する通信は、大きなデータ量の通信となる。
(Machine management system)
The configuration of the machine management system 1 will be described with reference to FIG. The machine management system 1 includes a machine management device 2, an information collection and utilization device 3, and a management target machine 4. The communication line 5 connects the machine management device 2 and the managed machine 4. The communication line 5 is assumed to be a network such as a satellite communication line or a mobile phone network, which has a small line capacity and a cost for mass data communication. For this reason, communication via the communication line 5 is communication with a small amount of data.
The communication line 6 connects the machine management device 2 and the information collection and utilization device 3. As the communication line 6, various networks such as a dedicated line, a WAN (Wide Area Network), a power line network, a wireless network, and a public line network can be adopted in addition to the Internet and a LAN (Local Area Network). For this reason, communication via the communication line 6 is communication with a large amount of data.
(機械管理装置)
 機械管理装置2は、一般的なコンピュータであり、中央制御装置11、主記憶装置12、補助記憶装置13、通信装置14、入力装置15及び出力装置16を有する。これらはバスによって相互に接続されている。
 補助記憶装置13は、共通鍵データベース31、乱数データベース32、観測情報データベース33及び公開鍵・秘密鍵データベース34(詳細後記)を格納している。
 A共通鍵生成部21、乱数整合部22、A・鍵復号化部23、二次情報生成部24及びB暗号化部25はプログラムである。以降、「○○部は」と主体を記した場合は、中央制御装置11が、補助記憶装置13から各プログラムを読み出し、主記憶装置12にロードしたうえで、各プログラムの機能(詳細後記)を実現するものとする(このことは、後記する情報収集利用装置3及び管理対象機械4についても同様である)。
(Machine management device)
The machine management device 2 is a general computer and includes a central control device 11, a main storage device 12, an auxiliary storage device 13, a communication device 14, an input device 15, and an output device 16. These are connected to each other by a bus.
The auxiliary storage device 13 stores a common key database 31, a random number database 32, an observation information database 33, and a public / private key database 34 (detailed later).
The A common key generation unit 21, the random number matching unit 22, the A / key decryption unit 23, the secondary information generation unit 24, and the B encryption unit 25 are programs. Thereafter, when the subject is described as “XX section”, the central controller 11 reads out each program from the auxiliary storage device 13 and loads it into the main storage device 12, and then the function of each program (detailed later). (This also applies to the information collection and utilization device 3 and the management target machine 4 described later).
(情報収集利用装置)
 情報収集利用装置3は、一般的なコンピュータであり、中央制御装置41、主記憶装置42、補助記憶装置43、通信装置44、入力装置45及び出力装置46を有する。これらはバスによって相互に接続されている。
 補助記憶装置43は、共通鍵データベース55(詳細後記)を格納している。
 B共通鍵生成部51、鍵暗号化部52、B復号化部53及び二次情報活用部54はプログラムである。
(Information collection and utilization device)
The information collection and utilization device 3 is a general computer and includes a central control device 41, a main storage device 42, an auxiliary storage device 43, a communication device 44, an input device 45, and an output device 46. These are connected to each other by a bus.
The auxiliary storage device 43 stores a common key database 55 (details described later).
The B common key generation unit 51, the key encryption unit 52, the B decryption unit 53, and the secondary information utilization unit 54 are programs.
(管理対象機械)
 管理対象機械4は、産業用、民生用の一般的な機械である。但し、本実施形態においては、管理対象機械4というとき、そのような機械の本来の機能を果たす機械的部分についての観測情報を取得するセンサ部分及びコンピュータ部分(いわゆるマイコン部分)を指すものとする。管理対象機械4は、中央制御装置61、主記憶装置62、補助記憶装置63、通信装置64、入力装置65、出力装置66及びセンサ67を有する。これらはバスによって相互に接続されている。
 補助記憶装置63は、観測情報データベース74(詳細後記)を格納している。
 A暗号化部71及び乱数生成部72はプログラムである。
 なお、機械管理装置2、情報収集利用装置3及び管理対象機械4に亘って、プログラムの名称の「A」及び「B」の語は、それぞれ、「観測情報に関する」及び「二次情報に関する」という意味を有する。
(Managed machine)
The managed machine 4 is a general machine for industrial use and consumer use. However, in the present embodiment, the managed machine 4 refers to a sensor part and a computer part (so-called microcomputer part) that obtain observation information about a mechanical part that performs the original function of such a machine. . The managed machine 4 includes a central control device 61, a main storage device 62, an auxiliary storage device 63, a communication device 64, an input device 65, an output device 66, and a sensor 67. These are connected to each other by a bus.
The auxiliary storage device 63 stores an observation information database 74 (details described later).
The A encryption unit 71 and the random number generation unit 72 are programs.
It should be noted that the words “A” and “B” in the names of programs across the machine management device 2, the information collection and utilization device 3, and the management target machine 4 are “related to observation information” and “secondary information”, respectively. It has the meaning.
 図2では、機械管理装置2が1台存在する構成とした。しかしながら、機械管理装置2は、複数の筐体に分かれた構成であってもよい。例えば、プログラムを格納する1又は複数の装置と、データベース等を格納する1又は複数の装置が存在するものとしてもよい。情報収集利用装置3についても同様である。管理対象機械4については、図2では1台のみを記載したが、実際には1又は複数台存在する。 In FIG. 2, the machine management device 2 is configured to exist. However, the machine management device 2 may have a configuration divided into a plurality of cases. For example, there may be one or a plurality of apparatuses that store programs and one or a plurality of apparatuses that store a database or the like. The same applies to the information collection and utilization device 3. Only one managed machine 4 is shown in FIG. 2, but there are actually one or a plurality of managed machines 4.
(共通鍵データベース)
 図3に沿って、共通鍵データベース31を説明する。共通鍵データベース31は、機械保有者用テーブル35(図3(a))及び情報収集利用者用テーブル36(図3(b))に分かれて構成される。
(Common key database)
The common key database 31 will be described with reference to FIG. The common key database 31 is divided into a machine owner table 35 (FIG. 3A) and an information collection user table 36 (FIG. 3B).
 機械保有者用テーブル35においては、機械保有者ID欄101に記憶された機械保有者IDに関連付けて、機械ID欄102には機械IDが、製造番号欄103には製造番号が、アルゴリズム欄104にはアルゴリズムの名称が、共通鍵欄105には共通鍵が記憶されている。
 機械保有者ID欄101の機械保有者IDは、機械保有者を一意に特定する識別子である。
 機械ID欄102の機械IDは、管理対象機械4の種類を一意に特定する識別子である。
 製造番号欄103の製造番号は、同一の種類の管理対象機械4のなかで、当該管理対象機械4が製造された順番を示す番号である。
 機械IDと製造番号との組合せによって管理対象機械4が一意に特定される。
 アルゴリズム欄104のアルゴリズムの名称は、暗号化・復号化の手順であるアルゴリズムの名称である。アルゴリズムそのものは、機械管理装置2の補助記憶装置13内又は外部のシステム等にアルゴリズムの名称に関連付けて記憶されており、機械管理装置2は、当該アルゴリズムの名称を特定できれば、当該アルゴリズムを自由に使用可能であるものとする(以降のアルゴリズムの説明においても同様である)。なお、当該アルゴリズムは、機械メーカが採用したものである。
 共通鍵欄105の共通鍵は、暗号化・復号化の際にアルゴリズムが読み込むパラメータである。当該共通鍵は、機械メーカが生成したものであり、機械管理装置2及び管理対象機械4によって共有される。
In the machine owner table 35, in association with the machine owner ID stored in the machine owner ID column 101, the machine ID column 102 has a machine ID, the manufacturing number column 103 has a manufacturing number, and an algorithm column 104. Is the name of the algorithm, and the common key column 105 stores the common key.
The machine owner ID in the machine owner ID column 101 is an identifier that uniquely identifies the machine owner.
The machine ID in the machine ID column 102 is an identifier that uniquely identifies the type of the management target machine 4.
The serial number in the serial number column 103 is a number indicating the order in which the managed machine 4 is manufactured among the same type of managed machines 4.
The managed machine 4 is uniquely specified by the combination of the machine ID and the production number.
The name of the algorithm in the algorithm column 104 is the name of an algorithm that is an encryption / decryption procedure. The algorithm itself is stored in association with the name of the algorithm in the auxiliary storage device 13 of the machine management device 2 or in an external system. The machine management device 2 can freely specify the algorithm if the name of the algorithm can be specified. It is assumed that it can be used (the same applies to the description of the algorithm below). This algorithm is adopted by the machine manufacturer.
The common key in the common key column 105 is a parameter read by the algorithm at the time of encryption / decryption. The common key is generated by the machine manufacturer and is shared by the machine management device 2 and the managed machine 4.
 情報収集利用者用テーブル36においては、情報収集利用者ID欄106に記憶された情報収集利用者IDに関連付けて、アルゴリズム欄107にはアルゴリズムの名称が、共通鍵欄108には共通鍵が記憶されている。
 情報収集利用者ID欄106の情報収集利用者IDは、情報収集利用者を一意に特定する識別子である。
 アルゴリズム欄107のアルゴリズムの名称は、暗号化・復号化の手順であるアルゴリズムの名称である。なお、当該アルゴリズムは、情報収集利用者が採用したものである。
 共通鍵欄108の共通鍵は、暗号化・復号化の際にアルゴリズムが読み込むパラメータである。当該共通鍵は、情報収集利用者が生成したものであり、機械管理装置2及び情報収集利用装置3によって共有される。
In the information collection user table 36, the algorithm name is stored in the algorithm field 107 and the common key is stored in the common key field 108 in association with the information collection user ID stored in the information collection user ID field 106. Has been.
The information collection user ID in the information collection user ID column 106 is an identifier that uniquely identifies the information collection user.
The name of the algorithm in the algorithm column 107 is the name of an algorithm that is an encryption / decryption procedure. This algorithm is adopted by the information collecting user.
The common key in the common key column 108 is a parameter read by the algorithm at the time of encryption / decryption. The common key is generated by the information collecting user and is shared by the machine management device 2 and the information collecting and using device 3.
(乱数データベース)
 図4に沿って、乱数データベース32を説明する。乱数データベース32においては、機械保有者ID欄111に記憶された機械保有者IDに関連付けて、機械ID欄112には機械IDが、製造番号欄113には製造番号が、乱数欄114には乱数が記憶されている。
 機械保有者ID欄111の機械保有者IDは、図3(a)の機械保有者IDと同じである。
 機械ID欄112の機械IDは、図3(a)の機械IDと同じである。
 製造番号欄113の製造番号は、図3(a)の製造番号と同じである。
 乱数欄114の乱数は、管理対象機械4が、観測情報を暗号化する直前に生成した数字の列である。当該数字の列に含まれる個々の数字は無作為に発生しており、管理対象機械4以外が自力でこれらを知ることは事実上不可能である。
(Random number database)
The random number database 32 will be described with reference to FIG. In the random number database 32, in association with the machine owner ID stored in the machine owner ID column 111, the machine ID column 112 has a machine ID, the manufacturing number column 113 has a manufacturing number, and the random number column 114 has a random number. Is remembered.
The machine owner ID in the machine owner ID column 111 is the same as the machine owner ID in FIG.
The machine ID in the machine ID column 112 is the same as the machine ID in FIG.
The serial number in the serial number column 113 is the same as the serial number in FIG.
The random number in the random number column 114 is a string of numbers generated immediately before the managed machine 4 encrypts the observation information. Individual numbers included in the string of numbers are randomly generated, and it is practically impossible for anyone other than the managed machine 4 to know them by themselves.
(観測情報データベース)
 図5に沿って、観測情報データベース33を説明する。観測情報データベース33においては、機械保有者ID欄121に記憶された機械保有者IDに関連付けて、機械ID欄122には機械IDが、製造番号欄123には製造番号が、部品ID欄124には部品IDが、温度欄125には温度が、圧力欄126には圧力が、位置欄127には位置が、観測時刻欄128には観測時刻が記憶されている。
(Observation information database)
The observation information database 33 will be described with reference to FIG. In the observation information database 33, in association with the machine owner ID stored in the machine owner ID field 121, the machine ID field 122 has a machine ID, the production number field 123 has a production number, and the part ID field 124. Shows the part ID, the temperature column 125 stores the temperature, the pressure column 126 stores the pressure, the position column 127 stores the position, and the observation time column 128 stores the observation time.
 機械保有者ID欄121の機械保有者IDは、図3(a)の機械保有者IDと同じである。
 機械ID欄122の機械IDは、図3(a)の機械IDと同じである。
 製造番号欄123の製造番号は、図3(a)の製造番号と同じである。
 部品ID欄124の部品は、同一の管理対象機械4のなかで、当該管理対象機械4の部品を一意に特定する識別子である。
 温度欄125の温度は、管理対象機械4の部品を、温度を観測するセンサ67によって観測した際の温度である。
 圧力欄126の圧力は、管理対象機械4の部品内の気体等の物質を、圧力を観測するセンサ67によって観測した際の圧力である。
 位置欄127の位置は、管理対象機械4が所在する場所の緯度及び経度である。当該緯度及び経度は図示しないGPS(Global Positioning System)によって観測される。
 観測時刻欄128の観測時刻は、温度、圧力及び位置が観測された時刻である。
The machine owner ID in the machine owner ID column 121 is the same as the machine owner ID in FIG.
The machine ID in the machine ID column 122 is the same as the machine ID in FIG.
The serial number in the serial number column 123 is the same as the serial number in FIG.
The component in the component ID column 124 is an identifier that uniquely identifies the component of the managed machine 4 in the same managed machine 4.
The temperature in the temperature column 125 is a temperature when the parts of the managed machine 4 are observed by the sensor 67 that observes the temperature.
The pressure in the pressure column 126 is a pressure when a substance such as a gas in a part of the managed machine 4 is observed by the sensor 67 that observes the pressure.
The position in the position column 127 is the latitude and longitude of the place where the managed machine 4 is located. The latitude and longitude are observed by a GPS (Global Positioning System) (not shown).
The observation time in the observation time column 128 is the time when the temperature, pressure and position are observed.
(公開鍵・秘密鍵データベース)
 図6に沿って、公開鍵・秘密鍵データベース34を説明する。公開鍵・秘密鍵データベース34においては、アルゴリズム欄131に記憶されたアルゴリズムの名称に関連付けて、公開鍵欄132には公開鍵が、秘密鍵欄133には秘密鍵が記憶されている。
 アルゴリズム欄131のアルゴリズムの名称は、暗号化・復号化の手順であるアルゴリズムの名称である。なお、当該アルゴリズムは、機械メーカが採用したものである。
 公開鍵欄132の公開鍵は、暗号化・復号化の際にアルゴリズムが読み込むパラメータである。当該公開鍵は、機械メーカが生成したものであり、情報収集利用装置3に送信される。
 秘密鍵欄133の秘密鍵は、暗号化・復号化の際にアルゴリズムが読み込むパラメータである。当該秘密鍵は、機械メーカが生成したものであり、他には公開されない。なお、公開健及び秘密健はペアになっており、本実施形態では、公開鍵を使用してデータ(二次情報のセキュリティ用の共通鍵そのもの)が暗号化され、秘密鍵を使用して当該データが復号化される。
(Public / private key database)
The public key / private key database 34 will be described with reference to FIG. In the public key / private key database 34, the public key is stored in the public key column 132 and the secret key is stored in the secret key column 133 in association with the algorithm name stored in the algorithm column 131.
The name of the algorithm in the algorithm column 131 is the name of an algorithm that is an encryption / decryption procedure. This algorithm is adopted by the machine manufacturer.
The public key in the public key column 132 is a parameter read by the algorithm at the time of encryption / decryption. The public key is generated by the machine maker and is transmitted to the information collection and utilization apparatus 3.
The secret key in the secret key column 133 is a parameter read by the algorithm at the time of encryption / decryption. The secret key is generated by the machine manufacturer and is not disclosed to others. The public health and the secret health are paired. In this embodiment, the data (the common key for security of the secondary information itself) is encrypted using the public key, and the secret key is used to encrypt the data. Data is decrypted.
(観測情報データベース)
 図7に沿って、観測情報データベース74を説明する。図5において説明した観測情報データベース33が機械管理装置2に格納されているのに対して、観測情報データベース74は、管理対象機械4に格納されている。観測情報データベース74の構成は、図5における機械保有者ID欄121に対応する欄が存在しないことを除いて、観測情報データベース33の構成と同じである。すなわち、図7の欄141~欄147については、図5の欄122~欄128についての説明がそのままあてはまる。
(Observation information database)
The observation information database 74 will be described with reference to FIG. While the observation information database 33 described in FIG. 5 is stored in the machine management apparatus 2, the observation information database 74 is stored in the managed machine 4. The configuration of the observation information database 74 is the same as the configuration of the observation information database 33 except that there is no column corresponding to the machine owner ID column 121 in FIG. That is, the description of the column 122 to the column 128 of FIG. 5 is applied as it is to the column 141 to the column 147 of FIG.
(共通鍵データベース)
 図8に沿って、共通鍵データベース55を説明する。図3において説明した共通鍵データベース31が機械管理装置2に格納されているのに対して、共通鍵データベース55は、情報収集利用装置3に格納されている。共通鍵データベース55の構成は、図3(a)の機械保有者用テーブル35の構成を有さない。
 共通鍵データベース55においては、機械メーカID欄151に記憶された機械メーカIDに関連付けて、アルゴリズム欄152にはアルゴリズムの名称が、共通鍵欄153には共通鍵が記憶されている。
 機械メーカID欄151の機械メーカIDは、機械メーカを一意に特定する識別子である。
 アルゴリズム欄152のアルゴリズムの名称は、暗号化・復号化の手順であるアルゴリズムの名称である。なお、当該アルゴリズムは、情報収集利用者が採用したものである。
 共通鍵欄153の共通鍵は、暗号化・復号化の際にアルゴリズムが読み込むパラメータである。当該共通鍵は、情報収集利用者が生成したものであり、機械管理装置2及び情報収集利用装置3によって共有される。
(Common key database)
The common key database 55 will be described with reference to FIG. The common key database 31 described in FIG. 3 is stored in the machine management apparatus 2, whereas the common key database 55 is stored in the information collection and utilization apparatus 3. The configuration of the common key database 55 does not have the configuration of the machine owner table 35 shown in FIG.
In the common key database 55, the algorithm name 152 is stored in the algorithm column 152 and the common key is stored in the common key column 153 in association with the machine manufacturer ID stored in the machine manufacturer ID column 151.
The machine maker ID in the machine maker ID column 151 is an identifier that uniquely identifies the machine maker.
The name of the algorithm in the algorithm column 152 is the name of the algorithm that is the procedure of encryption / decryption. This algorithm is adopted by the information collecting user.
The common key in the common key column 153 is a parameter read by the algorithm at the time of encryption / decryption. The common key is generated by the information collecting user and is shared by the machine management device 2 and the information collecting and using device 3.
(処理手順の概要)
 処理手順には、以下の3つがある。すなわち、(1)観測情報のセキュリティのために、機械管理装置2が、管理対象機械4と共有する共通鍵を生成する第1の処理手順(図9参照)、(2)二次情報のセキュリティのために、情報収集利用装置3が、機械管理装置2と共有する共通鍵を生成し、それに付随して、機械管理装置2が、当該共通鍵自身を暗号化する公開鍵を情報収集利用装置3に送信する第2の処理手順(図10参照)、及び、(3)管理対象機械4から観測情報を情報収集利用装置3が取得し、情報収集利用装置3が観測情報を機械管理装置2に転送し、機械管理装置2が観測情報を基に二次情報を加工したうえで情報収集利用装置3に送信し、情報収集利用装置3が二次情報を活用する第3の処理手順(図11参照)である。
 第3の処理手順が実行されるには、第1の処理手順及び第2の処理手順が完了していることが前提となる。
(Outline of processing procedure)
There are the following three processing procedures. That is, (1) for the security of observation information, the machine management device 2 generates a common key shared with the managed machine 4 (see FIG. 9), (2) the security of secondary information Therefore, the information collection and utilization device 3 generates a common key shared with the machine management device 2, and the machine management device 2 attaches a public key for encrypting the common key itself to the information collection and utilization device. And (3) the information collection and utilization device 3 acquires observation information from the managed machine 4, and the information collection and utilization device 3 obtains the observation information from the machine management device 2 And the machine management device 2 processes the secondary information based on the observation information and transmits the processed secondary information to the information collection and utilization device 3, and the information collection and utilization device 3 uses the secondary information (FIG. 3). 11).
In order to execute the third processing procedure, it is assumed that the first processing procedure and the second processing procedure have been completed.
(第1の処理手順)
 図9に沿って、第1の処理手順を説明する。第1の処理手順は、機械メーカが管理対象機械4を機械保有者に納入するときに、一度だけ実行される。
 ステップS201において、機械管理装置2のA共通鍵生成部21は、共通鍵を生成する。具体的には、A共通鍵生成部21は、第1に、機械保有者ID、機械ID、及び製造番号が入力装置15を介して入力されるのを受け付ける。
 第2に、採用するアルゴリズムを決定し、共通鍵を生成する。
 第3に、共通鍵データベース31の機械保有者用テーブル35(図3(a))の新たなレコードを作成し、機械保有者ID欄101、機械ID欄102、製造番号欄103、アルゴリズム欄104及び共通鍵欄105に、それぞれ、受け付けた機械保有者ID、機械ID、製造番号、決定したアルゴリズムの名称及び生成した共通鍵を記憶する。
(First processing procedure)
The first processing procedure will be described with reference to FIG. The first processing procedure is executed only once when the machine manufacturer delivers the managed machine 4 to the machine owner.
In step S201, the A common key generation unit 21 of the machine management device 2 generates a common key. Specifically, the A common key generation unit 21 first accepts that the machine owner ID, the machine ID, and the manufacturing number are input via the input device 15.
Second, an algorithm to be adopted is determined and a common key is generated.
Third, a new record of the machine owner table 35 (FIG. 3A) of the common key database 31 is created, and a machine owner ID column 101, a machine ID column 102, a production number column 103, and an algorithm column 104 are created. In the common key column 105, the received machine owner ID, machine ID, serial number, determined algorithm name, and generated common key are stored.
 ステップS202において、A共通鍵生成部21は、共通鍵を管理対象機械4に格納する。具体的には、A共通鍵生成部21は、ステップS201において決定したアルゴリズムの名称及びステップS201において生成した共通鍵を管理対象機械4に格納する。当該格納のとき、機械管理装置2の通信装置14と管理対象機械4の通信装置64とは、(ケーブル等で)直接接続されているものとする。 In step S202, the A common key generation unit 21 stores the common key in the managed machine 4. Specifically, the A common key generation unit 21 stores the name of the algorithm determined in step S201 and the common key generated in step S201 in the managed machine 4. At the time of the storage, it is assumed that the communication device 14 of the machine management device 2 and the communication device 64 of the managed machine 4 are directly connected (by a cable or the like).
 ステップS203において、管理対象機械4のA暗号化部71は、共通鍵を記憶する。具体的には、A暗号化部71は、ステップS202において格納されたアルゴリズムの名称及び共通鍵を、補助記憶装置63に記憶する。
 その後、第1の処理手順を終了する。
In step S203, the A encryption unit 71 of the managed machine 4 stores the common key. Specifically, the A encryption unit 71 stores the name of the algorithm and the common key stored in step S202 in the auxiliary storage device 63.
Thereafter, the first processing procedure is terminated.
(第2の処理手順)
 図10に沿って、第2の処理手順を説明する。第2の処理手順は、情報収集利用者が機械保有者と「保守契約」を締結したときに、機械保有者の管理対象機械4の機械メーカが情報収集利用者にとって新規である場合に、一度だけ実行される。
(Second processing procedure)
The second processing procedure will be described with reference to FIG. The second processing procedure is performed once when the information collection user signs a “maintenance contract” with the machine owner and the machine manufacturer of the machine 4 to be managed by the machine owner is new to the information collection user. Only executed.
 ステップS301において、情報収集利用装置3のB共通鍵生成部51は、共通鍵を生成する。具体的には、B共通鍵生成部51は、第1に、機械メーカIDが入力装置45を介して入力されるのを受け付ける。
 第2に、採用するアルゴリズムを決定し、共通鍵を生成する。
 第3に、共通鍵データベース55(図8)の新たなレコードを作成し、機械メーカID欄151、アルゴリズム欄152及び共通鍵欄153に、それぞれ、受け付けた機械メーカID、決定したアルゴリズムの名称及び生成した共通鍵を記憶する。
In step S301, the B common key generation unit 51 of the information collection and utilization device 3 generates a common key. Specifically, the B common key generation unit 51 first accepts that the machine manufacturer ID is input via the input device 45.
Second, an algorithm to be adopted is determined and a common key is generated.
Third, a new record is created in the common key database 55 (FIG. 8), and the machine maker ID column 151, the algorithm column 152, and the common key column 153 are respectively received the machine maker ID, the name of the determined algorithm, and Store the generated common key.
 ステップS302において、情報収集利用装置3の鍵暗号化部52は、機械メーカの公開鍵を要求する。具体的には、鍵暗号化部52は、機械管理装置2に対して、公開鍵を要求する旨の信号を送信する。鍵暗号化部52は、当該信号に付して特定のアルゴリズムの名称を送信してもよい。当該送信は、通信回線6を介して行われる。 In step S302, the key encryption unit 52 of the information collection and utilization device 3 requests the public key of the machine manufacturer. Specifically, the key encryption unit 52 transmits a signal requesting a public key to the machine management device 2. The key encryption unit 52 may send the name of a specific algorithm to the signal. The transmission is performed via the communication line 6.
 ステップS303において、機械管理装置2のA・鍵復号化部23は、公開鍵を送信する。具体的には、A・鍵復号化部23は、第1に、公開鍵・秘密鍵データベース34(図6)の任意のレコードから、公開鍵及びアルゴリズムの名称を取得する。ステップS302において、特定のアルゴリズムの名称が送信されている場合は、当該アルゴリズムの名称を検索キーとして公開鍵・秘密鍵データベース34を検索し、該当したレコードの公開鍵を取得する。
 機械管理装置2は、予め機械メーカが入力装置15を介してアルゴリズムの名称、公開鍵及び秘密鍵を入力するのを受け付け、公開鍵・秘密鍵データベース34のレコードを設定しておくものとする。
 第2に、検索キーとした(又は取得した)アルゴリズムの名称及び取得した公開鍵を情報収集利用装置3に送信する。当該送信は、通信回線6を介して行われる。
In step S303, the A / key decryption unit 23 of the machine management device 2 transmits the public key. Specifically, the A / key decryption unit 23 first obtains the public key and algorithm name from an arbitrary record in the public key / private key database 34 (FIG. 6). If the name of a specific algorithm is transmitted in step S302, the public key / private key database 34 is searched using the name of the algorithm as a search key, and the public key of the corresponding record is acquired.
The machine management apparatus 2 accepts that the machine maker inputs the algorithm name, public key, and secret key via the input device 15 in advance, and sets a record in the public key / secret key database 34.
Secondly, the name of the algorithm used as (or acquired) the search key and the acquired public key are transmitted to the information collection and utilization apparatus 3. The transmission is performed via the communication line 6.
 ステップS304において、情報収集利用装置3の鍵暗号化部52は、公開鍵を受信する。具体的には、鍵暗号化部52は、ステップS303において送信されたアルゴリズムの名称及び公開鍵を受信する。 In step S304, the key encryption unit 52 of the information collection and utilization device 3 receives the public key. Specifically, the key encryption unit 52 receives the algorithm name and the public key transmitted in step S303.
 ステップS305において、鍵暗号化部52は、共通鍵を暗号化する。具体的には、鍵暗号化部52は、第1に、共通鍵データベース55(図8)から、ステップS301において記憶したアルゴリズムの名称及び共通鍵を取得する。
 第2に、ステップS304において受信したアルゴリズムの名称に対応するアルゴリズム、及び、ステップS304において受信した公開鍵を使用して、ステップS305の「第1」において取得したアルゴリズムの名称及び共通鍵を暗号化する。
In step S305, the key encryption unit 52 encrypts the common key. Specifically, the key encryption unit 52 first acquires the algorithm name and the common key stored in step S301 from the common key database 55 (FIG. 8).
Second, using the algorithm corresponding to the algorithm name received in step S304 and the public key received in step S304, the algorithm name and common key acquired in “first” of step S305 are encrypted. To do.
 ステップS306において、鍵暗号化部52は、共通鍵を送信する。具体的には、鍵暗号化部52は、ステップS305において暗号化されたアルゴリズムの名称及び共通鍵を、情報収集利用者IDとともに機械管理装置2に送信する。当該送信は、通信回線6を介して行われる。 In step S306, the key encryption unit 52 transmits the common key. Specifically, the key encryption unit 52 transmits the algorithm name and the common key encrypted in step S305 to the machine management apparatus 2 together with the information collection user ID. The transmission is performed via the communication line 6.
 ステップS307において、機械管理装置2のA・鍵復号化部23は、共通鍵を受信する。具体的には、A・鍵復号化部23は、ステップS306において送信されたアルゴリズムの名称及び共通鍵を情報収集利用者IDとともに受信する。 In step S307, the A / key decryption unit 23 of the machine management device 2 receives the common key. Specifically, the A / key decryption unit 23 receives the algorithm name and the common key transmitted in step S306 together with the information collection user ID.
 ステップS308において、機械管理装置2のA・鍵復号化部23は、共通鍵を復号化する。具体的には、A・鍵復号化部23は、第1に、公開鍵・秘密鍵データベース34(図6)から、ステップS303の「第1」において取得した公開鍵を含むレコードの秘密鍵を取得する。
 第2に、取得した秘密鍵を使用して、ステップS307において受信したアルゴリズムの名称及び共通鍵を復号化する。
 第3に、共通鍵データベース31の情報収集利用者用テーブル36(図3(b))の新たなレコードを作成し、情報収集利用者ID欄106、アルゴリズム欄107及び共通鍵欄108に、それぞれ、情報収集利用者ID、復号化したアルゴリズムの名称及び共通鍵を記憶する。
 その後、第2の処理手順を終了する。
In step S308, the A / key decryption unit 23 of the machine management device 2 decrypts the common key. Specifically, first, the A / key decryption unit 23 obtains the secret key of the record including the public key acquired in “first” in step S303 from the public key / private key database 34 (FIG. 6). get.
Second, the algorithm name and the common key received in step S307 are decrypted using the acquired secret key.
Third, a new record of the information collection user table 36 (FIG. 3B) of the common key database 31 is created, and the information collection user ID column 106, the algorithm column 107, and the common key column 108 are respectively stored. The information collection user ID, the name of the decrypted algorithm and the common key are stored.
Thereafter, the second processing procedure is terminated.
(第3の処理手順)
 図11に沿って、第3の処理手順を説明する。第3の処理手順は、情報収集利用者が決定したタイミングで実行される。例えば、情報収集利用者(の作業員)が、管理対象機械4が設置されている現場に毎日出向き、観測情報を収集する都度実行される。
(Third processing procedure)
A third processing procedure will be described with reference to FIG. The third processing procedure is executed at a timing determined by the information collection user. For example, it is executed each time an information collection user (a worker) goes to the site where the managed machine 4 is installed and collects observation information.
 ステップS401において、管理対象機械4の乱数生成部72は、乱数を生成する。具体的には、乱数生成部72は、第1に、乱数を発生させる。
 第2に、管理対象機械4の製造時などに補助記憶装置63に予め記憶されている機械ID及び製造番号を取得する。
 第3に、発生させた乱数、取得した機械ID及び製造番号を、機械保有者IDとともに機械管理装置2に暗号化せずに送信する。当該送信は、通信回線5(通信容量が小さい)を介して行われる。
In step S401, the random number generation unit 72 of the managed machine 4 generates a random number. Specifically, the random number generation unit 72 first generates a random number.
Secondly, the machine ID and the production number stored in advance in the auxiliary storage device 63 at the time of production of the managed machine 4 are acquired.
Third, it transmits random number generated, the acquired machine ID and serial number, without encrypting the machine management device 2 with mechanical holders ID. The transmission is performed via the communication line 5 (communication capacity is small).
 ステップS402において、機械管理装置2の乱数整合部22は、乱数を受信する。具体的には、乱数整合部22は、第1に、ステップS401において送信された乱数、機械ID、製造番号及び機械保有者IDを受信する。
 第2に、乱数データベース32(図4)の新たなレコードを作成し、機械保有者ID欄111、機械ID欄112、製造番号欄113及び乱数欄114に、それぞれ、受信した機械保有者ID、機械ID、製造番号及び乱数を記憶する。
In step S402, the random number matching unit 22 of the machine management device 2 receives a random number. Specifically, the random number matching unit 22 first receives the random number, the machine ID, the manufacturing number, and the machine owner ID transmitted in step S401.
Secondly, a new record of the random number database 32 (FIG. 4) is created, and the received machine owner ID, machine ID field 111, machine ID field 112, serial number field 113, and random number field 114 are respectively received. Machine ID, serial number and random number are stored.
 ステップS403において、管理対象機械4のA暗号化部71は、観測情報を暗号化する。具体的には、A暗号化部71は、第1に、観測情報データベース74(図7)のすべてのレコードに記憶されている機械ID、製造番号、部品ID、温度、圧力、位置及び観測時刻を取得する(これら取得した情報をまとめて「観測情報」という)。
 第2に、補助記憶装置63から、ステップS203において記憶されたアルゴリズムの名称及び共通鍵を取得する。
 第3に、ステップS403の「第1」において取得した観測情報及びステップS401の「第1」において発生させた乱数を、ステップS403の「第2」において取得したアルゴリズムの名称に対応するアルゴリズム及びステップS403の「第2」において取得した共通鍵を使用して暗号化する。そして、暗号化した観測情報及び乱数を、メモリーカードのような記録媒体に対して、通信装置64を介して出力する。なお、当該記録媒体は、情報収集利用者(の作業員)によって人的に管理対象機械4から取り外され情報収集利用装置3へ運搬される。
 第4に、暗号化の対象となった(平文の)観測情報を削除する。
In step S403, the A encryption unit 71 of the managed machine 4 encrypts the observation information. Specifically, the A encryption unit 71 firstly has a machine ID, serial number, part ID, temperature, pressure, position, and observation time stored in all records of the observation information database 74 (FIG. 7). (The collected information is collectively referred to as “observation information”).
Second, the algorithm name and the common key stored in step S203 are acquired from the auxiliary storage device 63.
Thirdly, the observation information acquired in “first” in step S403 and the random number generated in “first” in step S401 are the algorithm and step corresponding to the name of the algorithm acquired in “second” in step S403. Encryption is performed using the common key acquired in “second” in S403. Then, the encrypted observation information and random numbers are output via the communication device 64 to a recording medium such as a memory card. The recording medium is manually removed from the managed machine 4 by an information collection user (operator) and transported to the information collection and utilization apparatus 3.
Fourth, the observation information (in plain text) that is the object of encryption is deleted.
 ステップS404において、情報収集利用装置3の二次情報活用部54は、観測情報を取得して送信する。具体的には、二次情報活用部54は、第1に、情報収集利用者(の作業員)が記録媒体を、通信装置44を介して入力するのを受け付ける(図2の破線)。
 第2に、二次情報活用部54は、記録媒体から暗号化されている観測情報及び乱数を読み出す。そして、自らの情報収集利用者IDと読み出した観測情報及び乱数を機械管理装置2に送信する。当該送信は、通信回線6を介して行われる。このとき、情報収集利用装置3は、観測情報の内容及び乱数の内容を知ることはできない。
In step S404, the secondary information utilization unit 54 of the information collection and utilization device 3 acquires and transmits observation information. Specifically, the secondary information utilization unit 54 first accepts that the information collection user (the worker) inputs the recording medium via the communication device 44 (broken line in FIG. 2).
Second, the secondary information utilization unit 54 reads the observation information and the random number that are encrypted from the recording medium. Then, the information collection user ID, the read observation information, and the random number are transmitted to the machine management device 2. The transmission is performed via the communication line 6. At this time, the information collection and utilization apparatus 3 cannot know the contents of observation information and the contents of random numbers.
 ステップS405において、機械管理装置2のA・鍵復号化部23は、観測情報を復号化する。具体的には、A・鍵復号化部23は、第1に、ステップS404の「第2」において送信された、情報収集利用者IDと暗号化されている観測情報及び乱数を受信する。
 第2に、ステップS402の「第2」において、乱数データベース32(図4)の新たなレコードに記憶された機械保有者ID、機械ID、製造番号及び乱数を取得する(これらは暗号化されていない)。
 第3に、ステップS405の「第2」において取得した機械保有者ID、機械ID、製造番号を検索キーとして、共通鍵データベース31の機械保有者用テーブル35(図3(a))を検索し、該当したレコードのアルゴリズムの名称及び共通鍵を取得する。
In step S405, the A / key decryption unit 23 of the machine management device 2 decrypts the observation information. Specifically, first, the A / key decryption unit 23 receives the information collection user ID, the encrypted observation information, and the random number transmitted in “second” in step S404.
Second, in the “second” in step S402, the machine owner ID, machine ID, serial number and random number stored in the new record of the random number database 32 (FIG. 4) are acquired (these are encrypted). Absent).
Third, the machine owner table 35 (FIG. 3A) of the common key database 31 is searched using the machine owner ID, machine ID, and manufacturing number acquired in “second” in step S405 as search keys. The algorithm name and common key of the corresponding record are acquired.
 第4に、ステップS405の「第3」において取得したアルゴリズムの名称に対応するアルゴリズム及び共通鍵を使用して、受信した観測情報及び乱数を復号化する。
 第5に、復号化した乱数と、ステップS405の「第2」において取得した乱数とを比較し、両者が一致していることを確認する。両者が一致する場合、暗号化された観測情報及び乱数は正しいルートで取得されたものと判断できる。両者が一致しない場合、例えば、作業員が別の管理対象機械4についての記録媒体を誤って通信装置44に入力してしまった可能性がある。この場合、A・鍵復号化部23は、出力装置16及び出力装置46にエラーメッセージを表示し、第3の処理手順を終了する。
 第6に、観測情報データベース33(図5)のレコードを、受信した観測情報に含まれるレコードの数だけ新たに作成し、復号化した観測情報を機械ID欄122~観測情報欄128に記憶し、ステップS405の「第2」において取得した機械保有者IDを、機械保有者ID欄121に記憶する。
Fourth, using an algorithm and a common key corresponding to the name of the algorithm obtained in the "third" in step S405, decodes the observation information and the random number received.
Fifth, compares the random number decrypted, the random number acquired in the "second" in step S405, to ensure that they match. If the two match, it can be determined that the encrypted observation information and random number have been acquired through the correct route. If they do not match, for example, there is a possibility that the worker had entered into the communication device 44 erroneously recording medium for another managed machine 4. In this case, the A / key decryption unit 23 displays an error message on the output device 16 and the output device 46, and ends the third processing procedure.
Sixth, records of the observation information database 33 (FIG. 5) are newly created for the number of records included in the received observation information, and the decoded observation information is stored in the machine ID column 122 to the observation information column 128. The machine owner ID acquired in the “second” in step S405 is stored in the machine owner ID column 121.
 ステップS406において、機械管理装置2の二次情報生成部24は、二次情報を生成する。具体的には、二次情報生成部24は、第1に、例えば、図5のレコードのうちステップS405の「第6」において作成されたレコードを、観測時刻の順に読み出し、温度の時系列的変化をグラフ化する基になる情報を生成する。(グラフについては、図12(a)参照。詳細後記)。図5においては、4つのレコードの観測時刻がすべて同じになっている。しかしながら、これはあくまでも一例に過ぎず、ある特定の部品について、複数の観測時刻を有するレコードが複数存在する場合は、当該部品について、温度の変化が時系列でわかるものとする。
 第2に、温度が所定の閾値を初めて超えたレコードの観測時刻、機械保有者ID、機械ID及び製造番号を取得する。そして、図12(b)のような表を表示する基になる情報生成する。
 このようなグラフ及び表(図12(a)及び(b))の基になる情報が二次情報である。二次情報の具体的な内容は、この例に限定されない。例えば、複数の観測時刻と、それらの観測時刻に対応する「温度」の差分とに基づいて単位時間あたりの温度上昇率を算出し、温度上昇率が所定の閾値を超えたことを検知してもよい。ここでは温度を例として説明したが、「温度」を「圧力」に代替してもよい。要するに、二次情報は、観測情報を基に加工できるものであればなんでもよい。
In step S406, the secondary information generation unit 24 of the machine management device 2 generates secondary information. Specifically, the secondary information generation unit 24 first reads, for example, the records created in “Sixth” in step S405 of the records in FIG. Produce information that forms the basis for graphing changes. (For the graph, see FIG. 12 (a). Detailed description below). In FIG. 5, the observation times of the four records are all the same. However, this is merely an example, and when there are a plurality of records having a plurality of observation times for a specific part, it is assumed that the temperature change of the part is known in time series.
Second, an observation time, a machine owner ID, a machine ID, and a production number of a record whose temperature exceeds a predetermined threshold for the first time are acquired. And the information used as the base which displays a table | surface like FIG.12 (b) is produced | generated.
Information that is the basis of such graphs and tables (FIGS. 12A and 12B) is secondary information. The specific content of the secondary information is not limited to this example. For example, a temperature increase rate per unit time is calculated based on a plurality of observation times and a difference of “temperature” corresponding to these observation times, and it is detected that the temperature increase rate exceeds a predetermined threshold. Also good. Here, the temperature is described as an example, but “temperature” may be replaced with “pressure”. In short, the secondary information may be anything that can be processed based on the observation information.
 ステップS407において、機械管理装置2のB暗号化部25は、二次情報を暗号化する。具体的には、B暗号化部25は、第1に、ステップS405の「第1」において受信された情報収集利用者IDを検索キーとして、共通鍵データベース31の情報収集利用者用テーブル36(図3(b))を検索し、該当したレコードのアルゴリズムの名称及び共通鍵を取得する。
 第2に、ステップS406において生成された二次情報を、ステップS407の「第1」において取得したアルゴリズムの名称に対応するアルゴリズム及び共通鍵を用いて暗号化する。
 第3に、機械メーカID及び暗号化した二次情報を、情報収集利用装置3に送信する。当該送信は、通信回線6を介して行われる。
In step S407, the B encryption unit 25 of the machine management device 2 encrypts the secondary information. Specifically, the B encryption unit 25 firstly uses the information collection user ID received in “first” of step S405 as a search key, and the information collection user table 36 ( 3B) is searched, and the algorithm name and common key of the corresponding record are acquired.
Second, the secondary information generated in step S406 is encrypted using the algorithm and the common key corresponding to the algorithm name acquired in “first” in step S407.
Third, the machine maker ID and the encrypted secondary information are transmitted to the information collection and utilization device 3. The transmission is performed via the communication line 6.
 ステップS408において、情報収集利用装置3のB復号化部53は、二次情報を復号化する。具体的には、B復号化部53は、第1に、ステップS407の「第3」において送信された機械メーカID及び暗号化された二次情報を受信する。
 第2に、受信した機械メーカIDを検索キーとして共通鍵データベース55(図8)を検索し、該当したレコードのアルゴリズムの名称及び共通鍵を取得する。
 第3に、受信した二次情報を、ステップS408の「第2」において取得したアルゴリズムの名称に対応するアルゴリズム及び共通鍵を用いて復号化する。
In step S408, the B decoding unit 53 of the information collection and utilization device 3 decodes the secondary information. Specifically, the B decrypting unit 53 first receives the machine manufacturer ID and the encrypted secondary information transmitted in “third” in step S407.
Second, the common key database 55 (FIG. 8) is searched using the received machine manufacturer ID as a search key, and the algorithm name and common key of the corresponding record are acquired.
Third, the received secondary information is decrypted using the algorithm and the common key corresponding to the name of the algorithm acquired in “second” in step S408.
 ステップS409において、情報収集利用装置3の二次情報活用部54は、二次情報を活用する。具体的には、二次情報活用部54は、復号化した二次情報を基にしてグラフ又は表を加工して、出力装置46に表示する。
 図12(a)は、当該グラフの例である。グラフの横軸は日時(観測時刻)である。グラフの縦軸は、異常度(例えば温度)である。破線161は、予め決定された温度の閾値である。
 図12(b)は、当該表の例である。二次情報活用部54は、ステップS406の「第2」において取得した観測時刻、機械保有者ID、機械ID及び製造番号を、それぞれ異常検知日時欄171、機械保有者ID欄172、機械ID欄173及び製造番号欄174に記憶する。異常検知日時欄171の観測時刻は、図12(a)において「異常検知」で示される観測時刻に対応している。
In step S409, the secondary information utilization unit 54 of the information collection and utilization device 3 utilizes the secondary information. Specifically, the secondary information utilization unit 54 processes a graph or a table based on the decrypted secondary information and displays it on the output device 46.
FIG. 12A is an example of the graph. The horizontal axis of the graph is the date and time (observation time). The vertical axis of the graph represents the degree of abnormality (for example, temperature). A broken line 161 is a predetermined temperature threshold.
FIG. 12B is an example of the table. The secondary information utilization unit 54 sets the observation time, machine owner ID, machine ID, and manufacturing number acquired in “second” in step S406 to the abnormality detection date / time column 171, the machine owner ID column 172, and the machine ID column, respectively. 173 and the serial number column 174. The observation time in the abnormality detection date / time column 171 corresponds to the observation time indicated by “abnormality detection” in FIG.
 ステップS410において、管理対象機械4は、サービスを授受する。具体的には、管理対象機械4は、第1に、ステップS409において表示されたグラフ又は表を視認した情報収集利用者(の作業員)が、管理対象機械4に対して最適なサービスを行うのを受け付ける。例えば、グラフが温度の異常を示している場合は、冷却系統の部品を点検する等のサービスを受け付ける。
 第2に、情報収集利用者(の作業員)が、ステップS403において取り外されたメモリーカードのような記録媒体を戻すのを受け付ける。
 その後、第3の処理手順を終了する。
In step S410, the managed machine 4 sends and receives services. Specifically, in the management target machine 4, first, an information collection user (operator) who visually recognizes the graph or table displayed in step S 409 performs an optimal service for the management target machine 4. Accept. For example, when the graph indicates a temperature abnormality, a service such as checking the parts of the cooling system is accepted.
Second, information gathering user (worker) accepts the return the recording medium such as a detached memory card in step S403.
Thereafter, the third processing procedure is terminated.
 本発明は、前記した実施形態に限定されることなく、本発明の主旨を逸脱しない範囲で、変更実施が可能である。 The present invention is not limited to the above-described embodiment, and can be modified without departing from the gist of the present invention.
 1   機械管理システム
 2   機械管理装置
 3   情報収集利用装置
 4   管理対象機械
 11、41、61 中央制御装置(制御部)
 12、42、62 主記憶装置(記憶部)
 13、43、63 補助記憶装置(記憶部)
 14、44、64 通信装置
 15、45、65 入力装置
 16、46、66 出力装置
 21  A共通鍵生成部
 22  乱数整合部
 23  A・鍵復号化部
 24  二次情報生成部
 25  B暗号化部
 31  共通鍵データベース
 32  乱数データベース
 33  観測情報データベース
 34  公開鍵・秘密鍵データベース
 35  機械保有者用テーブル
 36  情報収集利用者用テーブル
 51  B共通鍵生成部
 52  鍵暗号化部
 53  B復号化部
 54  二次情報活用部
 55  共通鍵データベース
 67  センサ
 71  A暗号化部
 72  乱数生成部
 74  観測情報データベース
DESCRIPTION OF SYMBOLS 1 Machine management system 2 Machine management apparatus 3 Information collection utilization apparatus 4 Management object machine 11, 41, 61 Central control apparatus (control part)
12, 42, 62 Main storage device (storage unit)
13, 43, 63 Auxiliary storage device (storage unit)
14, 44, 64 Communication device 15, 45, 65 Input device 16, 46, 66 Output device 21 A Common key generation unit 22 Random number matching unit 23 A / Key decryption unit 24 Secondary information generation unit 25 B Encryption unit 31 Common key database 32 Random number database 33 Observation information database 34 Public key / private key database 35 Machine owner table 36 Information collection user table 51 B Common key generation unit 52 Key encryption unit 53 B Decryption unit 54 Secondary information Utilization part 55 Common key database 67 Sensor 71 A Encryption part 72 Random number generation part 74 Observation information database

Claims (9)

  1.  管理の対象である管理対象機械と、
     前記管理対象機械の観測情報を取得し、前記観測情報に基づいて生成される二次情報を使用する情報収集利用装置と、
     前記観測情報に基づいて前記二次情報を生成する機械管理装置と、
     を有する機械管理システムであって、
     前記機械管理装置及び前記管理対象機械は、
     前記観測情報を暗号化し復号化するための第1の共通鍵を共有して記憶しており、
     前記機械管理装置及び前記情報収集利用装置は、
     前記二次情報を暗号化し復号化するための第2の共通鍵を共有して記憶しており、
     前記管理対象機械は、
     前記第1の共通鍵を使用して前記観測情報を暗号化し、
     前記情報収集利用装置は、
     前記暗号化された観測情報の入力を受け付け、前記受け付けた観測情報を前記機械管理装置に送信し、
     前記機械管理装置は、
     前記第1の共通鍵を使用して、前記送信された観測情報を復号化し、
     前記復号化された観測情報に基づいて前記二次情報を生成し、
     前記第2の共通鍵を使用して、前記生成された二次情報を暗号化し、
     前記暗号化された二次情報を前記情報収集利用装置に送信し、
     前記情報収集利用装置は、
     前記第2の共通鍵を使用して、前記送信された二次情報を復号化し、
     前記復号化された二次情報を使用して、前記管理対象機械に対してサービスを実行する際に使用される情報を出力すること、
     を特徴とする機械管理システム。
    Managed machines that are the subject of management,
    An information collection and utilization device that acquires observation information of the managed machine and uses secondary information generated based on the observation information;
    A machine management device that generates the secondary information based on the observation information;
    A machine management system comprising:
    The machine management device and the managed machine are:
    Storing and sharing a first common key for encrypting and decrypting the observation information;
    The machine management device and the information collection and utilization device are:
    A second common key for encrypting and decrypting the secondary information is shared and stored;
    The managed machine is
    Encrypting the observation information using the first common key;
    The information collection and utilization device includes:
    Receiving the input of the encrypted observation information, transmitting the received observation information to the machine management device;
    The machine management device includes:
    Decrypting the transmitted observation information using the first common key;
    Generating the secondary information based on the decoded observation information;
    Encrypting the generated secondary information using the second common key;
    Sending the encrypted secondary information to the information collection and utilization device;
    The information collection and utilization device includes:
    Decrypting the transmitted secondary information using the second common key;
    Using the decrypted secondary information to output information used when performing a service on the managed machine;
    A machine management system characterized by
  2.  前記機械管理装置は、
     前記第2の共通鍵を暗号化し復号化するための公開鍵及び当該公開鍵と対になる秘密鍵を記憶しており、
     前記情報収集利用装置からの要求に応じて、前記公開鍵を前記情報収集利用装置に送信し、
     前記情報収集利用装置は、
     前記第2の共通鍵を生成し、
     前記送信された公開鍵を使用して、前記生成された第2の共通鍵を暗号化し、
     前記暗号化された第2の共通鍵を前記機械管理装置に送信し、
     前記機械管理装置は、
     前記秘密鍵を使用して、前記送信された第2の共通鍵を復号化すること、
     を特徴とする請求の範囲第1項に記載の機械管理システム。
    The machine management device includes:
    Storing a public key for encrypting and decrypting the second common key and a secret key paired with the public key;
    In response to a request from the information collection and utilization device, the public key is transmitted to the information collection and utilization device,
    The information collection and utilization device includes:
    Generating the second common key;
    Encrypting the generated second common key using the transmitted public key;
    Transmitting the encrypted second common key to the machine management device;
    The machine management device includes:
    Decrypting the transmitted second common key using the secret key;
    The machine management system according to claim 1, wherein:
  3.  前記管理対象機械は、
     前記第1の共通鍵を使用して前記観測情報を暗号化するに先立って、乱数を発生させ、前記発生させた乱数を暗号化せずに前記機械管理装置に送信し、
     前記第1の共通鍵を使用して前記観測情報を暗号化する際に、前記第1の共通鍵を使用して前記発生させた乱数を暗号化し、
     前記情報収集利用装置は、
     前記暗号化された観測情報の入力を受け付ける際に、前記暗号化された乱数の入力を受け付け、
     前記受け付けた暗号化された乱数を前記機械管理装置に送信し、
     前記機械管理装置は、
     前記送信された暗号化された乱数を、前記第1の共通鍵を使用して復号化し、
     前記復号化された乱数と、前記暗号化せずに送信された乱数とが一致するか否かを判断すること、
     を特徴とする請求の範囲第1項に記載の機械管理システム。
    The managed machine is
    Prior to encrypting the observation information using the first common key, generating a random number, and transmitting the generated random number to the machine management device without encryption;
    When encrypting the observation information using the first common key, encrypting the generated random number using the first common key;
    The information collection and utilization device includes:
    When accepting the input of the encrypted observation information, accepting the input of the encrypted random number,
    Sending the accepted encrypted random number to the machine management device;
    The machine management device includes:
    Decrypting the transmitted encrypted random number using the first common key;
    Determining whether the decrypted random number matches the random number transmitted without encryption;
    The machine management system according to claim 1, wherein:
  4.  管理の対象である管理対象機械と、
     前記管理対象機械の観測情報を取得し、前記観測情報に基づいて生成される二次情報を使用する情報収集利用装置と、連携して、
     前記観測情報に基づいて前記二次情報を生成する機械管理装置であって、
     前記管理対象機械と共有され、前記観測情報を暗号化し復号化するための第1の共通鍵と、
     前記情報収集利用装置と共有され、前記二次情報を暗号化し復号化するための第2の共通鍵と、
     を格納している記憶部と、
     前記第1の共通鍵を使用して前記管理対象機械が暗号化した前記観測情報の入力を受け付けた前記情報収集利用装置から、前記受け付けた観測情報を受信すると、
     前記第1の共通鍵を使用して、前記送信された観測情報を復号化し、
     前記復号化された観測情報に基づいて前記二次情報を生成し、
     前記第2の共通鍵を使用して、前記生成された二次情報を暗号化し、
     前記暗号化された二次情報を前記情報収集利用装置に送信する制御部と、
     を有することを特徴とする機械管理装置。
    Managed machines that are the subject of management,
    Acquire observation information of the managed machine, in cooperation with an information collection and utilization device that uses secondary information generated based on the observation information,
    A machine management device that generates the secondary information based on the observation information,
    A first common key shared with the managed machine for encrypting and decrypting the observation information;
    A second common key shared with the information collection and utilization device for encrypting and decrypting the secondary information;
    A storage unit storing
    When receiving the received observation information from the information collection and utilization device that has received the input of the observation information encrypted by the managed machine using the first common key,
    Decrypting the transmitted observation information using the first common key;
    Generating the secondary information based on the decoded observation information;
    Encrypting the generated secondary information using the second common key;
    A control unit for transmitting the encrypted secondary information to the information collection and utilization device;
    A machine management device comprising:
  5.  前記機械管理装置の記憶部は、
     前記第2の共通鍵を暗号化し復号化するための公開鍵及び当該公開鍵と対になる秘密鍵を格納しており、
     前記機械管理装置の制御部は、
     前記情報収集利用装置からの要求に応じて、前記公開鍵を前記情報収集利用装置に送信し、
     前記情報収集利用装置が生成し前記送信された公開鍵を使用して暗号化した第2の共通鍵を前記情報収集利用装置から受信し、
     前記秘密鍵を使用して、前記受信された第2の共通鍵を復号化すること、
     を特徴とする請求の範囲第4項に記載の機械管理装置。
    The storage unit of the machine management device is
    A public key for encrypting and decrypting the second common key and a secret key paired with the public key are stored;
    The control unit of the machine management device is
    In response to a request from the information collection and utilization device, the public key is transmitted to the information collection and utilization device,
    Receiving from the information collection and utilization device a second common key generated by the information collection and utilization device and encrypted using the transmitted public key;
    Decrypting the received second common key using the secret key;
    The machine management device according to claim 4, wherein:
  6.  前記機械管理装置の制御部は、
     前記管理対象機械が、前記第1の共通鍵を使用して前記観測情報を暗号化するに先立って発生させた乱数を暗号化されていない状態で受信し、
     前記管理対象機械が、前記第1の共通鍵を使用して前記観測情報を暗号化する際に、前記第1の共通鍵を使用して暗号化した前記乱数を、前記暗号化された観測情報とともに、前記情報収集利用装置経由で受信し、
     前記受信された暗号化された乱数を、前記第1の共通鍵を使用して復号化し、
     前記復号化された乱数と、前記暗号化されていない状態で受信された乱数とが一致するか否かを判断すること、
     を特徴とする請求の範囲第4項に記載の機械管理装置。
    The control unit of the machine management device is
    The managed machine receives a random number generated prior to encrypting the observation information using the first common key in an unencrypted state;
    When the managed machine encrypts the observation information using the first common key, the random number encrypted using the first common key is converted into the encrypted observation information. And received via the information collection and utilization device,
    Decrypting the received encrypted random number using the first common key;
    Determining whether the decrypted random number matches the random number received in the unencrypted state;
    The machine management device according to claim 4, wherein:
  7.  管理の対象である管理対象機械と、
     前記管理対象機械の観測情報を取得し、前記観測情報に基づいて生成される二次情報を使用する情報収集利用装置と、
     前記観測情報に基づいて前記二次情報を生成する機械管理装置と、
     を有する機械管理システムの機械管理方法であって、
     前記機械管理装置及び前記管理対象機械は、
     前記観測情報を暗号化し復号化するための第1の共通鍵を共有して記憶しており、
     前記機械管理装置及び前記情報収集利用装置は、
     前記二次情報を暗号化し復号化するための第2の共通鍵を共有して記憶しており、
     前記管理対象機械は、
     前記第1の共通鍵を使用して前記観測情報を暗号化し、
     前記情報収集利用装置は、
     前記暗号化された観測情報の入力を受け付け、前記受け付けた観測情報を前記機械管理装置に送信し、
     前記機械管理装置は、
     前記第1の共通鍵を使用して、前記送信された観測情報を復号化し、
     前記復号化された観測情報に基づいて前記二次情報を生成し、
     前記第2の共通鍵を使用して、前記生成された二次情報を暗号化し、
     前記暗号化された二次情報を前記情報収集利用装置に送信し、
     前記情報収集利用装置は、
     前記第2の共通鍵を使用して、前記送信された二次情報を復号化し、
     前記復号化された二次情報を使用して、前記管理対象機械に対してサービスを実行する際に使用される情報を出力すること、
     を特徴とする機械管理方法。
    Managed machines that are the subject of management,
    An information collection and utilization device that acquires observation information of the managed machine and uses secondary information generated based on the observation information;
    A machine management device that generates the secondary information based on the observation information;
    A machine management method for a machine management system comprising:
    The machine management device and the managed machine are:
    Storing and sharing a first common key for encrypting and decrypting the observation information;
    The machine management device and the information collection and utilization device are:
    A second common key for encrypting and decrypting the secondary information is shared and stored;
    The managed machine is
    Encrypting the observation information using the first common key;
    The information collection and utilization device includes:
    Receiving the input of the encrypted observation information, transmitting the received observation information to the machine management device;
    The machine management device includes:
    Decrypting the transmitted observation information using the first common key;
    Generating the secondary information based on the decoded observation information;
    Encrypting the generated secondary information using the second common key;
    Sending the encrypted secondary information to the information collection and utilization device;
    The information collection and utilization device includes:
    Decrypting the transmitted secondary information using the second common key;
    Using the decrypted secondary information to output information used when performing a service on the managed machine;
    A machine management method characterized by the above.
  8.  前記機械管理装置は、
     前記第2の共通鍵を暗号化し復号化するための公開鍵及び当該公開鍵と対になる秘密鍵を記憶しており、
     前記情報収集利用装置からの要求に応じて、前記公開鍵を前記情報収集利用装置に送信し、
     前記情報収集利用装置は、
     前記第2の共通鍵を生成し、
     前記送信された公開鍵を使用して、前記生成された第2の共通鍵を暗号化し、
     前記暗号化された第2の共通鍵を前記機械管理装置に送信し、
     前記機械管理装置は、
     前記秘密鍵を使用して、前記送信された第2の共通鍵を復号化すること、
     を特徴とする請求の範囲第7項に記載の機械管理方法。
    The machine management device includes:
    Storing a public key for encrypting and decrypting the second common key and a secret key paired with the public key;
    In response to a request from the information collection and utilization device, the public key is transmitted to the information collection and utilization device,
    The information collection and utilization device includes:
    Generating the second common key;
    Encrypting the generated second common key using the transmitted public key;
    Transmitting the encrypted second common key to the machine management device;
    The machine management device includes:
    Decrypting the transmitted second common key using the secret key;
    The machine management method according to claim 7, wherein:
  9.  前記管理対象機械は、
     前記第1の共通鍵を使用して前記観測情報を暗号化するに先立って、乱数を発生させ、前記発生させた乱数を暗号化せずに前記機械管理装置に送信し、
     前記第1の共通鍵を使用して前記観測情報を暗号化する際に、前記第1の共通鍵を使用して前記発生させた乱数を暗号化し、
     前記情報収集利用装置は、
     前記暗号化された観測情報の入力を受け付ける際に、前記暗号化された乱数の入力を受け付け、
     前記受け付けた暗号化された乱数を前記機械管理装置に送信し、
     前記機械管理装置は、
     前記送信された暗号化された乱数を、前記第1の共通鍵を使用して復号化し、
     前記復号化された乱数と、前記暗号化せずに送信された乱数とが一致するか否かを判断すること、
     を特徴とする請求の範囲第7項に記載の機械管理方法。
    The managed machine is
    Prior to encrypting the observation information using the first common key, generating a random number, and transmitting the generated random number to the machine management device without encryption;
    When encrypting the observation information using the first common key, encrypting the generated random number using the first common key;
    The information collection and utilization device includes:
    When accepting the input of the encrypted observation information, accepting the input of the encrypted random number,
    Sending the accepted encrypted random number to the machine management device;
    The machine management device includes:
    Decrypting the transmitted encrypted random number using the first common key;
    Determining whether the decrypted random number matches the random number transmitted without encryption;
    The machine management method according to claim 7, wherein:
PCT/JP2010/067049 2010-09-30 2010-09-30 Machine management system, machine management device and machine management method WO2012042633A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2010/067049 WO2012042633A1 (en) 2010-09-30 2010-09-30 Machine management system, machine management device and machine management method
JP2012536079A JP5681198B2 (en) 2010-09-30 2010-09-30 Machine management system, machine management apparatus, and machine management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2010/067049 WO2012042633A1 (en) 2010-09-30 2010-09-30 Machine management system, machine management device and machine management method

Publications (1)

Publication Number Publication Date
WO2012042633A1 true WO2012042633A1 (en) 2012-04-05

Family

ID=45892137

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2010/067049 WO2012042633A1 (en) 2010-09-30 2010-09-30 Machine management system, machine management device and machine management method

Country Status (2)

Country Link
JP (1) JP5681198B2 (en)
WO (1) WO2012042633A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003223521A (en) * 2002-01-29 2003-08-08 Mitsubishi Electric Corp Facility management system and method
JP2005217466A (en) * 2004-01-27 2005-08-11 Yokogawa Electric Corp Monitoring system
JP2008033642A (en) * 2006-07-28 2008-02-14 Fuji Xerox Co Ltd Failure recovery support system, equipment, and program
JP2008251042A (en) * 2008-06-13 2008-10-16 Hitachi High-Technologies Corp Remote maintenance system
JP2010039565A (en) * 2008-07-31 2010-02-18 Digital Electronics Corp Equipment information management system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003223521A (en) * 2002-01-29 2003-08-08 Mitsubishi Electric Corp Facility management system and method
JP2005217466A (en) * 2004-01-27 2005-08-11 Yokogawa Electric Corp Monitoring system
JP2008033642A (en) * 2006-07-28 2008-02-14 Fuji Xerox Co Ltd Failure recovery support system, equipment, and program
JP2008251042A (en) * 2008-06-13 2008-10-16 Hitachi High-Technologies Corp Remote maintenance system
JP2010039565A (en) * 2008-07-31 2010-02-18 Digital Electronics Corp Equipment information management system

Also Published As

Publication number Publication date
JPWO2012042633A1 (en) 2014-02-03
JP5681198B2 (en) 2015-03-04

Similar Documents

Publication Publication Date Title
CN102387343B (en) Terminal unit, server, data handling system, data processing method
CN103238295B (en) System and method for hosting encrypted monitoring data
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN104365127B (en) Method for following the trail of mobile device in remote display unit
JP5311459B2 (en) Information collection system and external access device
CN103870525A (en) Secure search processing system and secure search processing method
JP2016224400A (en) Similar information search method, terminal device, and similar information search system
CN108965279A (en) Data processing method, device, terminal device and computer readable storage medium
JP5404501B2 (en) Encrypted information expiration date extension system, expiration date extension method and program
KR102245886B1 (en) Analytics center and control method thereof, and service providing device and control method thereof in co-operational privacy protection communication environment
US20130262600A1 (en) Image processing apparatus
JP5681198B2 (en) Machine management system, machine management apparatus, and machine management method
KR101398033B1 (en) Remote control system and method using short message
JP2011172099A (en) Data transfer method, data transfer system, data transmitting apparatus, data management apparatus, data decrypting apparatus and computer program
CN106972928B (en) Bastion machine private key management method, device and system
CN103986570A (en) Safe data transmission method of smart instrument system
JP2015138336A (en) Management method of electronic data, program therefor, and recording medium for program
JP4864566B2 (en) Attribute authentication method, key management device, service providing destination device, service providing source device, and attribute authentication system
JP6919484B2 (en) Cryptographic communication method, cryptographic communication system, key issuing device, program
JP5794416B2 (en) Remote maintenance system and remote maintenance method
JP2020187247A (en) Data management device, user information notification device, user information acquisition device, and program therefor
JP7000925B2 (en) Data processing system and encryption key sharing method
US20110231303A1 (en) Terminal device and digital content managing apparatus
JP2008011100A (en) Attribute authentication method, attribute certificate generating apparatus, service provision destination apparatus, service provision source apparatus, and attribute authentication system
CN101477574A (en) Encryption and decryption method for data in data base

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10857846

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2012536079

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10857846

Country of ref document: EP

Kind code of ref document: A1