WO2017217476A1 - Terminal pour système de surveillance à distance, programme de surveillance à distance, et système de surveillance à distance - Google Patents

Terminal pour système de surveillance à distance, programme de surveillance à distance, et système de surveillance à distance Download PDF

Info

Publication number
WO2017217476A1
WO2017217476A1 PCT/JP2017/022026 JP2017022026W WO2017217476A1 WO 2017217476 A1 WO2017217476 A1 WO 2017217476A1 JP 2017022026 W JP2017022026 W JP 2017022026W WO 2017217476 A1 WO2017217476 A1 WO 2017217476A1
Authority
WO
WIPO (PCT)
Prior art keywords
connection
connection port
user terminal
remote monitoring
terminal device
Prior art date
Application number
PCT/JP2017/022026
Other languages
English (en)
Japanese (ja)
Inventor
一裕 小澤
Original Assignee
株式会社エム・クレスト
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from JP2017087977A external-priority patent/JP6380902B2/ja
Application filed by 株式会社エム・クレスト filed Critical 株式会社エム・クレスト
Priority to CN201780050380.1A priority Critical patent/CN109952561B/zh
Priority to KR1020197036343A priority patent/KR20190139334A/ko
Priority to KR1020197001388A priority patent/KR102057295B1/ko
Priority to US16/310,716 priority patent/US20190373062A1/en
Publication of WO2017217476A1 publication Critical patent/WO2017217476A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems

Definitions

  • the present invention relates to a remote monitoring system that monitors various terminals connected via the Internet or the like, and more particularly to a remote monitoring system that enables connection with various terminals to be monitored at an arbitrary timing.
  • IoT Internet of Things
  • the Internet of Things has attracted attention, including fields such as monitoring.
  • IoT is a mechanism in which a uniquely identifiable computer or device is connected to the Internet, and devices mutually control each other by exchanging information.
  • the device includes all things such as measuring devices such as various sensors, surveillance cameras, and devices for daily life such as air conditioners and cooking devices.
  • IoT for example, in an information processing system called Industrial Internet, devices and people can be connected, data can be acquired in real time, and actions based on this can be performed to improve device operation efficiency. The effect of reducing human waiting time is expected.
  • Patent Document 1 As a technique related to IoT, for example, techniques described in Patent Document 1 and Patent Document 2 have been proposed.
  • a workflow management device holds a transition condition from each stage to the next stage and stage information indicating the current stage of the workflow for a workflow that controls the operation of an IoT device over a plurality of stages.
  • stage information indicating the current stage of the workflow for a workflow that controls the operation of an IoT device over a plurality of stages.
  • the workflow management device determines that the workflow is the third stage after the first stage when the transition condition of the first stage is satisfied but the transition condition of the second stage is not satisfied.
  • the technique of updating stage information to show that it is also a 2nd stage is disclosed.
  • the stage is a temperature collection stage, an average temperature calculation stage, an energy accounting calculation stage, or the like.
  • Patent Document 2 also deploys a device configuration when a complete solution template is selected upon selection of a solution template for a specific automatic interaction device configuration between two or more IoT devices. To do. Otherwise, receive IoT device selection, access device functions in the IoT database of the selected IoT device, set up a network connection between the selected IoT devices, and simulate the device configuration in the IoT database Determine whether the device configuration is available. Techniques are disclosed for reconfiguring a device configuration to include an alternative IoT device if it is not available and deploying the device configuration if it is available. Here, the device configuration is to establish a communication connection between two or more IoT devices via a network.
  • Patent Document 1 only discloses a workflow management apparatus that controls the operation of an IoT device over a plurality of stages.
  • the IoT device transmits the status of the device to be monitored via the Internet service provider (ISP) to the cloud server via the Internet, and the cloud server holds the device to be monitored.
  • ISP Internet service provider
  • the cloud server holds the device to be monitored. From the viewpoint of application to a remote monitoring system that periodically (predetermined) transmission to a user terminal device of an operator or a business operator who undertakes maintenance of equipment to be monitored.
  • a plurality of terminals (IoT devices) connected to an Internet service provider (ISP) having one global IP address have different private IP addresses, respectively.
  • the number of events assigned by is increasing significantly. Therefore, if access to a plurality of terminals (IoT devices) is required from the user terminal device, the user terminal device can access the Internet service provider (ISP) via the Internet, but the Internet service provider ( The private IP addresses assigned to a plurality of terminals (IoT devices) connected to the ISP) are not acquired, and it is difficult to access the plurality of terminals (IoT devices) at a desired timing.
  • Patent Document 1 no consideration is given to dealing with such a situation.
  • Patent Document 2 although communication connection between two or more IoT devices can be established with each other, as described above, in the remote monitoring system, the user terminal device is temporarily connected to a plurality of terminals (IoT devices). When access is required, the user terminal device is accessible to the Internet service provider (ISP) via the Internet, but is assigned to a plurality of terminals (IoT devices) connected to the Internet service provider (ISP). It is difficult to access a plurality of terminals (IoT devices) at a desired timing without acquiring a private IP address. In Patent Document 2, no consideration is given to dealing with such a situation.
  • ISP Internet service provider
  • IoT devices Internet service provider
  • An object of the present invention is to provide a remote monitoring system terminal, a remote monitoring program, and remote monitoring that can be accessed from a user terminal device at a desired timing to a plurality of terminals connected to the Internet via an Internet service provider. To provide a system.
  • a remote monitoring system of the present invention is connected to the Internet via a plurality of terminals assigned with private IP addresses and connected to the Internet via an Internet service provider having a global IP address.
  • a cloud server and a user terminal device connected to the cloud server, wherein the cloud server assigns a first connection port to one terminal of the plurality of terminals, and the user terminal device includes a second connection port. The one terminal and the user terminal device communicate with each other via the first connection port, the second connection port, and the cloud server.
  • the cloud server randomly assigns the first connection port and the second connection port to the one terminal and the user terminal device, respectively.
  • another aspect of the remote monitoring system of the present invention is characterized in that the user terminal device transmits a connection request to one terminal of the plurality of terminals to the cloud server.
  • the cloud server assigns a different first connection port to the plurality of terminals for each connection request to one terminal among the plurality of terminals transmitted from the user terminal device.
  • a connection port assigning unit for assigning a different second connection port to the user terminal device.
  • the cloud server includes: the one terminal to which the first connection port is assigned; and the user terminal device to which the second connection port is assigned. It has a connection time management part which makes it possible to continue communication for a predetermined time.
  • the user terminal device has at least one IP address, one of the plurality of terminals to be connected, and a connection time to the cloud server. It is characterized by transmitting.
  • connection time management unit is configured to pass the first connection port and the second connection port when the connection time transmitted from the user terminal device has elapsed. The communication between one terminal and the user terminal device is cut off.
  • the plurality of terminals are connected to a measuring device and / or an imaging device by wire or wireless, respectively, and the target terminal or target device measured by the measuring device.
  • the measurement value and / or image data of the target terminal or target device imaged by the imaging device is transmitted to the cloud server via the Internet service provider and the Internet at a predetermined cycle.
  • the user terminal device transmits a connection request to a lower device connected to one terminal of the plurality of terminals to the cloud server,
  • the terminal receives the connection request from the cloud server, the terminal connects communication with the user terminal device to the lower-level device.
  • the user terminal device is a terminal selection screen for selecting one terminal of the plurality of terminals, and one terminal selected on the terminal selection screen.
  • the cloud server is connected to the lower-level device. The connection request is transmitted.
  • the remote monitoring system terminal of the present invention is connected to the Internet via an Internet service provider having a global IP address, and is a plurality of terminals assigned with private IP addresses.
  • the terminal is connected via a cloud server and the Internet.
  • a first connection port different from a second connection port assigned to the user terminal device by the cloud server is randomly assigned.
  • another aspect of the remote monitoring system terminal of the present invention is to continuously communicate with the user terminal device to which the second connection port has been assigned for a predetermined time via the first connection port. It is characterized by.
  • a tunneling connection that communicates with the user terminal device to which the second connection port is assigned via the first connection port has elapsed for a predetermined time. It is characterized by having a tunneling connection disconnection execution unit that sometimes disconnects.
  • the terminal when the terminal is connected to a lower level device and receives a connection request from the cloud server to the lower level device, the user terminal device and the terminal It is possible to communicate with a lower device.
  • the remote monitoring program of the present invention assigns a first connection port to one terminal among a plurality of terminals assigned a private IP address, which is connected to the Internet via an Internet service provider having a global IP address, Allocating a second connection port to a user terminal device connected to the cloud server connected to the Internet, and causing a processor to execute a function of randomly assigning the first connection port and the second connection port.
  • communication between one terminal assigned with the first connection port and a user terminal device assigned with the second connection port is continued for a predetermined time.
  • a remote monitoring system terminal which are accessible from a user terminal device to a plurality of terminals connected to the Internet via an Internet service provider at a desired timing. It becomes possible to provide.
  • FIG. 1 is an overall schematic configuration diagram of a remote monitoring system according to an embodiment of the present invention. It is a functional block diagram of the cloud server shown in FIG. It is a functional block diagram of the terminal shown in FIG. It is a functional block diagram of the user terminal device shown in FIG. It is a schematic sequence diagram of the remote monitoring system shown in FIG. It is a schematic sequence diagram of the remote monitoring system shown in FIG. It is a schematic sequence diagram of the remote monitoring system shown in FIG. It is a schematic sequence diagram of a remote monitoring system when a user (user) directs disconnection. It is a schematic sequence diagram of the remote monitoring system at the time of the cutting
  • a “remote monitoring system” is a system that monitors the state of a target terminal or target device and / or provides maintenance for the target terminal or target device or information related to maintenance.
  • Remote maintenance system remote maintenance system
  • remote monitoring system remote monitoring system
  • FIG. 1 is an overall schematic configuration diagram of a remote monitoring system according to an embodiment of the present invention.
  • the remote monitoring system 1 includes a user terminal device 3a that is a personal computer owned by a user (user) 3, a user terminal device 3b such as a smartphone (mobile phone) or a tablet, and a router 3c. , A cloud server 2, a remote monitoring system terminal 4 including a plurality of terminals 4 a to 4 c, the Internet 5, and an Internet service provider (ISP) 6.
  • ISP Internet service provider
  • the cloud server 2 is a server that is virtually constructed by connecting a plurality of servers, and FIG. 1 shows an example in which the cloud server 2 is constructed by connecting three servers.
  • the cloud server 2 only needs to be constructed by a plurality of servers, and is not limited to the three servers shown in FIG. 1, and the number of the servers is set as appropriate.
  • the user terminal device 3a and the user terminal device 3b are connected to the cloud server 2 via a router 3c or a general public line.
  • the user terminal device 3a, the user terminal device 3b, and the router 3c are connected to each other by, for example, Wi-Fi (registered trademark of Softbank BB Corp.) or a wired LAN (Local Area Network).
  • Wi-Fi registered trademark of Softbank BB Corp.
  • wired LAN Local Area Network
  • Various measured values hereinafter, unless otherwise specified, image data or various measured values are simply referred to as “various measured values”
  • ISP Internet service provider
  • the Internet service provider (ISP) 6 transmits various measurement values received from the terminal 4 including the plurality of terminals 4 a to 4 c to the cloud server 2 via the Internet 5. That is, in the remote monitoring system 1 shown in FIG. 1, various measured values are transmitted from the terminal 4 to the cloud server 2 via the Internet service provider (ISP) 6 and the Internet 5 in a predetermined cycle by IoT on the uplink.
  • ISP Internet service provider
  • the desired terminal 4 is sent from the user terminal device 3a or the user terminal device 3b to the cloud server 2 at a timing at which various measured values are transmitted from the terminal 4 at a predetermined cycle on the uplink or at a different timing.
  • An access request for access to (that is, a connection request to one of a plurality of terminals) is transmitted.
  • the cloud server 2 randomly assigns connection ports to the user terminal device 3a or the user terminal device 3b and one of the terminals 4a to 4c constituting the terminal 4.
  • the tunneling 7 enables communication between the user terminal device 3a or the user terminal device 3b and one of the terminals 4a to 4c constituting the terminal 4 via the Internet 5 and the Internet service provider (ISP) 6. To do.
  • ISP Internet service provider
  • the tunneling 7 connects the user terminal device 3a or the user terminal device 3b and one of the terminals 4a to 4c constituting the terminal 4 via the cloud server 2 so that they can communicate with each other, for example, Since SSH (Secure Shell) connection is established, communication on all networks including an authentication part such as a password is encrypted, and it becomes possible to communicate safely.
  • SSH Secure Shell
  • a global IP address (Global Internet Protocol Address) is uniquely assigned to the Internet service provider (ISP) 6.
  • a plurality of terminals 4a, 4b, and 4c constituting the terminal 4 connected to the Internet service provider (ISP) 6 by wireless communication such as a 3G line are respectively connected to the private IP by the Internet service provider (ISP) 6.
  • An address (Private Internet Protocol Address) is assigned.
  • IP addresses include, for example, IPv4 which is a 32-bit numerical value or IPv6 which is a 128-bit numerical value.
  • IPv4 which is a 32-bit numerical value
  • IPv6 which is a 128-bit numerical value
  • private IP addresses assigned to the plurality of terminals 4a, 4b, and 4c constituting the terminal 4 for example, “10.0.0.0” to “10.255.255.255” ( Class A), “172.16.0.0” to “172.23.255.255” (class B), or “192.168.0.0” to “192.168.255.255” ( Any of class C) is used.
  • the Internet service provider (ISP) 6 includes a broadband router (not shown), and transmits various measured values from the plurality of terminals 4a, 4b, and 4c constituting the terminal 4 on the above-described uplink in a predetermined cycle on the Internet. 5, a network address translation (NAT) function that translates private IP addresses assigned to the terminals 4 a, 4 b, and 4 c into global IP addresses when transmitting to the cloud server 2 via the network server 5 is provided.
  • a broadband router (not shown) further has a network address port translation (NAPT) function for converting to a different port number for each private IP address.
  • NAPT network address port translation
  • FIG. 2 is a functional block diagram of the cloud server shown in FIG. 2, the cloud server 2 includes an input unit 201, a display unit 202, an input I / F 203, an output I / F 204, an identification information management unit 205, a relay unit 206, an access request reception unit 207, and a communication I / F 208.
  • the identification information management unit 205, the relay unit 206, the access request reception unit 207, the authentication unit 211, the connection port assignment unit 212, and the connection time management unit 213 include, for example, a ROM for storing various programs (not shown) and a calculation process This is realized by a memory such as a RAM that temporarily stores the data and a processor such as a CPU that reads and executes a program stored in the ROM.
  • the terminal identification information storage unit 209 stores a unique identifier made up of alphanumeric characters assigned to the plurality of terminals 4a, 4b, and 4c constituting the terminal 4, respectively.
  • the user terminal device storage unit 210 stores at least user information, connection authority, identification information, and the like of the user terminal device 3a and the user terminal device 3b that can be connected to the cloud server 2.
  • the identification information management unit 205 reads the identification information allocated to each of the terminals 4a to 4c with reference to the terminal identification information storage unit 209 and / or the user terminal device storage unit 210 as necessary via the internal bus 214. Moreover, the identification information of the user terminal device 3a and the user terminal device 3b is read. When the number of user terminal devices connectable to the cloud server 2 is increased, user information such as user terminal device identification information and a user name input via the input unit 201 and the input I / F 203 is displayed as an identification information management unit. 205 is updated and registered in the user terminal device storage unit 210 via the internal bus 214. Similarly, when a new terminal 4 is added, identification information of the terminal 4 input via the input unit 201 and the input I / F 203 is input to the identification information management unit 205 via the internal bus 214. Update registration is performed in the information storage unit 209.
  • the access request accepting unit 207 receives the information of the terminal 4 desired to be accessed, the desired connection time, and the IP address of the user terminal device 3a or the user terminal device 3b from the user terminal device 3a or the user terminal device 3b. Accepted via F208 and the internal bus 214. Further, the access request receiving unit 207 receives a tunneling connection release request from the user terminal device 3 a or the user terminal device 3 b via the communication I / F 208 and the internal bus 214.
  • the authentication unit 211 encrypts authentication information for enabling the terminal 4 to connect to the cloud server 2 (for example, SSH), and transmits it to the corresponding terminal 4 via the internal bus 214 and the communication I / F 208. Based on the authentication information from the terminal 4, whether tunneling is possible is determined.
  • the cloud server 2 for example, SSH
  • connection port assignment unit 212 For each access request, the connection port assignment unit 212 sets one of the two connection ports indicated by two numbers randomly selected from 10000 to 65535 as the first connection port and the other as the second connection port. Connection port. Then, the connection port assignment unit 212 assigns the first connection port to one of the terminals 4a to 4c constituting the terminal 4, and assigns the second connection port to the user terminal device 3a or the user terminal device 3b.
  • the relay unit 206 relays the maintenance / status grasping work request transmitted from the user terminal device 3a or the user terminal device 3b to the second connection port from the second connection port to the first connection port during tunneling. Then, the data is transmitted to one of the terminals 4a to 4c constituting the terminal 4. In addition, as a result of the maintenance / status grasping work request, various measured values transmitted from one of the terminals 4a to 4c constituting the terminal 4 to the first connection port are transmitted from the first connection port to the first connection port. 2 to the connection port, and various measurement values are transmitted to the user terminal device 3a or the user terminal device 3b. When the tunneling connection is established, the relay unit 206 changes the status of the tunneling connection from not connected to being connected.
  • the connection time management unit 213 has a tunneling connection time monitoring function. Specifically, the connection time management unit 213 starts a timer (not shown) at the start of tunneling, and forcibly terminates the tunneling connection when a predetermined time (for example, several minutes to several tens of minutes) has elapsed. Change the connection status from connected to not connected.
  • a predetermined time for example, several minutes to several tens of minutes
  • the cloud server 2 may further include a storage unit (not shown), and may be configured to store history information indicating which terminal 4 is accessed (tunnel connection) from which user terminal device.
  • the cloud server 2 periodically performs PING and TCP port monitoring with respect to the terminal 4, that is, transmits a PING packet to the terminal 4 or makes a TCP connection, and if the terminal 4 does not return a PING packet or the TCP connection is established.
  • FIG. 3 is a functional block diagram of the terminal 4 shown in FIG.
  • the functional block diagram of the terminal 4a is shown as an example, but the same applies to the other terminals 4b and 4c.
  • the terminal 4 a includes an access request monitoring unit 301, a tunneling request generation unit 302, an authentication information decryption unit 303, a measurement value acquisition unit 304, a communication I / F 305, a storage unit 306, and a tunneling connection disconnection request monitor.
  • the access request monitoring unit 301, the tunneling request generation unit 302, the authentication information decoding unit 303, the measurement value acquisition unit 304, the tunneling connection disconnection request monitoring unit 307, the tunneling connection disconnection execution unit 308, and the login authentication unit 309 are: For example, a ROM for storing various programs (not shown), a memory such as a RAM for temporarily storing operation process data, etc., and a processor such as a CPU for reading and executing a program stored in the ROM (that is, a remote monitoring program) It is realized by.
  • the access request monitoring unit 301 inquires of the cloud server 2 via the communication I / F 305 and the Internet service provider (ISP) 6 whether or not there is an access request from the user terminal device 3a or the user terminal device 3b at a predetermined cycle. A reply from the server 2 is received and the access request is monitored.
  • ISP Internet service provider
  • the authentication information decrypting unit 303 receives and receives encrypted authentication information received from the cloud server 2 via the communication I / F 305. Decrypt the encrypted authentication information.
  • the authentication information decryption unit 303 transmits the decrypted authentication information to the cloud server 2 via the communication I / F 305 and the Internet service provider (ISP) 6 by, for example, SSH.
  • ISP Internet service provider
  • the tunneling request generation unit 302 generates a tunneling request when tunneling is necessary as a result of monitoring by the access request monitoring unit 301.
  • the tunneling request generation unit 302 transmits the generated tunneling request to the cloud server 2 via the communication I / F 305 and the Internet service provider (ISP) 6 by, for example, SSH.
  • ISP Internet service provider
  • the login authentication unit 309 transmits a request for the ID and password of the user terminal device that is tunnel-connected to the cloud server 2, and executes login authentication of the corresponding user terminal device based on the ID and password received from the cloud server 2. .
  • the measurement value acquisition unit 304 acquires various measurement values of the target terminal or target device measured by the measurement device 8 via the communication I / F 305 and stores them in a predetermined storage area of the storage unit 306 via the internal bus 310. Write.
  • the measurement value acquisition unit 304 transmits the above various measurement values on the uplink to the cloud server 2 via the communication I / F 305, the Internet service provider (ISP) 6, and the Internet 5 at a predetermined cycle by IoT. . Further, the measurement value acquisition unit 304 receives a maintenance / status grasping work request from a user terminal device, which will be described in detail later, via the communication I / F 305 and stores the request in the storage unit 306 corresponding to the work request.
  • ISP Internet service provider
  • the various measurement values are read out and transmitted to the cloud server 2.
  • the measurement value acquisition unit 304 may read the various measurement values at a different timing and transmit them to the cloud server 2. Note that the measurement value acquisition unit 304 may perform a process such as noise removal on the acquired various measurement values.
  • the storage unit 306 stores various measurement values of the target terminal or target device measured by the measurement device 8 in association with the date and time.
  • the tunneling connection disconnection request monitoring unit 307 inquires the cloud server 2 about the presence of a tunneling connection disconnection request via the communication I / F 305, the Internet service provider (ISP) 6 and the Internet 5 at a predetermined cycle, and makes a tunneling connection. If there is a disconnection request, the fact is transferred to the tunneling connection disconnection execution unit 308 via the internal bus 310.
  • ISP Internet service provider
  • the tunneling connection disconnection execution unit 308 When the tunneling connection disconnection execution unit 308 receives information indicating that a tunneling connection disconnection request has been received from the tunneling connection disconnection request monitoring unit 307 via the internal bus 310, the tunneling connection disconnection information is immediately disconnected and information indicating that the tunneling connection disconnection execution unit 308 has been disconnected. Alternatively, the signal is transmitted to the cloud server 2 via the communication I / F 305, the Internet service provider (ISP) 6, and the Internet 5.
  • ISP Internet service provider
  • the tunneling connection disconnection execution unit 308 includes a timer (not shown), starts the timer to disconnect the tunneling connection when the connection time acquired from the cloud server 2 via the communication I / F 305 elapses, and activates the timer (connection time When the time elapses, the tunneling connection is disconnected, and information or a signal indicating the disconnection is transmitted to the cloud server 2 via the communication I / F 305, the Internet service provider (ISP) 6, and the Internet 5.
  • a timer not shown
  • FIG. 4 is a functional block diagram of the user terminal device shown in FIG.
  • the functional block diagram of the user terminal device 3a is shown as an example, but the same applies to the other user terminal devices 3b.
  • the user terminal device 3a includes an input unit 401, a display unit 402, an input I / F 403, an output I / F 404, a calculation unit 405, a communication I / F 406, a storage unit 407, and these components connected to each other.
  • An internal bus 409 is provided.
  • the user terminal device 3a includes a battery unit 408 that includes a power source and a battery.
  • the calculation unit 405 includes, for example, a ROM for storing various programs (not shown), a memory such as a RAM for temporarily storing calculation process data, and a CPU for reading and executing the programs stored in the ROM. Realized by a processor.
  • the input unit 401 includes, for example, a keyboard and a mouse.
  • the input unit 401 includes an access request to a desired terminal 4, an ID and a password that are input at the time of login for tunneling connection, and a request for maintenance / status grasping described later. Are input to the input I / F 403.
  • the input I / F 403 transmits input information such as the access request, ID and password, and maintenance / status grasping work request to the cloud server 2 via the internal bus 409, the communication I / F 406, and the router 3c. .
  • the output I / F 404 receives various measured values from one of the terminals 4a to 4c constituting the terminal 4 connected by tunneling in response to the maintenance / status grasping request, and the communication I / F 406. And the measurement values are output to the display unit 402 and displayed on the display screen.
  • the storage unit 407 includes at least its own IP address, parameters used for various calculations by the calculation unit 405, and a target terminal or target terminal of a target device that is acquired in response to the maintenance / status grasping work request. Stores various measurement values of the target device.
  • the calculation unit 405 has a function of reading a desired application program from a ROM (not shown) and executing it, and outputting the calculation result to the display unit 402 via the internal bus 409 and the output I / F 404.
  • FIG. 6 to 7 are schematic sequence diagrams of the remote monitoring system
  • FIG. 8 is a schematic sequence diagram of the remote monitoring system when a user (user) instructs disconnection
  • FIG. 9 is a disconnection by the timer function. It is a schematic sequence diagram of the remote monitoring system.
  • the access request monitoring unit 301 constituting the terminal 4b informs the cloud server 2 whether or not there is an access request to the desired terminal 4 at a predetermined cycle (whether tunneling is necessary). Inquiries are made via the communication I / F 305, the Internet service provider (ISP) 6, and the Internet 5 (S101).
  • the access request reception unit 207 constituting the cloud server 2 does not receive an access request from the user terminal device 3a
  • the access request reception unit 207 notifies the terminal 4b via the Internet 5 and the Internet service provider (ISP) 6 that there is no need for tunneling. Transmit (S102).
  • these processes are executed at a predetermined cycle, as also shown in S103 and S104.
  • the user terminal device 3a sends an access request to the terminal 4b to the cloud server 2 via the communication I / F 406 and the router 3c, including, for example, a predetermined connection time and the IP address of the user terminal device 3a itself that is the connection source. (S105).
  • the identification information management unit 205 accesses the user terminal device storage unit 210 and makes an access request.
  • the connection source is specified as the user terminal device 3a by the included IP address.
  • the identification information management unit 205 accesses the terminal identification information storage unit 209 and acquires the identification information of the terminal 4b that is the connection destination.
  • the connection port assignment unit 212 acquires two connection ports at random. If the acquired two connection ports (No. X, No. Y) are not in use, the connection port assignment unit 212 reserves the first connection port (No.
  • connection port allocation unit 212 arbitrarily selects one server (server address “Z”) from a plurality of servers constituting the cloud server 2 to which the user terminal device 3a is connected (S106).
  • the access request reception unit 207 configuring the cloud server 2 receives presence / absence of access request (whether tunneling is necessary) from the access request monitoring unit 301 configuring the terminal 4b (S107), and configures the cloud server 2
  • the connection port allocating unit 212 indicates that tunneling is necessary, the server address “Z” to be connected (hereinafter referred to as server Z), the first connection port (No. X), the predetermined connection time, and the encrypted Along with the authentication information, it is transmitted to the terminal 4b via the Internet 5 and the Internet service provider (ISP) 6 (S108).
  • the authentication information decryption unit 303 constituting the terminal 4b decrypts the encrypted authentication information received from the cloud server 2. Further, the tunneling request generation unit 302 that configures the terminal 4b generates a tunneling request, and sends the generated tunneling request to the cloud server 2 via the communication I / F 305 and the Internet service provider (ISP) 6, for example, by SSH. The information is transmitted to the server Z to be configured (S109).
  • ISP Internet service provider
  • the server Z transmits an authentication information transmission request to the terminal 4b via the Internet 5 and the Internet service provider (ISP) 6 (S110).
  • the authentication information decryption unit 303 constituting the terminal 4b transmits the decrypted authentication information to the server Z via the communication I / F 305 and the Internet service provider (ISP) 6, for example, by SSH (S111).
  • the authentication unit 211 constituting the server Z determines whether tunneling is possible based on the received authentication information, and transmits a connection permission notification to the terminal 4b via the Internet 5 and the Internet service provider (ISP) 6 (S112).
  • the tunneling request generation unit 302 constituting the terminal 4b communicates with the server Z to the first connection port (No. X). Transmits a request to transmit to itself via the Internet service provider (ISP) 6 and the Internet 5 (S113).
  • the access request receiving unit 207 constituting the server Z transmits a signal (Ack) indicating that the server Z has been acknowledged to the terminal 4b via the Internet 5 and the Internet service provider (ISP) 6 (S114).
  • the tunneling connection disconnection execution unit 308 constituting the terminal 4b starts a timer (not shown) to disconnect after a predetermined connection time received by the connection port assignment unit 212 previously constituting the server Z (S115).
  • the relay unit 206 constituting the server Z activates a service that relays access to the second connection port (No. Y) from the user terminal device 3a to the first connection port (No. X).
  • the connection time management unit 213 constituting the server Z starts a timer (not shown) so as to be disconnected after a predetermined connection time (S116).
  • the relay unit 206 changes the status of the tunneling connection from not connected to being connected.
  • the connection port assignment unit 212 constituting the server Z transmits to the user terminal device 3a that the server to be connected is the server Z and the connection port is the second connection port (Y number) (S117).
  • the user terminal device 3a transmits a connection request to the second connection port (No. Y) to the server Z (S118).
  • the relay unit 206 constituting the server Z relays from the second connection port (No. Y) to the first connection port (No. X), and flows access to the first connection port (No. X) to the terminal 4b. (S119).
  • the relay unit 206 constituting the server Z transmits a connection request to the terminal 4b via the communication I / F 208, the Internet 5, and the Internet service provider (ISP) 6 (S200).
  • the login authentication unit 309 constituting the terminal 4b transmits a request for the ID and password of the user terminal device 3a to the server Z via the communication I / F 305, the Internet service provider (ISP) 6, and the Internet 5 (S201). .
  • the relay unit 206 constituting the server Z relays from the first connection port (No. X) to the second connection port (Y No.) (S202). Then, the relay unit 206 transmits an ID / password transmission request to the user terminal device 3a (S203).
  • the input unit 401 constituting the user terminal device 3a inputs the ID and password necessary for login during tunneling connection. The data is transmitted to the server Z via the input I / F 403, the internal bus 409, and the communication I / F 406 (S204).
  • the relay unit 206 constituting the server Z relays from the second connection port (No. Y) to the first connection port (No. X), and flows access to the first connection port (No. X) to the terminal 4b. (S205).
  • the relay unit 206 constituting the server Z transmits the ID and password of the user terminal device 3a to the terminal 4b via the communication I / F 208, the Internet 5 and the Internet service provider (ISP) 6 (S206).
  • the login authentication unit 309 constituting the terminal 4b executes login authentication based on the ID and password of the user terminal device 3a transmitted from the server Z, and indicates that it is OK (permission notification) to the Internet service provider (ISP) 6 And it transmits to the server Z via the Internet 5 (S207).
  • the relay unit 206 constituting the server Z relays from the first connection port (No. X) to the second connection port (No. Y) (S208). And the relay part 206 transmits that the result of login authentication is OK (permission notification) to the user terminal device 3a (S209).
  • the input unit 401 configuring the user terminal device 3a requests a maintenance / status grasping operation request. Is transmitted to the server Z via the input I / F 403, the internal bus 409, and the communication I / F 406 (S210).
  • the relay unit 206 constituting the server Z relays from the second connection port (No. Y) to the first connection port (No. X), and flows access to the first connection port (No. X) to the terminal 4b. (S211).
  • the relay unit 206 constituting the server Z transmits a request for maintenance / status grasping work to the terminal 4b via the communication I / F 208, the Internet 5, and the Internet service provider (ISP) 6 (S212).
  • the measurement value acquisition unit 304 When the measurement value acquisition unit 304 constituting the terminal 4 b receives a maintenance / status grasping operation request via the communication I / F 305, the measurement value acquisition unit 304 accesses the storage unit 306 via the internal bus 310 and stores the request in the storage unit 306.
  • the process execution results corresponding to the above various measurement values and work requests are read out and transmitted to the server Z via the Internet service provider (ISP) 6 and the Internet 5 as the maintenance / status grasping work request results (S213).
  • ISP Internet service provider
  • the relay unit 206 constituting the server Z relays from the first connection port (No. X) to the second connection port (No. Y) (S214). And the relay part 206 transmits the process execution result according to the various measurement values and work request of an object terminal or an object apparatus to the user terminal device 3a as a request result of the maintenance / status grasping work (S215).
  • the tunneling connection disconnection request monitoring unit 307 constituting the terminal 4 b transmits to the server Z via the communication I / F 305, the Internet service provider (ISP) 6, and the Internet 5 at a predetermined cycle.
  • An inquiry is made as to whether there is a tunneling connection disconnection request (S301).
  • the access request receiving unit 207 constituting the server Z indicates that there is no need for disconnection when the tunneling connection disconnection request is not received from the user terminal device 3a, and that the terminal 4b is connected via the Internet 5 and the Internet service provider (ISP) 6. (S302).
  • the user terminal device 3a When the operation is completed, the user terminal device 3a inputs a tunneling connection release request (tunneling connection disconnection request) through the input unit 401 and transmits it to the server Z via the input I / F 403, the internal bus 409, and the communication I / F 406. (S303).
  • the access request receiving unit 207 configuring the server Z transmits an acknowledgment (Ack) to the user terminal device 3a (S304). Then, the access request reception unit 207 changes the status of the tunneling connection from being connected to a disconnection request (S305).
  • the tunneling connection disconnection request monitoring unit 307 configuring the terminal 4b inquires of the server Z about the presence of a tunneling connection disconnection request via the communication I / F 305, the Internet service provider (ISP) 6, and the Internet 5 (S306). At this time, since the status of the tunneling connection is changed from being connected to a disconnection request, the access request accepting unit 207 constituting the server Z sends the request to the terminal 4b via the Internet 5 and the Internet service provider (ISP) 6. A tunneling connection disconnection request is transmitted (S307).
  • the tunneling connection disconnection execution unit 308 Upon receiving the tunneling connection disconnection request from the tunneling connection disconnection request monitoring unit 307 via the internal bus 310, the tunneling connection disconnection execution unit 308 constituting the terminal 4b immediately disconnects the tunneling connection (ends connection) and is not illustrated. The timer is stopped (S308). Then, the tunneling connection disconnection execution unit 308 transmits information indicating that the timer has been stopped to the server Z via the Internet service provider (ISP) 6 and the Internet 5 (S309).
  • ISP Internet service provider
  • the relay unit 206 constituting the server Z terminates the relay service, the connection time management unit 213 stops the timer, and changes the status of the tunneling connection from the disconnection request to the unconnected (S310). Then, the connection time management unit 213 transmits an acknowledgment (Ack) to the terminal 4b via the Internet 5 and the Internet service provider (ISP) 6 (S311). Thereafter, the connection port allocation unit 212 constituting the server Z cancels the reserved first connection port (No. X) and second connection port (No. Y) (S312).
  • the tunneling connection disconnection execution unit 308 constituting the terminal 4b activates a timer when a predetermined time, which is a connection time of the tunneling connection, has elapsed, and ends the tunneling connection (S401). .
  • the connection time management unit 213 configuring the server Z activates a timer when a predetermined time, which is a connection time for tunneling connection, has elapsed, and the relay unit 206 ends the relay service (S402).
  • the user terminal device 3a is forced to terminate the tunneling connection and cannot access the server Z (S403).
  • the tunneling connection disconnection execution unit 308 constituting the terminal 4b transmits a notification that the timer has been stopped to the server Z via the Internet service provider (ISP) 6 and the Internet 5 (S404).
  • the connection time management unit 213 configuring the server Z changes the status of the tunneling connection from being connected to not being connected (S405).
  • the connection time management unit 213 transmits an acknowledgment (Ack) to the terminal 4b via the Internet 5 and the Internet service provider (ISP) 6 (S406).
  • the connection port allocation unit 212 constituting the server Z cancels the reserved first connection port (No. X) and second connection port (No. Y) (S407).
  • the tunneling connection is automatically disconnected by the trigger of the timer, so even if the forgetting to transmit the tunneling connection disconnection request occurs after the work is completed. It becomes possible to prevent forgetting to close the connection port.
  • FIG. 10 is a flowchart showing a processing flow of the cloud server 2 shown in FIG.
  • the access request receiving unit 207 determines whether there is an inquiry from the terminal 4b. That is, it is determined whether or not there is an inquiry about whether or not there is an access request (whether tunneling is necessary) from the terminal 4b. If there is no inquiry, step S2001 is repeated to enter a standby state. On the other hand, if there is an inquiry about whether there is an access request from the terminal 4b (whether tunneling is necessary), the process proceeds to step S2002.
  • step S2002 the access request receiving unit 207 determines whether or not there is an access request from the user terminal device 3a. As a result of the determination, if there is no access request from the user terminal device 3a, the process proceeds to step S2003 to indicate that there is no need for tunneling (tunneling not required), and to the terminal 4b via the Internet 5 and the Internet service provider (ISP) 6. Then, the process returns to step S2002. On the other hand, if there is an access request from the user terminal device 3a, the process proceeds to step S2004.
  • the identification information management unit 205 specifies the terminal 4b with reference to the terminal identification information storage unit 209 and specifies the user terminal device 3a with reference to the user terminal device storage unit 210. That is, the identification information management unit 205 accesses the user terminal device storage unit 210, and specifies that the connection source is the user terminal device 3a based on the identification information included in the access request. Also, the identification information management unit 205 accesses the terminal identification information storage unit 209 and acquires the identification information of the terminal 4b that is the connection destination.
  • step S2005 a first connection port to be assigned to the terminal 4b and a second connection port to be assigned to the user terminal device 3a are randomly obtained, and a server to be reserved and connected is selected.
  • the connection port assignment unit 212 acquires two connection ports at random. If the acquired two connection ports (No. X, No. Y) are not in use, the connection port assignment unit 212 reserves the first connection port (No. X) of the cloud server 2 to be assigned to the terminal 4b, and the user The second connection port (No. Y) of the cloud server 2 assigned to the terminal device 3a is reserved.
  • connection port assignment unit 212 arbitrarily selects one server (server address “Z”) from a plurality of servers constituting the cloud server 2 to which the user terminal device 3a is connected. Then, the connection port assignment unit 212 indicates that the tunneling is necessary, the server address “Z” (hereinafter referred to as server Z) to be connected, the first connection port (No. X), the predetermined connection time, the encryption The authentication information is transmitted to the terminal 4b via the Internet 5 and Internet service provider (ISP) 6.
  • server Z server address “Z”
  • server Z the server address “Z” (hereinafter referred to as server Z) to be connected
  • the first connection port (No. X) the predetermined connection time
  • ISP Internet service provider
  • step S2006 an authentication process for the terminal 4b is executed. Specifically, the authentication unit 211 performs authentication processing by determining whether or not tunneling is possible based on authentication information received from the terminal 4b.
  • step S2007 relay service activation & timer activation from the second connection port to the first connection port is executed. Specifically, the relay unit 206 activates a service that relays access to the second connection port (No. Y) from the user terminal device 3a to the first connection port (No. X).
  • the connection time management unit 213 starts a timer to disconnect after a predetermined connection time.
  • the relay unit 206 changes the status of the tunneling connection from not connected to being connected.
  • step S2008 relay is performed from the first connection port to the second connection port. Specifically, the relay unit 206 relays from the first connection port (No. X) to the second connection port (No. Y).
  • step S2009 the presence / absence of a maintenance / situation grasping work request is determined from the user terminal device 3a. If there is no maintenance / situation grasping work request, a standby state is entered in step S2009. On the other hand, if there is a maintenance / status grasping work request, the process proceeds to step S2010. Specifically, the access request reception unit 207 determines whether or not there is a maintenance / status grasping work request from the user terminal device 3a. Become. On the other hand, when the access request receiving unit 207 receives a maintenance / status grasping work request from the user terminal device 3a via the communication I / F 208, the process proceeds to step S2010.
  • step S2010 a maintenance / status grasping work request is transmitted to the terminal 4b.
  • the relay unit 206 relays from the second connection port (No. Y) to the first connection port (No. X), and flows access to the first connection port (No. X) to the terminal 4b. . Then, the relay unit 206 transmits a request for maintenance / status grasping work to the terminal 4b via the communication I / F 208, the Internet 5, and the Internet service provider (ISP) 6.
  • ISP Internet service provider
  • step S2011 the result of the work request from the terminal 4b is relayed to the user terminal device 3a.
  • the relay unit 206 relays from the first connection port (No. X) to the second connection port (No. Y). Then, the relay unit 206 transmits, to the user terminal device 3a, processing results corresponding to various measurement values and work requests of the target terminal or target device as the maintenance / status grasping work request results received from the terminal 4b.
  • step S2012 it is determined whether or not there is a tunneling connection release request from the user terminal device 3a. If there is a tunneling connection release request, the process proceeds to step S2014, and if there is no tunneling connection release request, the process proceeds to step S2013. Specifically, the access request receiving unit 207 determines whether there is a tunneling connection release request (tunneling connection disconnection request) from the user terminal device 3a, and there is a tunneling connection release request (tunneling connection disconnection request) from the user terminal device 3a. If YES in step S2014, the process advances to step S2014. If there is no tunneling connection release request (tunneling connection disconnection request) from the user terminal device 3a, the process advances to step S2013.
  • step S2013 it is determined whether or not the timer activation / tunneling connection is completed. If the timer is not activated and the tunneling connection is not completed, the process returns to step S2012. On the other hand, when the timer is activated and the tunneling connection is terminated, the process proceeds to step S2015. Specifically, the connection time management unit 213 starts the timer, and the relay unit 206 continues the relay service without activating the timer before a predetermined time, which is the connection time of the tunneling connection, elapses. Return to S2012.
  • connection time management unit 213 activates the timer when a predetermined time, which is the connection time of the tunneling connection, has elapsed since the start of the timer, the relay unit 206 ends the relay service, and the process proceeds to step S2015.
  • step S2014 the status of the tunneling connection is changed from being connected to a disconnection request.
  • the access request reception unit 207 changes the status of the tunneling connection from being connected to a disconnection request.
  • a tunneling connection disconnection request is transmitted to the terminal 4b.
  • step S2015 it waits for the timer transmitted from the terminal 4b to be stopped.
  • step S2016 the status of the tunneling connection is changed from being connected or disconnected to not being connected.
  • the relay unit 206 ends the relay service, and the connection time management unit 213 stops the timer, and changes the status of the tunneling connection from being connected or disconnecting to being unconnected.
  • step S2017 the first connection port and the second connection port being reserved are released, and the process ends. Specifically, the connection port allocation unit 212 releases the reserved first connection port (X number) and second connection port (Y number), and ends the process.
  • FIG. 11 is a flowchart showing the processing flow of the terminal 4 shown in FIG.
  • the terminal 4b will be described as an example.
  • the access request monitoring unit 301 determines whether tunneling is necessary. That is, the access request monitoring unit 301 inquires of the cloud server 2 through the communication I / F 305, the Internet service provider (ISP) 6, and the Internet 5 about the presence / absence of an access request (whether tunneling is necessary) at a predetermined cycle. If there is no access request as a result of the inquiry, step S4001 is repeated to enter a standby state. On the other hand, if there is a tunneling request, the process proceeds to step S4002.
  • ISP Internet service provider
  • a server address to be connected, a first connection port number, a connection time, and encrypted authentication information are acquired.
  • a server address “Z” (hereinafter referred to as a server Z) to be connected received from the cloud server 2 via the Internet 5, Internet service provider (ISP) 6, and communication I / F 305,
  • the server address “Z” (hereinafter referred to as server Z) to be connected and the first connection port (X number) Is acquired by the tunneling request generation unit 302 via the internal bus 310.
  • the predetermined connection time is acquired by the tunneling connection disconnection execution unit 308 via the internal bus 310.
  • the encrypted authentication information is acquired by the authentication information decryption unit 303 via the internal bus 310.
  • step S4003 the acquired authentication information is decrypted. Specifically, the authentication information decryption unit 303 decrypts the encrypted authentication information received from the cloud server 2.
  • a tunneling request is transmitted to the server Z to be connected.
  • the tunneling request generation unit 302 generates a tunneling request and configures the cloud server 2 with the generated tunneling request via the communication I / F 305 and the Internet service provider (ISP) 6 using, for example, SSH. Send to server Z.
  • ISP Internet service provider
  • step S4005 authentication information is transmitted to the server Z to be connected.
  • the authentication information decryption unit 303 transmits the decrypted authentication information to the server Z via the communication I / F 305 and the Internet service provider (ISP) 6 by, for example, SSH.
  • ISP Internet service provider
  • step S4006 the server Z to be connected is requested to transmit the communication to the first connection port to itself.
  • the tunneling request generation unit 302 sends a request to the server Z to send communication to the first connection port (No. X) to itself via the Internet service provider (ISP) 6 and the Internet 5. Send.
  • ISP Internet service provider
  • step S4007 a timer is started to disconnect the tunneling connection when the acquired connection time has elapsed.
  • the tunneling connection disconnection execution unit 308 starts a timer (not shown) so as to disconnect after a predetermined connection time previously received from the server Z.
  • step S4008 the server Z is requested for the ID and password of the user terminal device 3a.
  • the login authentication unit 309 transmits a request for the ID and password of the user terminal device 3 a to the server Z via the communication I / F 305, the Internet service provider (ISP) 6, and the Internet 5.
  • ISP Internet service provider
  • step S4009 login authentication processing is executed. Specifically, the login authentication unit 309 executes login authentication based on the ID and password of the user terminal device 3a transmitted from the server Z, and notifies the Internet service provider (ISP) 6 that it is OK (permission notification). And to the server Z via the Internet 5.
  • ISP Internet service provider
  • step S4010 a maintenance / status grasping work request is received.
  • the measured value acquisition unit 304 receives a maintenance / status grasping request from the user terminal device 3a via the communication I / F 305.
  • step S4011 the measurement value and maintenance information by the measurement device are read from the storage unit, and the result is transmitted to the server Z.
  • the measurement value acquisition unit 304 accesses the storage unit 306 via the internal bus 310, and displays processing results corresponding to various measurement values and work requests of the target terminal or target device stored in the storage unit 306. As a request result of the work of reading and maintenance / status grasping, it is transmitted to the server Z via the Internet service provider (ISP) 6 and the Internet 5.
  • ISP Internet service provider
  • step S4012 it is determined whether or not there is a tunneling connection release request from the user terminal device 3a. If there is a tunneling connection release request, the process proceeds to step S4014. If there is no tunneling connection release request, the process proceeds to step S4013. Specifically, the tunneling connection disconnection request monitoring unit 307 inquires of the server Z about the presence or absence of the tunneling connection disconnection request via the communication I / F 305, the Internet service provider (ISP) 6, and the Internet 5. As a result of the inquiry, if there is a tunneling connection disconnection request (tunneling connection release request), the process proceeds to step S4014. If there is no tunneling connection disconnection request (tunneling connection release request), the process proceeds to step S4013.
  • ISP Internet service provider
  • step S4013 it is determined whether or not the timer activation / tunneling connection is completed. If the timer is not activated and the tunneling connection is not completed, the process returns to step S4012.
  • the terminal 4b continuously communicates with the user terminal device 3a to which the second connection port is assigned via the first connection port for a predetermined time.
  • the process proceeds to step S4014. Specifically, the tunneling connection disconnection execution unit 308 continues the tunneling connection without activating the timer before elapse of a predetermined time, which is the connection time of the tunneling connection, after starting the timer, and returns to step S4012.
  • the tunneling connection disconnection execution unit 308 activates the timer when a predetermined time, which is the connection time of the tunneling connection, has elapsed since the start of the timer, and proceeds to step S4014.
  • step S4014 the tunneling connection disconnection execution unit 308 executes the tunneling connection disconnection and ends the process.
  • FIG. 12 is a flowchart showing a processing flow of the user terminal device shown in FIG.
  • the user terminal device 3a will be described as an example.
  • an access request to the terminal 4b is transmitted to the cloud server 2 (connection time and connection source information transmission).
  • the user terminal device 3a sends an access request to the terminal 4b to the communication I / F 406 and the router 3c including, for example, a predetermined connection time and the IP address of the user terminal device 3a that is the connection source.
  • the cloud server 2 connection time and connection source information transmission
  • step S3002 a server address to be connected and a second connection port number are acquired.
  • the cloud server 2 acquires that the server to be connected is the server Z and the connection port is the second connection port (Y number).
  • step S3003 a connection request is transmitted to the server Z to be connected through the second connection port.
  • the user terminal device 3a transmits a connection request to the second connection port (No. Y) to the server Z.
  • step S3004 an ID and password transmission request is received from the server to be connected.
  • the communication I / F 406 receives an ID and password transmission request from the server Z.
  • step S3005 the ID and password are transmitted to the server Z to be connected.
  • the input unit 401 inputs an ID and a password that are required at the time of login at the time of tunneling connection, and transmits them to the server Z via the input I / F 403, the internal bus 409, and the communication I / F 406.
  • step S3006 a login authentication result is received. Specifically, the communication I / F 406 receives from the server Z that the login authentication result is OK (permission notification).
  • step S3007 a maintenance / status grasping work request is transmitted.
  • the input unit 401 inputs a request for maintenance / status grasping work, and transmits the request to the server Z via the input I / F 403, the internal bus 409, and the communication I / F 406.
  • step S3008 the measurement value and maintenance information by the measuring device are received as a request result via the second connection port.
  • the communication I / F 406 receives processing results corresponding to various measurement values and work requests of the target terminal or target device from the server Z as a result of the maintenance / status grasping work request, and ends the process. To do.
  • various measurement values of the target terminal or target device and the processing results corresponding to the work request are displayed via the output I / F 404 as a request result of the received maintenance / status grasping work request. Displayed on the display screen of the unit 402. As a result, the user (user) 3 who is the owner of the user terminal device 3a can easily examine the necessity of maintenance and the contents of the maintenance for the target terminal or the target device.
  • various measurement values of the target terminal or target device by IoT are transmitted from the terminal 4 to the cloud server 2 via the Internet service provider (ISP) 6 and the Internet 5 at a predetermined cycle.
  • ISP Internet service provider
  • the terminal 4 constituted by the terminals 4a to 4c described above, a personal computer, a smartphone (mobile phone), a tablet or the like may be used.
  • a remote monitoring system in which a plurality of terminals connected to the Internet via an Internet service provider can be accessed from a user terminal device at a desired timing.
  • the present embodiment it is possible to grasp the necessity of maintenance for the target terminal or target device in a timely manner by tunneling connection between the user terminal device and one of the plurality of terminals. At the same time, it becomes possible to easily examine the contents of maintenance.
  • the configuration in which the user terminal device 3 and the terminal 4 can communicate with each other via the cloud server 2 has been described.
  • the user terminal device 3 and the lower connection port of the terminal 4 are connected.
  • the following processing is required.
  • the connection port of the terminal 4 is expressed as “lower connection port”.
  • a terminal selection screen G1 including a button for selecting a terminal 4 (4a to 4c) to be connected and a terminal to be connected is displayed. indicate. Then, when a terminal to be connected is selected by a button operation on the terminal selection screen G1, as shown in FIG. 13B, a connection destination (terminal 4 itself or its lower connection port) that becomes a connection candidate in the selected terminal 4 And a connection destination selection screen G2 including a button for selecting a connection destination. And it connects automatically to the connection destination selected by button operation in the connection destination selection screen G2.
  • connection destination selection screen G2 When the terminal itself is selected on the connection destination selection screen G2, the same operation as that described in the above-described embodiment is performed.
  • the display of the terminal selection screen G1 and the connection destination selection screen G2 on the display unit 402 of the user terminal device 3 is performed by accessing the cloud server 2 as a Web server by the browser software of the user terminal device 3. Is called.
  • the terminal 4b is selected on the terminal selection screen G1, and the measuring device is selected on the connection destination selection screen G2. Then, in S105 of FIG. 5, an access request to the terminal 4b is added to a predetermined connection time and the IP address of the user terminal device 3a itself, and information indicating the measurement device as a connection destination (for example, a lower connection port (number A) ) And a unique identification number assigned to the measuring device) and the like are transmitted to the cloud server 2.
  • a connection destination for example, a lower connection port (number A)
  • a unique identification number assigned to the measuring device and the like are transmitted to the cloud server 2.
  • the cloud server 2 reserves the first connection port (No. X) and the second connection port (No. Y) and selects the server Z to be connected. After that, when the cloud server 2 accepts the presence / absence of a tunneling request from the terminal 4b in S107, the server Z to be connected, the first connection port (No. X), a predetermined number in S108 indicate that tunneling is necessary.
  • the connection time, encrypted authentication information, and information indicating the measurement device are transmitted to the terminal 4b.
  • the information transmitted to the terminal 4b and the access request correspond to a connection request to the measuring device connected to the terminal 4b.
  • the process proceeds from S109 to S206, and the terminal 4b executes login authentication based on the ID and password of the user terminal device 3a transmitted from the server Z. If the authentication is OK, the terminal 4b transfers the information from the server Z to the lower connection port (No. A) to which the measuring device is connected, and transmits the information from the lower connection port (No. A) to the server Z. After setting to forward to the first connection port (No. X), in S207, the fact that the authentication is OK (permission notice) is transmitted to the server Z.
  • the user terminal device 3a and the measuring device connected to the lower connection port (No. A) of the terminal 4b are communicably tunneled and the request of the user terminal device 3a is directly input to the measuring device.
  • the terminal 4b when the terminal 4b receives a connection request from the cloud server 2 to the measuring device connected to the terminal 4b, the terminal 4b uses the first connection port (No. X), the second connection port (No. Y), and the cloud server 2. Since the communication with the user terminal device 3a is connected (relayed) with the measurement device, the user terminal device 3a and the measurement device can directly communicate with each other.
  • the timing at which communication is transferred between the server Z and the lower connection port in the terminal 4b is not limited to immediately before S207, but may be, for example, the timing before or after S109. Unless determined, it may be determined appropriately according to the configuration. Further, in the above description, the connection destination is selected by operating the connection button displayed on the display unit 402. In addition to this, for example, a command character string including the selected connection destination is input. It is good also as a structure.
  • Connection port allocation unit 213 ... Connection time management unit 214 ... Internal bus 301 ... Access request monitoring unit 302 ... Tunneling request generation unit 303 ... Authentication information Decoding unit 304 ... Measurement value acquisition unit 305 ... Communication I / F 306 ... Storage unit 307 ... Tunneling connection disconnection request monitoring unit 308 ... Tunneling connection disconnection execution unit 309 ... Login authentication unit 310 ... Internal bus 401 ... Input unit 402 ... Display unit 403 ... Input I / F 404 ... Output I / F 405 ... Calculation unit 406 ... Communication I / F 407: Storage unit 408 ... Battery unit 409 ... Internal bus G1 ... Terminal selection screen G2 ... Connection destination selection screen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

[Problème] Fournir un système de surveillance à distance qui permet à un équipement terminal d'utilisateur d'accéder, à un moment voulu, à une pluralité de terminaux connectés à l'Internet par l'intermédiaire d'un fournisseur de serveur Internet. [Solution] Un système de surveillance à distance 1 est équipé : d'une pluralité de terminaux 4 connectés à l'Internet 5 par l'intermédiaire d'un fournisseur de serveur Internet 6 ayant une adresse IP globale, une adresse IP privée étant attribuée à chaque terminal ; un serveur infonuagique 2 connecté à l'Internet 5 ; et des équipements terminaux d'utilisateur (3a 3b) connectés au serveur infonuagique 2. Le serveur infonuagique 2 attribue un premier port de connexion à un terminal parmi la pluralité de terminaux 4 et attribue un second port de connexion aux équipements terminaux d'utilisateur (3a 3b). Le terminal et les équipements terminaux d'utilisateur (3a 3b) communiquent par le biais du premier port de connexion, du second port de connexion, et du serveur infonuagique 2.
PCT/JP2017/022026 2016-06-15 2017-06-14 Terminal pour système de surveillance à distance, programme de surveillance à distance, et système de surveillance à distance WO2017217476A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201780050380.1A CN109952561B (zh) 2016-06-15 2017-06-14 远程监视系统用终端、远程监视用方法及远程监视系统
KR1020197036343A KR20190139334A (ko) 2016-06-15 2017-06-14 원격 모니터링 시스템용 단말, 원격 모니터링용 프로그램 및 원격 모니터링 시스템
KR1020197001388A KR102057295B1 (ko) 2016-06-15 2017-06-14 원격 모니터링 시스템용 단말, 원격 모니터링용 프로그램 및 원격 모니터링 시스템
US16/310,716 US20190373062A1 (en) 2016-06-15 2017-06-14 Terminal for remote monitoring system, program for remote monitoring, and remote monitoring system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2016-118590 2016-06-15
JP2016118590 2016-06-15
JP2017-087977 2017-04-27
JP2017087977A JP6380902B2 (ja) 2016-06-15 2017-04-27 遠隔監視システム用端末、遠隔監視用プログラム及び遠隔監視システム

Publications (1)

Publication Number Publication Date
WO2017217476A1 true WO2017217476A1 (fr) 2017-12-21

Family

ID=60663534

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2017/022026 WO2017217476A1 (fr) 2016-06-15 2017-06-14 Terminal pour système de surveillance à distance, programme de surveillance à distance, et système de surveillance à distance

Country Status (2)

Country Link
MY (1) MY177678A (fr)
WO (1) WO2017217476A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005026856A (ja) * 2003-06-30 2005-01-27 Phoenix Technologies Kk リモートアクセスシステム
JP2007034713A (ja) * 2005-07-27 2007-02-08 Nec Corp 遠方監視システム、遠方監視方法、解析プログラム
JP2009027652A (ja) * 2007-07-23 2009-02-05 Nippon Telegr & Teleph Corp <Ntt> 接続制御システム、接続制御方法、接続制御プログラムおよび中継装置
JP2012155712A (ja) * 2011-01-05 2012-08-16 Sb System Kk 情報処理装置の遠隔保守管理方法及びシステム並びにそれに使用する情報端末装置及びプログラム
JP2015002376A (ja) * 2013-06-13 2015-01-05 パナソニック株式会社 管理システム

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005026856A (ja) * 2003-06-30 2005-01-27 Phoenix Technologies Kk リモートアクセスシステム
JP2007034713A (ja) * 2005-07-27 2007-02-08 Nec Corp 遠方監視システム、遠方監視方法、解析プログラム
JP2009027652A (ja) * 2007-07-23 2009-02-05 Nippon Telegr & Teleph Corp <Ntt> 接続制御システム、接続制御方法、接続制御プログラムおよび中継装置
JP2012155712A (ja) * 2011-01-05 2012-08-16 Sb System Kk 情報処理装置の遠隔保守管理方法及びシステム並びにそれに使用する情報端末装置及びプログラム
JP2015002376A (ja) * 2013-06-13 2015-01-05 パナソニック株式会社 管理システム

Also Published As

Publication number Publication date
MY177678A (en) 2020-09-23

Similar Documents

Publication Publication Date Title
JP6380902B2 (ja) 遠隔監視システム用端末、遠隔監視用プログラム及び遠隔監視システム
JP5750935B2 (ja) 情報処理システム、情報処理装置、サーバ装置およびプログラム
CN109314708A (zh) 网络可访问性检测控制
JP6996097B2 (ja) 仲介装置、情報処理システム及びプログラム
JP2006166028A (ja) Vpn接続構築システム
JP6407598B2 (ja) 中継装置、中継方法、及び中継プログラム
WO2017217476A1 (fr) Terminal pour système de surveillance à distance, programme de surveillance à distance, et système de surveillance à distance
JP7209593B2 (ja) 中継方法、中継システム、及び中継用プログラム
CN109218382B (zh) 远程通信控制系统和会话管理系统
CN109218381B (zh) 远程通信控制系统和会话中继系统
CN111066297B (zh) 远程访问控制系统
EP2372960A1 (fr) Système de réseau de communication
CN110213346A (zh) 加密信息的传输方法及装置
CN103023763A (zh) 通信中继装置、数据处理系统以及通信中继方法
JP2019012930A (ja) リモート通信制御システム、リモートメンテナンスシステムおよびリモートメンテナンスプログラム
JP2005208880A (ja) コンテンツ提供システム、コンテンツサーバ、ディスプレイ端末、および、コンテンツ提供方法
JP6546846B2 (ja) 認証サーバ、アクセスポイント及びプログラム
JP6627398B2 (ja) 代理認証装置、代理認証方法および代理認証プログラム
KR20190038713A (ko) 에너지 관리 IoT 및 클라우드 기반의 스마트 홈 플랫폼의 해킹 방지 방법
JP2019012402A (ja) リモート通信制御システム、セッション管理システムおよびセッション管理プログラム
JP2011166312A (ja) 仮想プライベートネットワークシステム、通信方法及びコンピュータプログラム
JP2019012403A (ja) リモート通信制御システム、セッション管理システムおよびセッション管理プログラム
JP2015167295A (ja) Vpn接続システム及びvpn接続方法
JP2005242547A (ja) リモートサービス実行方法、リモートクライアント及びリモートサービスサーバ
JP5920563B2 (ja) 中継サーバ及び中継通信システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17813371

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20197001388

Country of ref document: KR

Kind code of ref document: A

122 Ep: pct application non-entry in european phase

Ref document number: 17813371

Country of ref document: EP

Kind code of ref document: A1