WO2018079554A1 - Owner checking system - Google Patents

Owner checking system Download PDF

Info

Publication number
WO2018079554A1
WO2018079554A1 PCT/JP2017/038373 JP2017038373W WO2018079554A1 WO 2018079554 A1 WO2018079554 A1 WO 2018079554A1 JP 2017038373 W JP2017038373 W JP 2017038373W WO 2018079554 A1 WO2018079554 A1 WO 2018079554A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
unit
authentication
sensor
signal
Prior art date
Application number
PCT/JP2017/038373
Other languages
French (fr)
Japanese (ja)
Inventor
伸周 浦壁
Original Assignee
株式会社アドバンス
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社アドバンス filed Critical 株式会社アドバンス
Publication of WO2018079554A1 publication Critical patent/WO2018079554A1/en

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/117Identification of persons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information

Definitions

  • the present invention relates to an owner check system.
  • IoT Internet of Things
  • smart home appliances such as smart home appliances, connected cars, home security, vending machines, healthcare and medical equipment.
  • the range of activities of computer viruses has increased, and the social effects of computer viruses have formed immeasurable situations, and the scope of cyber warfare has expanded and the effects are becoming familiar.
  • a limited interface such as an IoT device
  • Once a computer terminal has been hijacked, it sends data without knowing the operation of the owner and is used as a bot for DDOS attacks or as a proxy computer terminal for hackers. Therefore, a mechanism for checking by the owner is desired.
  • Japanese Patent Publication No. 2008-500633 discloses a method for forming a virtual area on software to form a sandbox, executing a computer virus, and performing heuristic detection of the computer virus from its behavior.
  • Japanese Patent Laid-Open No. 2007-102697 discloses that a gateway device connected to a user terminal and installed at an entrance to an Internet network includes infection monitoring means for detecting whether or not the user terminal is infected with a computer virus, Terminal disconnecting means for disconnecting the user terminal from the Internet network when it is detected that the terminal is disconnected, and a recovery support device for the user terminal when the user terminal is disconnected from the Internet network by the terminal disconnecting means.
  • infection monitoring means for detecting whether or not the user terminal is infected with a computer virus
  • Terminal disconnecting means for disconnecting the user terminal from the Internet network when it is detected that the terminal is disconnected
  • a recovery support device for the user terminal when the user terminal is disconnected from the Internet network by the terminal disconnecting means
  • quarantine means in which a recovery support device connected to the gateway device executes a computer virus quarantine process on the connected user terminal.
  • JP 2008-532133 A discloses a system for detecting a computer virus that impersonates a domain name system (DNS), which transmits a URL to a DNS server and makes an I P request.
  • DNS domain name system
  • a means for detecting whether or not the relationship between the P address and the URL matches is described.
  • the communication control apparatus 10 stores a first database 50 provided for each user, a user ID and an IP address assigned to the user's terminal in association with each other.
  • the user database update unit 460 that acquires the user ID of the terminal and the IP address assigned to the terminal from the connection management server 120, and registers them in the user database 57, and the IP address of the transmission source of the communication data including the data file
  • a user identification unit that searches the user database 57 to obtain a user ID
  • a search circuit 30 that performs a search by referring to a record corresponding to the acquired user ID in the first database 50, and a computer virus based on the search result
  • a process execution circuit 40 for filtering data files infected with It has been described to obtain.
  • the homepage http://www.aist.go.jp/aistj/press release / pr2006 / pr20061122 / pr20061122.htm
  • AIST Development of a high-speed virus check system using rewritable hardware
  • a computer virus detection system using an array FPGA, CPLD, etc.
  • JP-A-2015-532756 when an administrator authority file of an IoT terminal is encrypted and moved to a server or the like that manages the terminal, and an update program is downloaded, the encrypted administrator authority file is A configuration for executing download decoding is described.
  • JP-A-2016-116130 describes that a pairing code during data communication between an IoT terminal and a wireless receiver is encrypted.
  • JP-A-2015-122744 communication elements for connecting an IoT device to a specific system are written in blank fields of a multicast IP address and a multicast MAC address, and the IoT device reads data from these address data. It is described that the IP address is always monitored in order to connect to a specific system.
  • JP 2013-137745 A Japanese translation of PCT publication No. 2008-500653 JP 2007-10297A Special table 2008-532133 JP 2009-157523 A Japanese Patent Laying-Open No. 2015-532756 JP 2016-116130 A JP2015-122744A JP 2014-146139 A
  • JP 2008-500633 A discloses a computer virus program that is executed in a virtual space and detection of a computer virus based on its behavior, but the computer virus attacks this virtual space program, There is a possibility of disguise display, and other prior arts are all detected as virus programs, and the detection method of the back hand is disclosed with the template registered in the security software. It does not disclose countermeasures against virus programs.
  • IoT Internet-connected devices
  • a DDOS attack has already been carried out in which an IoT device is infected, turned into a bot, and attacked, and the number of IoT devices at that time exceeds 100,000.
  • IoT terminals with limited interfaces are more likely to perform various operations using wireless communication as disclosed in JP-A-2015-122744. This increases the possibility of infection of IoT devices.
  • the present invention has a direct or indirect interface, and based on the interface, signal processing means for outputting executed data to the outside, Storage means for storing interface data;
  • the signal processing unit transmits data to the outside, it compares the data with the interface data stored in the storage means, and determines that the data is genuine if it matches, substantially matches, approximates, or falls true,
  • An exit gate means for adding the authentication data corresponding to the external operation data and transmitting it to the outside,
  • An entrance that receives data transmitted from the outside, detects authentication data from the received data, and receives it as authentic data when it matches, approximately matches, or approximates compared with comparison data stored in advance.
  • the combination of gate means enables accurate data transmission that eliminates the effects of computer viruses.
  • the present invention provides a sensor unit that receives a desired operation and phenomenon and converts it into a sensor electric signal
  • a signal processing unit including a transmission unit that converts sensor electric signals of the sensor unit into sensor digital data and transmits the sensor data, and a reception unit that receives data from the outside together with the authentication data; Recording means for detecting and temporarily recording event data and event time data from the sensor output of the sensor unit; When the transmission unit outputs sensor data to the outside, the sensor data and the event data and event time data recorded in the recording unit are read to detect the presence / absence of matching, approximate matching, approximation, or corresponding data Authentication means to authenticate with, If the authentication means does not detect coincidence, almost coincidence, approximation or applicable data, it can authenticate that it is a signal output from the sensor output from the sensor output by having an exit gate that blocks the output of data to the outside Even when the interface is limited, it is possible to transmit data accurately without the influence of a computer virus.
  • the authentication means detects coincidence, substantially coincidence, approximation, or corresponding data, it authenticates that the sensor data is authentic, replaces, converts or adds the authentication data, and transmits it to the outside.
  • the authentication data can be authenticated by, for example, a management server that receives the sensor data, by comparing or collating with the data of the transmission source device stored in advance.
  • the present invention provides a sensor unit that receives a desired operation and phenomenon and converts it into a sensor electric signal
  • a signal processing unit having a transmission unit that converts sensor electric signals of the sensor unit into sensor digital data and transmits the sensor digital data together with an authentication signal to the outside; and a reception unit that receives data from the outside together with the authentication data;
  • the sensor is stable regardless of the signal processing method of the sensor unit. Allows external transmission of data.
  • verifying the authentication signal it is possible to transmit authentic data without an interface by using a combination of authentication means for authenticating whether or not the data output from the signal processing unit is authentic data.
  • the authentication data can also be handled confidentially, so that the authentic data can be received, the influence of a computer virus illegally entering from the outside is eliminated, and stable IoT is achieved. Realize the use of the terminal.
  • event data and event time data detected from sensor data are compared or verified with sensor data, or additional data added to sensor data is stored in advance.
  • Two configurations of data collation are shown, and both configurations may be used separately, or a combination of both may be used.
  • the direct interface in the present invention is exemplified by a keyboard, a mouse, a touch pad, a push button type, a slide type switch and the like connected to a computer terminal that transmits to the outside.
  • the indirect interface in the present invention indicates data output from a part to be processed when data processed by a computer terminal such as a sensor is transmitted to the outside.
  • the authentication in the present invention refers to, for example, extracting event data such as a characteristic part, a noise part, etc. and event time data in which this event data occurs from sensor data obtained by branching sensor data, and the like.
  • event data such as a characteristic part, a noise part, etc.
  • event time data in which this event data occurs from sensor data obtained by branching sensor data, and the like.
  • the sensor data may be compared with the event data to indicate whether the data is coincident, substantially coincident, or approximate.
  • a predetermined value a digital signal obtained by converting a measurement analog signal with an ADC (a unit (circuit) that converts an analog signal into a digital signal) may be used as additional data.
  • ADC a unit (circuit) that converts an analog signal into a digital signal
  • the predetermined value is, for example, data including a value that is outside or within the output range for outputting sensor information to be used but is not normally output (for example, the owner authentication signal is for an IoT device using a temperature sensor) Is digital data at 120 degrees or -50 degrees when the target temperature range for measurement is room temperature, and is the limit digital data obtained by AD conversion of the analog output of the sensor. ), A value with a range outside the normal range, or a normal range, part or all of the measured value is converted into digital data and added to form output data, which is illegal For this purpose, it is possible to make analysis difficult when intercepting and analyzing transmitted / received data.
  • the authentication data is a control unit that performs an owner check. Additional digital data that is added by replacing or converting the additional digital signal, or a sensor In some cases, it includes digital measurement data obtained by measurement.
  • control unit compares the pre-stored additional data with the additional data to be output, and the matching, In the case of coincidence, approximation or matching, indirect interface data such as sensor data is transmitted to the outside. At this time, the additional data is replaced and converted into authentication data, and transmitted to the outside together with the sensor data.
  • the control unit that performs the owner check at the entrance of the so-called signal processing unit reads the authentication data and compares it with the data stored in advance. When there is a match or a close match, this update program is permitted to be executed.
  • the additional data added to the sensor data output from the signal processing unit may be used as the data for owner authentication as it is, or may be data that is further added with identifiable text data or newly replaced. . Further, in the case of adding to the transmission data as authentication data, it may be partially transmitted embedded in a plurality of packets or may be transmitted collectively.
  • the authentication data may include a part of the IP address ipv6 and ipv4 of the communication partner and one's own, and when authenticating with analog data, when analog data is converted into digital data, a value exceeding the threshold value is digitally converted.
  • Authentication data including information of a transmission source or the like may be formed by pulsing and including the meaning of an ip address or the like.
  • the authentication data preferably originates from the sensor output provided in the IoT terminal as described above. However, if the authentication data does not have a sensor and has an analysis unit that receives and analyzes an electrical signal as it is, for example, Data resulting from operation may be used as indirect interface data. Alternatively, the other party's IP address, MAC address, etc. may be detected from the authentication data, and data may be transmitted and received while confirming the other party.
  • a direct interface such as a wearable device
  • the user's operation is memorized, time-series output, or roughly classified operation output (character input, purpose, etc.), or a series of Operation output is stored as additional data
  • this additional data and the transmitted data are collated, matched, or nearly matched, or approximated and determined as genuine data and output It may be.
  • the output data may be replaced, compressed or converted so that the additional data can be compared in a more compact state.
  • the authentication data may be encrypted to enhance the protection.
  • a cryptographic algorithm such as a shared key method or a public key method, or a stream cipher such as a Burnham cipher may be used.
  • the present invention may use a computer chip arranged in a very small space called IoT, so that the memory capacity for storing digital data is also small, so that the Burnham can be configured relatively easily with hardware. Encryption, synthetic encryption, and other stream ciphers can be suitably used.
  • the sensor unit in the present invention is a connected car, such as one that detects the state of each component of temperature, humidity, position, inclination, rotation speed, acceleration, pulse wave, electrocardiogram, blood flow, blood pressure, GPS, factory, plant, etc.
  • sensors included in so-called IoT devices such as one or more arranged in smart home appliances, robots, wearable devices, plants, factories, public facilities, etc., are exemplified as ultra-small sensors that are made into chips. .
  • the signal processing unit When the sensor unit is connected, the signal processing unit according to the present invention includes an AD converter and a DA converter depending on the case, and a program such as a microcomputer incorporating a unit for infrared input / output, electromagnetic wave input / output, etc.
  • a program such as a microcomputer incorporating a unit for infrared input / output, electromagnetic wave input / output, etc.
  • the digital operation may be performed by an IoT device, but an IC including a gate array such as FPGA or CPLD may be used instead of a stored program type microcomputer.
  • the event data and the event time data in the present invention are data output from the sensor unit, for example, and indicate noise signals, abnormal signals, feature signals, and the like.
  • the event time data is the time when this event occurs, and indicates the time when the time recorded by the signal processing unit is synchronized with the time recorded by the owner check unit.
  • the event time data only needs to know at least the time at which the sensor unit output the event data.
  • the event time data may be any data as long as the signal processing unit and the owner check unit measure the absolute time.
  • the storage unit in the present invention is ROM, RAM, NVRAM, FEPROM, SD card, USB memory, SSD, HD, or other media, and a writable storage unit is formed by a single unit or a combination thereof.
  • the input / output unit in the present invention is for transmitting and receiving packet signals for connection to an external network, and is a unit for inputting and transmitting data in a known format such as Ethernet (trademark) specifications. Indicated by
  • the antenna along the medium is exemplified.
  • the Internet using a communication standard such as TCP / IP or FTP is mainly used as a network.
  • a communication standard such as TCP / IP or FTP
  • Bluetooth registered trademark
  • infrared rays etc.
  • the wireless medium is also used in the local area, it includes not only the Internet but also other media and networks based on communication standards.
  • the present invention determines that the IoT device having a limited interface is authentic data by comparing sensor data with event data and event time data separated and extracted from the sensor data and / or comparison of added authentication data.
  • the present invention is located at the entrance and exit of a terminal equipped with automatic processing (indirect interface), manual processing (direct interface), and other IoT devices. It is preferable to configure the unit (circuit) that is physically independent from the device or the like.
  • the present invention converts a direct interface such as a touch pad, operation switch, and keyboard or an indirect interface such as sensor output data, and data based on this interface into a digital signal, and then performs signal processing.
  • the signal processing unit that outputs data based on the selected interface to the outside, Event data consisting of parts that are characteristic from the interface-based data, unnecessary parts that are not used, such as noise, and event time data when this event data occurred are stored in advance, and the signal processing unit sends the data based on the interface to the outside
  • the stored event data or the like is present in the data based on the interface, it is determined as authentic data, and the authentic data and authentication data are combined and transmitted to the outside.
  • the additional data is added to this data, and if this additional data matches the pre-stored additional data list, the authentic data Judgment was made by combining both the additional data used as authentication data or the additional data replaced with authentication data while leaving a trace (trace authentication data) and the data based on the interface created by the signal processing unit. Either or both of the configurations for transmitting the object to the outside are performed as exit processing.
  • the authentication data is extracted from the input data and compared with or collated with the authentication data registered in advance to determine whether the data is authentic.
  • an indirect or direct operation in which the authenticity of data formed by the direct interface or the indirect interface is stored in advance at the entrance for receiving data from the outside of the IoT device and the exit for transmitting data to the outside.
  • the present invention is mainly a device whose main task is to convert sensor data into digital data and transmit / receive it.
  • the present invention is not necessarily provided with a device for sensing, for example, an electric device that receives and drives data from the Internet.
  • a one-way device such as a drill or a PC terminal such as a wearable terminal, a tablet, or a smartphone, which includes an operation interface such as a keyboard or a touch panel is also included.
  • Authentication data, owner authentication data, trace of authentication data (data converted by replacing the owner authentication data) data, event data and event time data are data for authenticating the data of the legitimate transmission source, It is preferable that the content and size are sufficient to prevent spoofing.
  • genuine data is determined by whether or not event data or operation trajectory data stored in advance is included in the sensor data or operation data. If the data is determined to be authentic data, the authentic data obtained by replacing, converting, or adding the additional data to the authentication data (data stored externally in advance and comparable) is transmitted.
  • the receiver separates and extracts the authentication data from the transmitted data, compares this authentication data with the data stored in advance, and determines that the data is authentic if it is the same or approximately the same.
  • This authentication data can be encrypted to further improve confidentiality. Encryption has a protection function against computer virus attacks, but the size of the encryption algorithm software is limited because the IoT terminal itself is small. Therefore, it is preferable to use, for example, an XOR (exclusive OR) IC chip, a random number generation circuit, or a stream cipher type encryption that can reduce the configuration constituted by a combination of a sequence generator and a selection circuit.
  • XOR exclusive OR
  • the random number generator circuit Since the random number generator circuit has periodicity, it employs a composite Burnham encryption method in which multiple sequence generator circuits are mounted in an IC chip and a signal for selecting this is output together with authentication data. By doing so, it is possible to form a cryptographic circuit that is small in size, excellent in secrecy, and fast.
  • the present invention may separately utilize communication using infrared and electromagnetic waves as a wireless medium in addition to transmission / reception of data mainly using a wireless LAN.
  • 11a is an inlet control unit, which is composed of a microcomputer, a gate array, and the like, and preferably an input / output port that can be connected to an AD converter (ADC), other transmission / reception units such as Bluetooth (registered trademark), infrared data, etc. Is formed.
  • ADC AD converter
  • other transmission / reception units such as Bluetooth (registered trademark), infrared data, etc. Is formed.
  • 11b is an outlet control unit, which has the same configuration as the inlet control unit 11a. Both are separated for explanation, but may be integrated into one control unit. Good.
  • 11c is a D / A converter, which is a circuit for converting a digital signal into an analog signal, and may be built in the control unit, but is shown as a separate configuration for explanation.
  • the 11d is a transmission / reception unit A, which is configured by an infrared LED, a phototransistor, a photodiode, an antenna, and the like, and enables transmission / reception of data by a wireless medium 11e including infrared rays, electromagnetic waves, and the like.
  • the transmission / reception unit A11d transmits / receives data to / from the transmission / reception unit B17b.
  • the transmission / reception unit A11d and the transmission / reception unit B17b may be the same as those currently used for infrared communication and Bluetooth (registered trademark) communication with IoT devices. It is preferable to use one that includes a unit such as a port that supports communication.
  • the inlet control unit 11a or the outlet control unit 11b may be used instead.
  • the authentication device 12 stores event data and event time data in the sensor data output from the signal processing unit 17.
  • the authentication device 12 stores additional data for comparison that is used when additional data is added to the sensor data and outlet authentication is performed by the control unit.
  • the authentication device 12 includes the comparator 12a shown in FIG. 1 as a part, and exemplifies a general circuit using an operational amplifier.
  • the comparator 12a is a circuit in which the output of the output terminal 12a3 is inverted when the input voltage of the input terminal 12a1 exceeds the threshold voltage 12a2.
  • the comparator 12a is an example of a comparison detection unit, and is not limited thereto, and may be any circuit that changes the output of the output terminal 12a3 when the input voltage exceeds the threshold voltage 12a2.
  • a plurality of the comparators 12a are arranged, and the threshold voltage is set to an upper limit and a lower limit, respectively, and a band-like threshold is set, or a signal obtained by exceeding the threshold voltage 12a2 is pulsed to output as a digital signal having code information. May be.
  • the code information indicates authentication data
  • authentication data that is more difficult to decipher can be obtained.
  • Reference numeral 13 denotes an entrance gate, which is mainly configured to block, limit, and delay the movement of the signal from the input / output unit 15 to the signal processing unit 17 and the signal of the input / output unit 15 to the entrance control unit 11a. It is preferable to form a state in which the movement of data is interrupted at least during authentication.
  • exit gate 14 is an exit gate, which mainly performs transmission transmission or branch transmission of the transmission data from the signal processing unit 17 to the input / output unit 15 to the exit control unit 11b, and performs blocking and connection.
  • Numeral 15 is an input / output unit for demodulating the modulated signal transmitted from the antenna 16 and converting it into a digital signal, and includes a front-end circuit.
  • Reference numeral 16 denotes an antenna, which is made of a conductive member having a length, a width, and the like corresponding to a radio frequency to be used, and is formed of, for example, a smartphone antenna for GHz from several hundred MHz.
  • the antenna 16 is used when wireless communication is used.
  • the antenna 16 is not necessarily wireless communication, and may use wired communication such as Ethernet (registered trademark), or may be appropriately selected.
  • Reference numeral 17 denotes a signal processing unit, which preferably has an AD converter and a Bluetooth (registered trademark) unit used in an IoT device or has a port connected to these.
  • Reference numeral 17a denotes an additional signal output unit, which includes a RAM (for example, a state in which additional signal data is received when necessary from other continuously recordable media), ROM, NVRAM, EEPROM, It is composed of an SD card, a USB memory or the like, and is used for storing additional signal data in the storage memory in advance and outputting the data in response to a request from the signal processing unit 17.
  • the additional signal output unit 17a may include time series trajectory data of the interface operation as direct data.
  • indirect interface data such as sensor data, the additional signal output unit 17a may be unnecessary.
  • 17b is the transmission / reception unit B, which has the same configuration as the transmission / reception unit A11d described above.
  • Reference numeral 18 denotes a storage unit that stores an OS program, an application program, and the like that operate the control signal unit 17, and is a sensor electrical output of the sensor unit 19, which temporarily stores the digitized data for a predetermined period. There is also a case of memorizing inside.
  • the storage unit 18 further includes specific additional data. This is data that is formed when a legitimate program is started and sensor digital data is output from the sensor unit, and is unnecessary when comparison of event data or the like is performed by the exit control unit 11b. .
  • Reference numeral 19 denotes a sensor unit, as long as it is a sensor used in an IoT device as described above. At least a group is formed for each sensor, and the authentication device includes a similar sensor for each group. Although it is preferable, it is not limited to this.
  • Reference numeral 19a denotes an AD converter for converting the sensor data output of the sensor unit 19 into a digital signal.
  • the outlet control unit 11b may be built in, or the sensor unit 19 may be built in. It is added for the purpose. It is omitted in FIGS. 4 to 6.
  • Reference numerals 20 and 21 denote an entrance-side electrical communication path and an exit-side electrical communication path, in which wired and wireless are shown, but here, examples using wired are exemplified.
  • data is transmitted / received via the transmission / reception unit A11d and the transmission / reception unit B17b.
  • authentication using authentication data may also be performed at this part.
  • the 23 is a management server for operating the IoT terminal including the control unit 17 or uploading data to the signal processing unit and then executing it to update the program.
  • 24 is a network, which is mainly used as the Internet, but may indicate an intranet, extranet, Bluetooth (registered trademark), or a short-range network using infrared rays.
  • the program that operates in the signal processing unit 17 is, for example, a WEB server type program, and operates based on this program.
  • a signal processing unit that does not have an interface or a signal processing unit that has an interface limitedly illustrates that uploading and executing an update program is automatically performed by performing packet communication using TCP / IP, FTP, or the like.
  • a modulated packet signal is output from the wireless router 22 and transmitted to the input / output unit 15 via the antenna 16.
  • the input / output unit 15 demodulates the modulated packet signal and transmits it to the entrance gate 13.
  • the data addressed to the signal processing unit 17 is different from the update program and the authentication data, and packet data having different IP addresses may be transmitted. Data indicating the relationship is also included in both as authentication data. It is preferable that
  • the entrance gate 13 outputs this packet signal to the entrance control unit 11a. At that time, when the signal is a packet including data and the communication destination is the signal processing unit 17, the entrance gate 13 may pass it for a predetermined time after authentication, for example. In some cases.
  • the program When the program is supplied to the signal processing unit 17, there are updates, changes, additions, etc., and the signal processing unit that does not have a limited interface for performing artificial input executes after downloading.
  • the execution is not performed unless there is an execution permission signal from the transmission / reception unit B17b, or the execution is not performed unless the execution permission signal is transmitted to the signal processing unit 17 from the input control unit 11a via the entrance gate 13.
  • the management server 23 which is a transmission source that transmits the first program transmits packet data for starting supply to the signal processing unit 17.
  • the download execution code is automatically prepared for activation.
  • the entrance control unit 11a confirms whether or not an input of a packet addressed to the signal processing unit 17 has been received (201), and if there is reception of packet data, a packet addressed to the signal processing unit 17 (yes), Whether or not the owner authentication has been completed is confirmed (202), and if it has been completed (yes), it is further confirmed whether or not a predetermined time has passed (203).
  • This predetermined time corresponds to the expiration date of the owner authentication. If this is shortened, the security can be further improved. However, if it is too short, time is taken only by this authentication. It is shown that the process is performed at intervals of several seconds to hundreds of seconds.
  • the packet data is transmitted to the signal processing unit 17 in step 219.
  • the signal processing unit 17 shows a case where a process for processing the data in the packet and extracting the payload data is shown, and after combining the payload data decomposed within 1500 bytes into one code, A means for executing this is also provided.
  • the owner authentication has been completed and a predetermined time has elapsed (203) (yes), or if the owner authentication has not been completed (202) (no), it is confirmed whether the packet data is the first packet data (204). If it is the first packet data, an authenticable time limit (A time) is set and counting is started (205). By making this authenticable time finite, it is possible to determine whether or not the management server 23 performs regular transmission and to check whether there is an abnormality in the network.
  • a time authenticable time limit
  • the entrance control unit 11a extracts data indicating the location of the authentication data from the authentication device in order to confirm whether or not the authentication data exists in the packet signal.
  • the authentication data may be divided and embedded across all or a plurality of packets.
  • the embedding location for example, the first few digits are embedded after several bytes of a predetermined margin, and the predetermined margin may be stored in the authentication device 12.
  • the inspection can exemplify whether or not an identification symbol indicating authentication data in the packet is included.
  • the owner authentication data confirmation time timer (B time) starts counting (209). If the owner authentication data has not been received (206), it is confirmed whether A time has elapsed (207). If it is within A time, the next step (201) of receiving input packet data is performed. If A time has passed (yes), it is determined that there is no input packet data, and A time, B time Is reset (216), and when the construction of authentication data is started, the built-up authentication data is reset (217), and the process returns to the input packet data reception step (201) again.
  • the processing time of the input packet at the time of authentication is limited so that there is no erasure due to data leakage etc. It is preferable.
  • next owner authentication data is received or no owner authentication data is received (208)
  • the time B has elapsed yes
  • the authentication has timed out
  • the time A and time B are reset, and the data accumulated as authentication data is reset (217), and the input packet data reception step Go to (201) and wait for packet data.
  • the B time has not elapsed (no)
  • a part of the received owner authentication data is temporarily stored, and fragmented authentication data is combined (211).
  • the receiving step (201) waits for reception of an input packet. If all the authentication data can be acquired and combined to form the authentication data, the owner check authentication is performed in the next step (213).
  • the owner check authentication is performed by comparing with the owner check data stored in advance by the authentication device 12. In addition to authenticating the owner, the owner check authentication is decrypted if the authentication data is encrypted. In some cases, it is determined whether the value is true owner authentication data. Further, when the authentication data is digital data representing analog data, it is converted into analog data by the DA converter 11 c and input to the input terminal 12 a 1 of the comparator 12 a of the authentication device 12. The voltage of the input signal input to the input terminal 12a1 is compared with the threshold voltage 12a2, and when the voltage exceeds the threshold, the output of the output terminal 12a3 is inverted. When the inverted data is input to the entrance control unit 11a, it is determined that the authentication data is true.
  • the measured sensor data and a part of the measured sensor data extracted as additional data may be converted into analog signals and then compared.
  • a pulse wave a pulse wave at a characteristic part having a relatively high peak voltage may be extracted and recorded as additional data and used as owner check data using an analog signal.
  • the entrance gate 13 and the exit gate 14 stop transmitting or receiving data or enter a shut-off state, and further store all data such as A time, B time and authentication data. Reset and, depending on the case, an alert is output to the user (215).
  • the management server 23 can detect an abnormality at this terminal due to the interruption of communication due to physical interruption at the entrance gate 13 and the exit gate 14, so that an alert may not be necessary.
  • the entrance control unit 11a outputs a deletion signal to the transmission / reception unit A11d.
  • the transmission / reception unit A11d transmits a deletion signal via the wireless medium 11e and the transmission / reception unit B17b, and the signal processing unit 17 receives the signal and deletes data such as a downloaded program. If the owner authentication data is true (214) (yes), the recording of the A time and the B time is reset (218), and the input packet data is transmitted to the signal processing unit 17 via the entrance-side electric communication path 20 ( 219).
  • an execution permission signal is output to the transmission / reception unit A11d, and the signal processing unit 17 receives the execution permission signal and executes the downloaded program.
  • the target update program or the like is downloaded to the signal processing unit 17 but cannot be executed unless a specific signal is input from the transmission / reception unit B 17b, for example, during the authentication operation in the entrance control unit 11a. By just downloading, data confusion can be prevented during high-speed communication.
  • the range of the predetermined time It is detected whether the amount of data (number of packets) received within the network is an abnormal amount (exceeds the predetermined packet value within a predetermined time).
  • a server attack can be prevented and an abnormal situation can be notified to the management server 23.
  • a terminal such as an IOT device needs to be accommodated in a very small terminal in which, for example, a space for storing a key, a ticket or the like has a small capacity, or a function and a memory that are necessary, or less than a storage amount corresponding to the amount. In this case, the interruption of the network connection is more effective for notifying the management server of the abnormality while reducing the number of necessary devices.
  • the sensor output of the sensor unit 19 is supplied to the signal processing unit 17, but is also supplied to the AD converter 19a.
  • the sensor analog data is converted into digital data and supplied to the outlet processing unit 11b.
  • the outlet processing unit 11b measures characteristic data in the sensor unit data with time.
  • the characteristic data is, for example, time data when noise is added to the signal due to the movement of the electrode and sensor. Is this time data synchronized with the time when the sensor data is processed by the signal processing unit 17? Record with time data to know when it occurred.
  • the signal processing unit 17 may delete the data. However, since there is a case where recording is performed over time, data indicating no data at that time may be output from the signal processing unit 17. . For example, in the case of heart rate data, data and time indicating the phenomenon when the heart rate is lower or higher than normal are recorded. Further, when the sensor unit 19 outputs a normal output stably without any fluctuation, data indicating that the data is stable at a predetermined time interval is recorded. This event data and event time data indicating the occurrence time of this event data are accumulated.
  • the signal processing unit 17 transmits data to, for example, the management server 23, data to be transmitted in advance is transmitted, and a data supply path to the exit control unit 11b is formed.
  • the signal processing unit 17 When transmitting the sensor data of the sensor unit 19 to the management server 23 or the like, the signal processing unit 17 outputs output packet data including data for transmission to the exit control unit 11b via the transmission / reception unit B17b, and outputs the output control unit 11b. Receives the packet data for transmission (301).
  • the exit control unit 11b confirms whether event data and event time data are input (309).
  • the exit gate 14 may be blocked so that packet data including data in the payload in the packet is not output to the input / output unit 15, but in the case where the payload does not particularly include data such as not including sensor data. In some cases, it may be output.
  • the exit control unit 11b searches and detects whether or not additional data is included in the output packet data (309).
  • Match indicates that the data match or that there is no data between the event time data (deleted because of noise), and the approximate match indicates that the different time width is within the specified width Or a state where the degree of the event is a predetermined width.
  • “Approximation” indicates a case where there is a coincidence or almost no coincidence but the possibility exists at a predetermined ratio.
  • the predetermined ratio varies in advance depending on the sensing target. For example, in the case of a heart rate, the event time data as an occurrence time may be slightly different, but may be the same due to the possibility of heart disease.
  • Applicable indicates, for example, a case where the IOT device detects data indicating a similar phenomenon in which a biological signal has a specific individual difference in a specific time, phenomenon, and output mode.
  • the additional data is stored in the additional signal output unit 17a, and includes data indicating sensor data processed in the first, intermediate, or last packet when the control processing unit 17 tries to transmit data. Digital data or digital data to be converted into analog data.
  • This data is preferably data specific to the signal processing unit 17, and other than the measured data, it belongs to the type of data output by the sensor, and it is obvious that the sensor cannot measure whether critical data is unknown. Data that is known to be unique to each other is exemplified.
  • the data in the case of converting to analog data is digital data from which analog data indicating the value is obtained when the digital signal is D / A converted.
  • time-series operation data direct data
  • the transmission data is compared with this time-series operation data, and the match, mismatch, or It may be determined whether there is approximate data.
  • an owner check authentication step is activated (303).
  • the exit control unit 11b inputs the data to the D / A converter, and then inputs the obtained analog data to the comparator 12a in which a predetermined threshold is set.
  • the output of the comparator 12a changes from high to low or from low to high, the value is shown to be owner-created data and the owner is permitted (yes).
  • the egress gate is blocked, or at least the packet including data in the payload is not output to the outside (306).
  • the exit gate is blocked, the terminal icon becomes invisible on the network, and thus there may be a case where an abnormality can be indicated to the management server 23.
  • step 304 If the owner permission is given in step 304 (yes), if the event data and the event time data are compared, a part of the preset authentication data is written in the margins of the plurality of subsequent output packets.
  • the received packet data is instructed to the signal processing unit 17. In the case of authentication by additional data, this additional data is deleted from the output packet (305), and packet data in which a part of preset authentication data is written in the margins of the plurality of subsequent output packets is subjected to signal processing.
  • the unit 17 is instructed (307).
  • Step 305 may be unnecessary when comparing sensor data output from the signal processing unit 17 with event data temporarily stored in the exit control unit 11b.
  • time-series operation data it may be converted into authentication data stored in advance.
  • this additional data is replaced with another authentication data or deleted by conversion or the like, so that the authentication data (additional signal) is not leaked to the outside.
  • confidentiality increases it can be used as new authentication data.
  • the output packet data in which the authentication data is embedded is transmitted to the input / output unit 15 (308).
  • the input / output unit 15 modulates the packet data, amplifies the power, etc., and outputs it to the antenna 16 as a wireless output enabled state. To do.
  • Packet data output from the antenna 16 is received by the wireless router 22 and transmitted to the management server 23 via the network 24.
  • the management server 23 separates and extracts the owner authentication data from the received packet data, and verifies whether the data is from a legitimate terminal.
  • the owner authentication data divided and embedded in the packet is input to the DA converter, for example, like the additional data, and then compared with the threshold value by the comparison unit to confirm that it is the true authentication data.
  • a configuration may be used. Since IoT devices handle analog data, microcomputers with built-in AD converters and DA converters, FPGAs, and CPLDs are used, and the configuration can be simplified by performing authentication using analog data. Even if an IoT device is infected with a computer virus by a control unit that is automatically separated and is controlled by a malicious program, the connection with the outside is controlled based on the authentication data, so that the computer virus The influence of can be cut off.
  • an executable computer virus is not formed in the signal processing unit, so that it is possible to block attacks from the outside.
  • the signal processing unit 17 when the signal processing unit 17 tries to transmit data to the outside of the management server 23 or the like, it is checked in advance by the exit control unit 11 b and the sensor data is authentic by collating event data or the like. If it is authenticated, the fact is transmitted to the signal processing unit 17, and the signal processing unit 17 transmits this sensor data to the management server 23 via the exit gate 14.
  • the exit control unit 11b When a protocol that allows communication only between the exit control unit 11b and the signal processing unit 17 is used, the exit control unit 11b receives the packet data output from the signal processing unit via the exit gate 14. After the inspection, the additional signal may be deleted, packet data with new authentication data added may be created, and this may be transmitted from the exit control unit 11b to the management server 23. In this case, it is preferable that the IP address of the exit control unit 11b is registered in the management server 23. However, in the case of encryption or the like, registration may not be necessary because the decryption process is authenticated.
  • the signal processing unit 17 transmits only sensor data, the exit control unit 11b transmits authentication data, and the management server 23 authenticates using both to acquire authentic data.
  • reference numeral 40a denotes an entrance / exit control device, which is a part for transmitting and receiving data from the outside.
  • Reference numeral 40b denotes a sensor data processing unit that converts the sensor output signal into digital data and outputs the digital data to the transmission / reception unit B410 that performs near-field transmission / reception using infrared and radio waves as a medium.
  • 401 is a control unit, which is composed of a microcomputer including the DA converter and AD converter shown in FIG. 1, FPGA, CPLD, other SoC, etc., and performs an owner authentication operation, and also a packet transmitted from the outside
  • a means for separating and forming program data from data, and sensor data output from a sensor terminal are transmitted to the outside as packet data including authentication data.
  • Reference numeral 402 denotes an authentication sensor unit that includes the comparator circuit shown in FIG. 1 and stores authentication data and the like in advance.
  • the authentication sensor unit includes an analog-to-digital converter such as a photocoupler including a specific sensor, converts an input analog signal into an optical signal, converts it into an electrical signal again, and converts the analog electrical signal at that time The digital signal may be converted into a digital signal.
  • the authentication sensor unit includes, for example, an optical element or the like that previously captures a part having poor conversion efficiency for each wavelength spectrum of light that is not rated, and an analog that outputs the wavelength of the part with low conversion efficiency.
  • the authentication may be performed by digital authentication data that can be converted into a signal.
  • This authentication sensor unit functions in the same manner as the sensor unit 409 and sometimes measures the same part. By performing the same measurement, two indirect interface data are formed and compared, and an owner check may be possible.
  • Reference numeral 403 denotes a gate unit, which includes the entrance gate and the exit gate shown in FIG. 1, and has a configuration capable of blocking or regulating data when an abnormal signal is input / output.
  • Reference numeral 404 denotes an input / output unit, which includes a modulation unit for transmitting / receiving data in a desired frequency band, a demodulation unit, a power amplification circuit for transmitting / receiving packet data from an antenna, and the like.
  • 405 is an antenna for transmitting and receiving wireless packet data for wireless communication.
  • Reference numeral 406 denotes a transmission / reception unit A, which is an input / output device for using a medium such as an inductor for Bluetooth (registered trademark), infrared (LED, phototransistor), direct Wi-Fi, or ZIGbee (registered trademark). It is configured.
  • the transmission / reception unit A406 may be used in combination with the antenna 405 or may be used via a network.
  • Reference numeral 407 denotes a signal processing unit, which is composed of a microcomputer, FPGA, CPLD, or other SoC (System-on-a-chip) that constitutes an IoT device, and digitally converts sensor signal data from the sensor unit 409.
  • the sensor digital data is temporarily or continuously stored in the memory of the storage unit 408, and programs such as OS and applications stored in the storage unit 408 are read and executed.
  • Reference numeral 407a denotes an additional signal output unit for outputting an additional signal to an arbitrary part when sensor data or the like is output from the signal processing unit 407.
  • Reference numeral 409 denotes a sensor unit
  • 408 denotes a storage unit, which has the same configuration as in FIG. 1, but transmits event data and event time data from the sensor data to the control unit 401 for authentication.
  • an AD converter (not shown) is provided, and after being converted into digital data by this AD converter, it is transmitted to the transmission / reception unit B410.
  • the sensor output of the sensor unit 409 is connected to the transmission / reception unit B410 and transmits a sensor digital signal to the control unit 401.
  • Reference numeral 410 denotes a transmission / reception unit B, which can communicate with the same configuration as the transmission / reception unit of the entrance / exit control device 40a.
  • Reference numeral 41 denotes a wireless router capable of wireless communication, and in some cases, a router having a gateway function for connecting to other networks is exemplified. Data is transmitted and received using radio waves of several MHZ to several tens of GHZ as the wireless medium 41a.
  • Reference numeral 42 denotes a network, which is mainly exemplified by the Internet, but may include a local area network and other mobile phone networks.
  • Reference numeral 43 denotes an administrator server for normally managing IoT devices.
  • the transmission data is transmitted via the network 42 and the wireless router 41 to the antenna. Received at 405. Since the data is packet-type data using the TCP / IP protocol, transmission and reception are alternately performed. However, for the sake of explanation, explanation is limited to data input.
  • the entrance / exit control device 40a has a configuration in which an IP address is automatically or fixedly assigned as a substitute for the sensor unit.
  • the data input to the input / output unit 404 is packet data cut to 1500 bytes or less, and this packet data is supplied to the control unit 401 via the gate unit 403.
  • the control unit 401 combines the divided program data described and embedded in the payload in the packet data, and detects the authentication data mainly from the part of the payload of the packet data. Perform the operation of stitching together.
  • the authentication data and the upload data may be written together in a state separated by a space or the like, or may be incorporated into different packets.
  • the control unit 401 transmits the authentication data to the authentication sensor unit 402 and compares it with the authentication data stored in advance to determine whether it is legitimate data.
  • the analog signal may be input to the DA converter and converted into an analog signal, and this may be judged by an analog detection device such as a comparator as described in the operation of FIG.
  • the signal processing unit 407 When the data input by the control unit 401 can be authenticated as legitimate data based on the determination signal output from the authentication sensor unit 402, the signal processing unit 407 is transmitted via the transmission / reception unit A406 and the terminal transmission / reception unit B410. Send to. Upon receiving this data, the signal processing unit 407 stores the data in the storage unit 408 and automatically executes the reception program as necessary.
  • the sensor data of the sensor unit 409 is converted into a digital signal and then transmitted to the control unit 401 via the transmission / reception unit B410 and the transmission / reception unit A406.
  • the control unit 401 detects event data and event time data from the sensor data, and temporarily records them.
  • the event data may be one or more, but it may be preferable depending on the type of sensor that event data is detected within a time interval.
  • the signal processing unit 407 When the signal processing unit 407 transmits the sensor data output from the sensor unit 409 to the management server 43, the signal processing unit 407 collates the sensor data transmitted from the signal processing unit 407 with the event data and the event time data, and matches, If there is data that matches or approximates, authentication is performed. If there is data, authentication data is attached and sensor data is output to the management server 43. If not, the gate unit 403 is shut off, data transmission / reception is shut off, and the management server 43 is notified of the abnormality.
  • the management server 43 When performing authentication based on the additional data, when the signal processing unit 407 transmits the sensor data output from the sensor unit 409 to the management server 43, the management server 43 transmits a transmission start signal indicating that the data is transmitted to the terminal. Output to part B410.
  • the transmission start signal is received by the control unit 401 via the transmission / reception unit A406, and as a packet signal including the transmission source IP address (entrance / exit unit) and the transmission destination IP address (management server), the gate unit 403 and the input / output unit 404 are transmitted. And it transmits to the wireless router 41 via the antenna 405 and the wireless medium (radio wave) 41a.
  • the signal processing unit 407 organizes the sensor data and forms it as transmission data, obtains the additional signal data from the additional signal output unit 407a, and transmits it to the control unit 401 together with the sensor data.
  • the control unit 401 separates the additional signal data from the received sensor data, and transmits this to the authentication sensor unit 402 or inputs the data to the built-in DA converter (shown in FIG. 1). After being converted to an analog signal, it is output to the authentication sensor unit 402. If it is determined that the additional signal is normally output from the signal processing unit 407, the authentication data composed of the additional signal or the authentication data adjusted in advance is divided or adjusted for packet transmission, and The sensor data is divided and adjusted into a packet signal format, the authentication data packet and the sensor data packet are identifiably combined and transmitted to the gate unit 403, and output to the antenna 405 through the gate unit 403 and the input / output unit 404.
  • the control unit 401 transmits the data to the gate unit 403.
  • a signal for shutting off the packet is output and the creation of packet data is interrupted.
  • the management server 43 disappears from the display showing the network configuration on the monitor screen of the network management computer of the management server 43, etc. And can authenticate that there is an abnormality in the IoT terminal.
  • the control unit 401 is attacked, and when there is no authentication data, a data blocking state is formed by the gate unit 403, so that the signal processing unit 407 is not affected and stable data communication is performed. It can be carried out.
  • 50a is an authentication unit
  • 50b is an IoT terminal unit
  • Reference numeral 501 denotes a control unit including an AD converter, a DA converter, a Bluetooth (registered trademark) output, a microcomputer having a port for performing infrared output, an FPGA, a CPLD, and other SoCs. This is a unit that separates and extracts additional data and authentication data from input data and determines whether the data is legitimate. Further, the control unit 501 outputs an instruction signal to the instruction output unit 504 based on the determined content.
  • Reference numeral 502 denotes an authentication sensor unit, which has the same configuration as that shown in FIGS. 1 and 4, and includes authentication data input from the control unit 501, data for determining the authenticity of additional data, and Comparator circuits for determining authenticity are provided.
  • Reference numeral 503 denotes a transmission / reception unit A, which includes a Bluetooth (registered trademark) antenna, an infrared transmission / reception LED, a phototransistor, direct Wi-Fi, and the like.
  • Reference numeral 504 denotes an instruction output unit, which is composed of the same elements as the transmission / reception unit A503, and may be used together with the transmission / reception unit A503.
  • Reference numeral 505 denotes a signal processing unit, which is composed of an A / D converter, a D / A converter, a microcomputer equipped with an analog converter, FPGA, CPLD, and other SoCs as in FIGS. 1 and 4, and receives data from the sensor unit 506. This is for receiving, forming sensor data together with the additional data, further converting it into a packet signal and transmitting it to the input / output unit 511. Further, the signal processing unit 505 combines the packet data input from the outside with the transmission / reception unit B508, and then outputs it to the transmission / reception unit B508 without executing it.
  • 505a is an additional signal output unit for generating or previously storing an additional signal and outputting it to the signal processing unit 505 in the same manner as in FIG.
  • the additional signal is directly used as authentication data.
  • Reference numeral 506 denotes a sensor unit, which is provided with a target sensor and outputs an analog electric signal, similar to that shown in FIG. 1, and in the case of performing comparative authentication using event data and event time data. , Converted into a digital signal by an AD converter and transmitted to the transmission / reception unit B508.
  • Reference numeral 507 denotes a storage unit, which is composed of a memory IC, a storage medium, a storage device, etc., similar to the one shown in FIG. 1, and temporarily or continuously stores an OS program, application program, and other sensor data. Is for the purpose.
  • Reference numeral 508 denotes a transmission / reception unit B, which has the same configuration as that of the transmission / reception unit A503.
  • Reference numeral 509 denotes an instruction input unit that receives an output from the instruction output unit 504 and converts it into instruction data. When the instruction output unit 504 is an infrared LED, the instruction input unit 509 receives infrared rays. It is composed of units.
  • Reference numeral 510 denotes an instruction unit that forms and outputs a signal for stopping the transmission / reception operation of the input / output unit 511 based on instruction data transmitted from the instruction input unit 509. The instruction unit 510 transmits the executable instruction data to the signal processing unit 505 when the instruction data transmitted from the instruction input unit 509 is the executable instruction data of the program.
  • Reference numeral 511 denotes an input / output unit for modulating and demodulating packet data, and for blocking and stopping input / output of packet data to be transmitted / received based on an instruction from the instruction unit 510.
  • the packet data composed of the program data transmitted via the entrance processing network 52 is transmitted to the IP address provided in the IoT terminal unit 50b.
  • the transmitted packet data is received by the antenna 512 via the wireless router 51 and the wireless medium 51a such as radio waves.
  • the packet data input via the antenna 512 is demodulated by the input / output unit 511 and transmitted to the signal processing unit 505.
  • the signal processing unit 505 combines the program data and authentication data distributed in the packet data to generate one executable program.
  • the authentication data is distributed and stored in several places in the program data, or is distributed and described in other payloads, and the part is recorded with a identifiable code or recorded so as to be identified by a predetermined blank. ing.
  • the authentication data may be either text data or binary data, and may be output to the transmission / reception unit B 508 by being combined with a blank or the like as it is.
  • the transmission / reception unit A 503 receives this data and transmits it to the control unit 501.
  • the control unit 501 completes the distributed authentication data by detecting and combining the data, and transmits the authentication data to the authentication sensor unit 502 as it is. In the case of binary data and data for DA conversion, it is sent to the DA converter, converted to an analog signal, and then input to the comparator circuit to check the threshold value to confirm that it is legitimate data. To do.
  • the fact is transmitted to the instruction output unit 504.
  • the instruction data of the instruction output unit 504 is received by the instruction input unit 509, and the executable instruction data is transmitted to the instruction unit 510.
  • the instruction unit 510 outputs an execution permission signal to the signal processing unit 505.
  • This execution permission signal outputs a signal “1” to a specific digital input port, so that the program of the signal processing unit 505 recognizes this and causes the signal processing unit 505 to execute the program. .
  • the instruction output unit 504 outputs a signal indicating that the data is not regular data to the instruction input unit 509, and the instruction input unit 509 outputs this signal to the instruction unit 510.
  • the instruction unit 510 outputs a signal to the input / output unit 511 to interrupt the transmission / reception path.
  • the input / output unit 511 blocks the transmission / reception path.
  • the management server 53 detects the interruption of data and confirms that there is an abnormality in the IoT terminal.
  • an erasure signal that is an execution non-permission signal is transmitted to another input port of the signal processing unit 505. Based on this signal, the signal processing unit 505 monitors the signal input to the other input port and erases the combined program data existing inside.
  • the sensor data of the sensor unit 506 is converted into a digital signal and then transmitted to the control unit 501 via the transmission / reception unit B508 and the transmission / reception unit A503.
  • the control unit 501 detects event data and event time data from the sensor data, and temporarily records them in the internal memory.
  • the event data may be one or more, but it may be preferable depending on the type of sensor that event data is detected within a time interval.
  • the signal processing unit 505 transmits the sensor data output from the sensor unit 506 to the management server 53
  • the signal processing unit 505 compares the sensor data transmitted from the signal processing unit 505 with the event data and the event time data so as to agree with each other. If there is data that matches or approximates, authentication is performed. If there is data, authentication data is attached and sensor data is output to the management server 53. If there is no sensor data (if the sensor data is false), the instruction output unit 504 outputs a signal indicating that sensor data is not transmitted.
  • the instruction unit 510 outputs a signal indicating that sensor data is not transmitted from the signal processing unit 505 via the instruction input unit 509, or sends an input / output block signal to the input / output unit 511. Send.
  • the management server 43 is notified of the abnormality.
  • the signal processing unit 505 transmits sensor data and additional signal data transmitted from the additional signal output unit 505a to the transmission / reception unit B508.
  • the sensor data and additional signal data output to the transmission / reception unit B508 are transmitted to the transmission / reception unit A503 and supplied to the control unit 501.
  • the additional signal data is transmitted to the authentication sensor unit 502 and collated with authentication data (additional signal data) stored in advance, or input to the DA converter and then compared with threshold data by a comparator circuit. If they match, a signal indicating that the signal is a normal signal is output to the instruction output unit 504 and transmitted to the instruction unit 510 via the instruction input unit 509.
  • the instruction unit 510 outputs a signal for permitting transmission to a specific port of the signal processing unit 505 and outputs a permission signal to a specific input port of the input / output unit 511.
  • the input / output unit 511 enables connection to the outside based on the permission signal. If the control unit 501 determines that the data is not normal, the control unit 501 outputs that fact to the instruction output unit 504 and outputs a signal indicating that the data is not normal to the instruction unit 510 via the instruction input unit 509.
  • the instruction unit 510 outputs an erasure signal to a specific input port of the signal processing unit 505, and the signal processing unit 505 erases the data.
  • the instruction unit 510 blocks the data transmission / reception path of the input / output unit 511 and notifies the management server 53 of the abnormality of the IoT terminal.
  • a configuration in which an authentication unit is used as an external unit centering on an IoT terminal is shown. By making this authentication unit easy to exchange, it is possible to perform authentication with a wider application range.
  • FIG. 6 shows an embodiment in which stable authentication is performed by making it difficult to perform external decryption when performing an owner check.
  • reference numeral 601 denotes a control unit, which is composed of a microcomputer and other SoCs, and has the same configuration as the embodiment shown in FIG.
  • Reference numeral 601a denotes a transmission / reception unit A, which includes an LED, an infrared LED, an antenna, a phototransistor, and the like. belongs to.
  • Reference numeral 602 denotes an entrance gate, which is a SoC device capable of preventing data transmission / reception such as a bus switch, an analog switch, a relay switch, a logic digital switch, or an IC chip that can turn on / off data transmission. Is formed.
  • 603 is an exit gate, which is formed of hardware switches similar to the entrance gate 602.
  • XOR exclusive OR
  • 605 is a sequence generator A, which outputs a discontinuous numerical value or an array of binarized data arranged in a predetermined number.
  • Reference numeral 606 denotes a sequence generator B
  • reference numeral 607 denotes a sequence generator C, which has a configuration similar to that of the sequence generator A 605 and outputs sequence data of different patterns.
  • This numerical sequence is displayed as a binary data sequence in the case of binary data and in the case of hardware processing.
  • Reference numeral 60a denotes a selector for selecting a combination of the sequence generator A605, the sequence generator B606, and the sequence generator C607, and performs selection by inputting a selection signal.
  • the selection signal is BCA
  • the sequence generator B606 is output for a predetermined time
  • the sequence generator C607 is output for a predetermined time
  • the sequence generator A605 is output for a predetermined time, and this is output to one signal path by the OR gate 60b.
  • the XOR gate output to the XOR gate.
  • the predetermined time is a preset time and is adjusted according to the sizes of the additional data and the authentication data.
  • the sequence generators A605 to C607 are preferably sequence generators based on text data.
  • Reference numeral 60b denotes an OR gate, which is composed of a CMOS, TTL, and general-purpose logic IC having three input terminals, adds three digital signals, and converts them into one digital signal.
  • Reference numeral 608 denotes a DA converter, which is a unit (circuit) that converts a digital signal into an analog signal.
  • the DA converter may be used.
  • Reference numeral 609 denotes an authentication device which is connected to the output of the DA converter 608 or the XOR (exclusive OR) gate 604 and compares the decrypted authentication data with previously stored authentication data, The output value is compared and checked with a threshold value.
  • the authentication device 609 is for outputting the result of comparison or verification to the control unit 501.
  • 610 is an input / output unit that is a circuit for performing modulation, demodulation, and power amplification for wireless communication.
  • Reference numeral 611 denotes an antenna, which includes a conductive member, a coil, and the like that transmit and receive modulated data in a predetermined frequency band.
  • a signal processing unit 612 includes an AD converter, a DA converter, Bluetooth (registered trademark), an infrared transmission / reception port, and has a configuration similar to that of FIG. Data for combining additional data is converted into packet data and output.
  • Reference numeral 612a denotes an additional data output unit, which is formed of analog or digital data including the content that it is regular output data, and has the same configuration as that shown in FIG.
  • the additional data output unit 612a may store the content of data in the storage unit 614 in advance, and may be read and used when necessary.
  • a transmission / reception unit B 612b includes a phototransistor, a CDS, a photodiode, an antenna, and the like.
  • the transmission / reception unit B 612b performs transmission / reception of data using a wireless medium 601a1 such as infrared rays and radio waves in one set with the transmission / reception unit A.
  • Reference numeral 613 denotes a sensor unit, which has the configuration shown in FIG. 1.
  • a sensor unit which has the configuration shown in FIG. 1.
  • analog data indicating a temperature value is output, and an AD converter built in the signal processing unit 612 or an independent AD converter Is converted into a digital signal, and the digital signal is output.
  • Reference numeral 614 denotes a storage unit which is composed of a digital memory and stores an OS program, an application program, and the like, and temporarily or continuously stores digital data output from the sensor in a binary format or a text format.
  • the sensor analog data output from the authentication sensor unit 613 based on the exit processing event data and the event time data is converted into digital data by an AD converter (not shown), and then transmitted to the control unit 601. Event data and event time data are detected and stored temporarily.
  • the signal processing unit 612 intends to transmit sensor data to the management server 64
  • the sensor data is transmitted to the control unit 601 via the transmission / reception unit B 612b and the transmission / reception unit A 601a in advance, and matches the event data and event time data. Authenticate whether there is a match, approximation, or applicable part.
  • a transmission permission signal is output from the control unit 601 to the transmission / reception unit A 601a.
  • the signal processing unit 612 transmits sensor data to which additional data (data that can be converted into an already authenticated authentic analog signal) is added to the exit gate 603.
  • additional data data that can be converted into an already authenticated authentic analog signal
  • the signal processing unit 612 intends to transmit sensor data or the like to the outside, the additional data is combined with the sensor data, and the packetized data is output in the direction of the transmission / reception unit 612b.
  • the transmission / reception unit 612b transmits the packet data to the control unit 601 via the transmission / reception unit 601a.
  • the control unit 601 outputs the received additional data to the DA converter 608.
  • the additional data input to the DA converter 608 is converted into an analog signal, compared with the threshold value by the comparator circuit of the authentication device 609, and the result is output to the control unit 601.
  • the control unit 601 forms a combined composite number sequence data by combining the output number sequences of the number sequence generator A605 to the number sequence generator 607 by combining the additional data with the selector 60a based on the number sequence selection signal by an OR gate.
  • the additional data is encrypted by the XOR gate 604, and the encrypted additional data and the sequence selection data are combined, and then transmitted from the transmission / reception means A601a to the signal processing unit 612 via the transmission / reception means B612b.
  • the signal processing unit 612 again creates packet data in which the encrypted additional data and the selection data are embedded, and outputs the packet data to the input / output unit 610 via the exit gate 603.
  • the exit gate 603 is shut off and the management server 64 is notified of the abnormality.
  • additional data (additional signal data) is combined with sensor data, and authentication signal processing unit 612 in the case where there is no authentication by event data or the like intends to transmit sensor data or the like to the outside
  • the additional data is In combination with the data
  • the packetized data is output in the direction of the transmission / reception unit 612b.
  • the transmission / reception unit 612b transmits the packet data to the control unit 601 via the transmission / reception unit 601a.
  • the control unit 601 outputs the received additional data to the DA converter 608.
  • the additional data input to the DA converter 608 is converted into an analog signal, compared with the threshold value by the comparator circuit of the authentication device 609, and the result is output to the control unit 601.
  • the control unit 601 ORs the output sequence of the sequence generator A605 to the sequence generator 607 in which this additional data is combined by the selector 60a based on the sequence selection signal.
  • the combined composite number sequence data and the additional data are encrypted by the XOR gate 604 and the encrypted additional data and the sequence selection data are combined, and the transmission / reception means A 601a to the transmission / reception means B 612b are combined.
  • the signal processing unit 612 again creates packet data in which the encrypted additional data and the selection data are embedded, and outputs the packet data to the input / output unit 610 via the exit gate 603.
  • the input / output unit 610 modulates this, outputs it wirelessly from the antenna 611, and transmits it to the wireless router 62 via the wireless medium 62a.
  • the sensor data that has reached the wireless router 62 is transmitted to the management server 64 via the network 63.
  • the management server 64 has the configuration shown in FIG. 6, separates and extracts the encrypted authentication data and selection data, selects C from the sequence generators A to C based on the selection data, and combines them with an OR gate.
  • the encrypted additional data is restored by inputting the sequence data and the encrypted additional data to the XOR converter, and is input to the DA converter and the authentication device whether the data is legitimate data. And determined from the result.
  • the control unit 601 blocks the exit gate 603. Due to this blocking, the management server 64 can notice an abnormality because the packet data communication is blocked.
  • An executable data packet such as an update program is transmitted from the management server 64 or the like via the entrance processing network 63, and the packet data includes encrypted authentication data and sequence generator selection data.
  • the wireless router 62 modulates this data packet with a carrier wave and outputs it wirelessly, and the antenna 611 receives it via the wireless medium 62a.
  • the modulated packet data received by the antenna 611 is demodulated by the input / output unit 610 and transmitted to the control unit 601 through the entrance gate 602.
  • the control unit 601 extracts the encryption authentication data from the demodulated packet data, extracts selection data for selecting the sequence generator, and inputs the selection data to the selector 60a.
  • the selector 60a generates a composite number sequence by combining the generated data of the number sequence generator by the OR gate 60b in the order based on the selection data.
  • the composite number sequence data and the encrypted authentication data are input to the XOR gate 604 to be decrypted, and the decryption authentication data is input to the DA converter 608. Synthetic sequence data at the time of encryption and decryption is synchronized.
  • the DA converter 608 converts the input digital signal into an analog signal, which is input to the comparator circuit of the authentication device 609 and compared with a threshold value.
  • the authentication device 609 transmits the data to that effect to the control unit 601, 601 transmits the packet data to the signal processing unit 612 via the entrance gate 602.
  • the authentication device 609 transmits the data to that effect to the control unit 601
  • 601 transmits the packet data to the signal processing unit 612 via the entrance gate 602.
  • packet data is transmitted again to the signal processing unit 612, it takes time and there is a possibility that communication may be hindered. Therefore, packet data is transmitted to the signal processing unit 612 and the control unit 601 at the same time.
  • the signal processing unit 612 combines the divided data to form executable program data, and the drive (execution) is based on an execution permission signal input to the transmission / reception means B 612b or a signal from the control unit 501. It is preferable to be performed.
  • the control unit 501 blocks the input gate 602 and the input / output unit 610. By this interruption, the management server 64 can notice that an abnormality has occurred in the IoT terminal. Further, when packet data and program data obtained by combining the packet data have already been transmitted to the signal processing unit 612, command data for deleting them is transmitted via the transmission / reception unit A601a. The signal processing unit 612 receives this command data signal via the transmission / reception unit B 612b, and deletes the packet program and the combined program based on the command data.
  • the stream cipher method using an XOR (exclusive OR) gate is very simple and can form a strong encryption system. By making this a circuit device, the burden on the IoT device is reduced. It is preferable in that an owner check using authentication data can be realized.
  • combination method which forms several random number generators and combines this and forms random number data was used, it is not restricted to this, Since the size of authentication data and additional data is small also in one random number generator. It may be fully available.
  • the input random numbers are synchronized during encryption and decryption.
  • reference numeral 70 denotes an inspection unit, which includes a temperature, humidity, barometric pressure, illuminance, noise, body temperature, electrocardiogram, other sensors, a target sensing unit in a television, a digital camera, a digital audio player, an HD recorder, and the like.
  • a control unit for owner check is combined.
  • CPU GPU, onboard memory, CFAST, CF, SD, USB memory, mSATA, other memory computers and IO ports such as GPIO, serial ports such as UART and RS232C, etc. It is composed of a custom small and ultra-small single board computer, and is composed of an independent terminal or an attached terminal that is used by connecting to a USB socket of a PC (personal computer). ing.
  • Reference numeral 701 denotes a signal processing unit, which includes a CPU, GPU, FPGA, CPLD, and other memory as described above, and operates by software or hardware logic.
  • the signal processing unit 701 has a function of transmitting the sensor signal sent from the synthesis unit 709 to the center server 73, and also has a function of processing this and transmitting data to other IoT terminals.
  • a signal including a schedule signal or a signal that is separately distinguished is output to the input / output unit, or at least only the separated schedule signal is output to the control unit 707.
  • Reference numeral 702 denotes a sensor unit which performs a desired sensing in a temperature, humidity, atmospheric pressure, illuminance, noise, body temperature, electrocardiogram, other sensors, a television, a digital camera, a digital audio player, an HD recorder, etc. Output as an analog signal.
  • Reference numeral 703 denotes an additional unit, which is composed of a computer such as a PIC microcomputer, an ASIC such as FPGA and CPLD, and outputs scheduled feature signals.
  • a noisy signal is generated by the request signal from the signal processing unit 701 for the time schedule data and the signal output from the sensor unit 702 having the time schedule, and the time schedule signal is generated by the signal processing unit 701 or the control unit.
  • the additional unit 703 stores at least a plurality of schedules and random numbers, is connected to the signal processing unit 701 for a predetermined period, and schedule setting is performed.
  • the predetermined period is a period from the reset until the first external input via the network, and is a period in which a schedule can be set.
  • the signal output from the additional unit 703 is a kind of scheduled noise signal, and the frequency band is preferably narrow enough to be removed by a filter, and is preferably separated from the frequency band of the analog signal output from the sensor unit 702. However, signals that can be easily separated are preferred.
  • the schedule signal is preferably a signal whose amplitude value, pulse interval, and pulse amplitude of a narrow band pulse signal that can be easily removed by filtering are output at a predetermined time, and the pulse interval, pulse width, Create data with time-scheduled pulse amplitude.
  • a digital schedule such as a change in position coordinates and a luminance value is exemplified.
  • Reference numeral 704 denotes a storage unit A, which mainly stores an OS program, an application program, and the like, and is further controlled by a switch for manually enabling / disabling writing, a transistor for enabling / disabling writing by an electric signal, and a switch such as an FET relay. It has a configuration.
  • a write-enabled state can be enabled by an external operation, but preferably includes both a hardware switch and a software switch. When both of these switches are protected on, complete protection is performed.
  • Software switch is, for example, Windows, uwmggr. In the state where volume protection is enabled in exe, and in LINUX, Read Only conversion is performed by a combination of OverFS, UnionFs, or alss + fsprotect.
  • Hardware protection is exemplified by the setting to output a Disable signal to the write terminal. If it is commercially available, a hardware protection switch is attached to the case (made by CUCTUS) or a write prohibition switch is attached to the attached reader. Cfast type memory, USB memory with a write-protect switch (Buffalo, etc.). By mounting both of these protects, it is possible to form a complete read-only configuration that compensates for the software protection security hole.
  • a circuit that recognizes the state of protecting the writing of the SD card from the outside, such as an SD card, by the state of the switch on the side, and controls reading and writing may be used.
  • the storage unit 704 is preferably configured by software that does not perform long-term version upgrades such as the LTSB mode, but the control unit 707 releases the hardware protection switch configured by a relay circuit when performing an update or the like. After that, the reset signal processing unit 701 is in a clean state until external processing is performed, and an instruction signal is sent from the control unit 707 to the signal processing unit 701, and the signal processing unit 701 releases the software protection. It is preferable to start the process module.
  • the signal processing unit 701 and the control unit 707 are preferably configured so that they can be connected until the signal processing unit 701 communicates with the outside after the restart.
  • the 705 is a storage unit B, which is data and can be stored temporarily or continuously. Instead of the non-writable storage unit A704, data in a format that mainly does not affect the computer operation code is stored.
  • the format that does not affect the computer operation code is a format in which at least the signal processing unit 701 cannot be directly referred to at the time of startup and is not read at startup, such as text, jpeg, exe, dll, etc. However, at least as it is, the signal processing unit 701 is always started in a predetermined process at the time of starting, but at that time, it is stored in a state where it cannot be referred to (for example, placed in a holder, a compression holder or the like).
  • the 706 is an input / output unit, which is formed by a router, a wireless LAN unit called an access point, or the like.
  • control unit 707 is a control unit, which is formed of the same computer as the signal processing unit 701.
  • the control unit 707 outputs a reset signal to the signal processing unit 701 and inputs data at a predetermined time of the control unit 701.
  • the 708 is an antenna, which is made of, for example, a conductive member used in WiFi or the like.
  • the electromagnetic wave communication of WiFi is used.
  • other transmission media such as infrared rays
  • a light emitting diode or the like is applicable.
  • a synthesis unit which is composed of a computer, FPGA, CPLD, etc., and synthesizes analog output signals or digital output signals of the sensor unit 702 and the additional unit 703.
  • the composition is exemplified by operations such as OR, AND, and XOR.
  • the relay terminal 71 is a relay terminal, 72 is a network such as a wired or wireless Internet or an intranet, and 73 is a center server formed in a cloud format for managing and controlling the terminal.
  • the relay terminal 71 includes a modem, an access point router, and the like, and is connected to a network 72 such as the Internet.
  • the center server 73 is exemplified by a server for unattended operation or manned operation in the position of obtaining information from the IOT terminal, performing processing according to the purpose, and managing transmission of command data.
  • Reference numeral 71a denotes a transmission medium, which indicates a LAN cable if wired, or an electromagnetic wave, laser light, infrared light, visible light, etc. if wireless.
  • the signal processing unit 701 reads and executes the program in the storage unit A 704. Since the storage unit A 704 is in a Read Only state and is executed while the initial state is maintained, a clean state is always formed at startup. Limited transmission / reception with the control unit 707 may be performed during this clean state. For example, updating or correction of a program such as an OS or an application stored in the storage unit A 704 is performed. Note that it is preferable that the firmware program or the like forming the BIOS can be updated and corrected only at this time.
  • the signal processing unit 701 After activation, the signal processing unit 701 outputs a schedule signal creation instruction signal to the additional unit 703. After forming the schedule signal, the additional unit 703 outputs the schedule signal to the signal processing unit 701.
  • the parameters indicating the pulse interval, the pulse width, and the pulse amplitude are preferably different each time, and may have a periodicity equivalent to a random number.
  • the parameter data of the schedule signal created by the additional unit 703 is output to the signal processing unit 701.
  • the signal processing unit 701 outputs this parameter data to the control unit 707 from the time of restart until the first update with the outside.
  • the control unit 707 is preferably stored in a flash memory such as emmc, RAM, etc. only during the period when this data is used, and is overwritten and deleted when new schedule parameter data is sent.
  • the data indicates to which part of the combined signal output by the combining unit 709 the characteristic signal (noise signal) is added.
  • the characteristic signal (planned noise) is added to the analog data output. Is added systematically.
  • This feature signal is preferably a signal that can be deleted later by filtering. A plurality of feature points are set and added in advance, and a feature point to be used is selected and notified.
  • the above operation is performed after starting or restarting, at least until connection with the outside is started and data is input from the outside. That is, since the signal processing unit 701 reads and executes the OS from the read-only storage unit A 704, a clean state is always formed until data is input from the outside.
  • the signal processing unit 701 outputs the schedule data to the control unit 707, and then completely deletes and deletes related data and the like. As a result, even if the signal processing unit 701 is infected with malware and searches for related data, the data itself has disappeared, and the schedule signal cannot be acquired.
  • the owner unit becomes the control unit 707, and the sensor unit 702 performs target sensing and outputs an analog signal shown in (i) of FIG. 7B as a signal processing unit. Send.
  • the signal is converted into a digital signal by an AD converter and output.
  • the additional unit 703 outputs a schedule signal indicated by (ii) in FIG. 7B based on the set parameters via the terminal 703a. Although (ii) in FIG. 7B is an analog signal, it may be converted into a digital signal.
  • the schedule data indicates to which part the characteristic signal is added by the additional unit 703 to the sensor unit 702.
  • the characteristic data planned noise
  • This feature signal is preferably a signal that can be deleted later by filtering. A plurality of characteristic signals are set and added in advance, and a feature point to be used is selected and notified.
  • the sensor unit 702 performs sensing according to the purpose such as temperature, speed, and image, and outputs it to the synthesis unit 709 via the output point 702a ((i) in FIG. 7B).
  • the sensed output has the form of a digital signal converted by AD converter processing and other numerical signals in addition to an analog signal.
  • the additional unit 703 outputs the additional signal ((ii) in FIG. 7B) set in the activation or restart setting to the synthesis unit 709 via the output terminal 703a.
  • the synthesizing unit 709 synthesizes these inputs as shown in (iii) of FIG. 7B, for example, and outputs the synthesized signal to the signal processing unit 701.
  • the signal processing unit 701 processes data according to the purpose and outputs it to the input / output unit 706.
  • the input / output unit 706 outputs these data to the relay terminal 71 connected to the network 72 such as the Internet via the antenna 708.
  • the input / output unit 706 further transmits these data to the control unit 707.
  • the data format transmitted to the control unit 707 by the input / output unit 706 is exemplified by the same signal as the capture signal, but may be separately adjusted data for the control unit 707, but at least the signal processing Since the unit 701 itself may be infected by a computer virus or the like, the control unit 707 preferably obtains data from the input / output unit 706.
  • the control unit 707 may receive a sensor signal from the direct signal processing unit 701 in addition to the signal from the input / output unit 706.
  • the signal processing unit 701 converts the digital signal into a digital signal and transmits the presence / absence of an additional signal in the sensor signal converted into a digital signal in advance. Based on the schedule data of the additional unit 703 transmitted from the signal processing unit 701, and searching based on the schedule signal, a signal permitting output from the input / output unit 706 to the outside is output as enable, If not, it is determined that there is an infection such as a computer virus or malware or other abnormality in the signal processing unit 701, and a reset signal 707a is output to the signal processing unit 701.
  • the signal processing unit 701 is restarted based on the storage contents of the read-only storage unit 704.
  • the signal is transmitted from the signal processing unit 701 to the control unit 707 within a predetermined time after restarting.
  • the transmission output schedule of the additional unit 703 based on the schedule data is difficult to obtain during the period when the signal processing unit 701 can be infected (in the network connection state after restarting and after the first external access). Only the control unit 707 serving as the owner unit for storing the schedule can be inspected.
  • Entrance control unit 11b Exit control unit 12
  • Authentication device 13 Entrance gate 14
  • Exit gate 15 Input / output unit 16
  • Signal processing unit 18 Storage unit 19
  • Sensor unit 20 Entrance side electrical communication path 21
  • Wireless router 23 Management server 24 network

Abstract

The present invention provides an owner checking system for realizing stable use of an IoT terminal device without being affected by virus programs. The owner checking system is provided with: a signal processing means that is equipped with an interface for performing an external operation directly or indirectly and that externally outputs data for which execution has been performed on the basis of the interface; a storage means that stores data attributable to an external operation; an exit gate means that, when the signal processing unit transmits data to the outside, compares data attributable to an external operation among said data with external operation data stored in the storage means, determines said data to be genuine data in the case where these data match, substantially match, or are approximate, creates authentication data corresponding to the external operation data, and performs transmission to the outside; and an entrance gate means that receives data transmitted from the outside, detects the authentication data from the received data, compares the authentication data with pre-stored comparison data, and receives the data as genuine data in the case where these data match, substantially match, or are approximate.

Description

オーナーチェックシステムOwner check system
 本発明は、オーナーチェックシステムに関する。 The present invention relates to an owner check system.
 コンピュータ技術の進歩とインターネット技術の進歩は、スマート家電、コネクテッドカー、ホームセキュリテイ、自動販売機、ヘルスケア、医療器具等のIoT(Internet of Things)を提供するに至っている。
 その結果、コンピュータウィルスの活動範囲も広くなり、コンピュータウィルスの社会的な影響は、計り知れない状況を形成し、サイバー戦争の範囲が広くなると共にその影響は、身近なものとなりつつある。特にIoT機器のように限られたインターフェースの場合は、インターネットを介した入出力操作の自動性が高くなることから、ソフトウェアを中心とした無線通信となるため、今まで以上に多数のセキュリテイホールに直面し、悪意の操作の可能性を高めることとなる。
 一度乗っ取られたコンピュータ端末は、知らないうちにオーナーの操作とは無関係にデータを送信し、DDOS攻撃用のボット化や、ハッカーの代理コンピュータ端末として使用されることになることから、データの送受信において、オーナーによるチェックが行われる仕組みが希求される。
Advances in computer technology and Internet technology have led to the provision of IoT (Internet of Things) such as smart home appliances, connected cars, home security, vending machines, healthcare and medical equipment.
As a result, the range of activities of computer viruses has increased, and the social effects of computer viruses have formed immeasurable situations, and the scope of cyber warfare has expanded and the effects are becoming familiar. Especially in the case of a limited interface such as an IoT device, since the automation of input / output operations via the Internet becomes high, it becomes wireless communication centering on software, so there are more security holes than ever before. Faced and will increase the possibility of malicious operation.
Once a computer terminal has been hijacked, it sends data without knowing the operation of the owner and is used as a bot for DDOS attacks or as a proxy computer terminal for hackers. Therefore, a mechanism for checking by the owner is desired.
 特表2008-500633号公報には、ソフトウェア上に仮想領域を形成してサンドボックスとし、コンピュータウィルスを実行させ、その挙動からコンピュータウィルスの検出をヒューリステイックに行う手法が記載されている。 Japanese Patent Publication No. 2008-500633 discloses a method for forming a virtual area on software to form a sandbox, executing a computer virus, and performing heuristic detection of the computer virus from its behavior.
 特開2007-102697号公報には、ユーザ端末に接続されインターネット網への出入口に設置されたゲートウェイ装置が、ユーザ端末がコンピュータウィルスに感染しているか否かを検出する感染監視手段と、感染していることを検出したときにユーザ端末をインターネット網に対して切断状態とする端末切断手段と、当該端末切断手段によってユーザ端末がインターネット網に対して切断状態であるときにユーザ端末を復旧支援装置に接続する復旧接続手段と、を備えると共に、ゲートウェイ装置に接続された復旧支援装置が、接続されたユーザ端末に対してコンピュータウィルスの検疫処理を実行する検疫手段の組み合わせ構成が記載されている。 Japanese Patent Laid-Open No. 2007-102697 discloses that a gateway device connected to a user terminal and installed at an entrance to an Internet network includes infection monitoring means for detecting whether or not the user terminal is infected with a computer virus, Terminal disconnecting means for disconnecting the user terminal from the Internet network when it is detected that the terminal is disconnected, and a recovery support device for the user terminal when the user terminal is disconnected from the Internet network by the terminal disconnecting means In addition, there is described a combined configuration of quarantine means, in which a recovery support device connected to the gateway device executes a computer virus quarantine process on the connected user terminal.
 特表2008-532133号公報には、ドメインネームシステム(DNS)偽装をするコンピュータウィルスの検出するためのシステムであって、DNSサーバへのURLを送信してI P リクエストを行う送信を行い、DNSサーバから、戻ってくるURLに対応するIPアドレスの通知を受信する手段と、前記受信したURLとIPアドレスを、予め記憶したI P アドレスに対応するURLデータと比較し、DNSサーバから受信したI P アドレスとURLの関係が一致するか否かを検出する手段が記載されている。 JP 2008-532133 A discloses a system for detecting a computer virus that impersonates a domain name system (DNS), which transmits a URL to a DNS server and makes an I P request. Means for receiving a notification of an IP address corresponding to the returning URL from the server, and comparing the received URL and IP address with URL data corresponding to a previously stored I P address, and receiving the I address received from the DNS server. A means for detecting whether or not the relationship between the P address and the URL matches is described.
 特開2009-157523号公報には、通信制御装置10は、ユーザごとに設けられた第1データベース50と、ユーザIDとユーザの端末に割り当てられているIPアドレスとを対応づけて記憶するユーザデータベース57と、接続管理サーバ120から端末のユーザIDと端末に付与したIPアドレスとを取得してユーザデータベース57に登録するユーザデータベース更新部460と、データファイルを含む通信データの送信元のIPアドレスをユーザデータベース57から検索してユーザIDを取得するユーザ識別部と、第1データベース50の取得したユーザIDに該当するレコードを参照して検索を実行する検索回路30と、検索結果に基づいてコンピュータウィルスに感染したデータファイルをフィルタリングする処理実行回路40とを備えることが記載されている。 In JP 2009-157523 A, the communication control apparatus 10 stores a first database 50 provided for each user, a user ID and an IP address assigned to the user's terminal in association with each other. 57, the user database update unit 460 that acquires the user ID of the terminal and the IP address assigned to the terminal from the connection management server 120, and registers them in the user database 57, and the IP address of the transmission source of the communication data including the data file A user identification unit that searches the user database 57 to obtain a user ID, a search circuit 30 that performs a search by referring to a record corresponding to the acquired user ID in the first database 50, and a computer virus based on the search result A process execution circuit 40 for filtering data files infected with It has been described to obtain.
 ホームページ(http://www.aist.go.jp/aistj/press release/pr2006/pr20061122/pr20061122.htm)産総研:書き換え可能なハードウェアによる高速ウィルスチェックシステムの開発))には、プログラマブルなゲートアレイ(FPGA、CPLD等)を用いたコンピュータウィルスの検出システムが記載されている。 The homepage (http://www.aist.go.jp/aistj/press release / pr2006 / pr20061122 / pr20061122.htm) AIST: Development of a high-speed virus check system using rewritable hardware)) A computer virus detection system using an array (FPGA, CPLD, etc.) is described.
 特開2015-532756号公報には、IoT端末の管理者権限ファイルを、端末を管理するサーバ等に暗号化して移動し、更新プログラム等をダウンロード実行する時、この暗号化した管理者権限ファイルをダウンロード復号実行して使用する構成が記載されている。 In JP-A-2015-532756, when an administrator authority file of an IoT terminal is encrypted and moved to a server or the like that manages the terminal, and an update program is downloaded, the encrypted administrator authority file is A configuration for executing download decoding is described.
 特開2016-116130号公報には、IoT端末と無線受信器間のデータ通信中のペアリングコードを暗号化することが記載されている。 JP-A-2016-116130 describes that a pairing code during data communication between an IoT terminal and a wireless receiver is encrypted.
 特開2015-122744号公報には、マルチキャストIPアドレス及びマルチキャストMACアドレスの空白欄に、IoT装置を特定のシステムに接続させるための通信要素を書き込み、IoT装置は、これらのアドレスデータからデータを読み取り、特定のシステムと接続する為に常にIPアドレスを監視することが記載されている。 In JP-A-2015-122744, communication elements for connecting an IoT device to a specific system are written in blank fields of a multicast IP address and a multicast MAC address, and the IoT device reads data from these address data. It is described that the IP address is always monitored in order to connect to a specific system.
特開2013-137745号公報JP 2013-137745 A 特表2008-500633号公報Japanese translation of PCT publication No. 2008-500653 特開2007-102697号公報JP 2007-10297A 特表2008-532133号公報Special table 2008-532133 特開2009-157523号公報JP 2009-157523 A 特開2015-532756号公報Japanese Patent Laying-Open No. 2015-532756 特開2016-116130号公報JP 2016-116130 A 特開2015-122744号公報JP2015-122744A 特開2014-146139号公報JP 2014-146139 A
 特表2008-500633号公報には、コンピュータウィルスプログラムを、仮想空間で実行させ、その挙動に基づいたコンピュータウィルスの検出が開示されているが、コンピュータウィルスが、この仮想空間プログラムを攻撃して、偽装表示を行う可能性があり、その他の先行技術については、いずれもウィルスプログラムとして発見され、テンプレートがセキュリテイソフトウェアに登録された状態での後手の検出手法が開示されているものであり、未知のウィルスプログラムに対する対応策を開示するものではない。 JP 2008-500633 A discloses a computer virus program that is executed in a virtual space and detection of a computer virus based on its behavior, but the computer virus attacks this virtual space program, There is a possibility of disguise display, and other prior arts are all detected as virus programs, and the detection method of the back hand is disclosed with the template registered in the security software. It does not disclose countermeasures against virus programs.
 コンピュータウィルスは、少なくとも継続的に記憶可能で、内外に送受信できるコンピュータであれば、ハッカー、ハーダーの目的を最小限達成可能とすることから、今般IoTと呼ばれるインターネット接続デバイスもコンピュータウィルスの感染対象となり、既にIoT機器を感染させて、ボット化させ、攻撃を行うDDOS攻撃が行われており、その際のIoT機器の数が、10万個を超えているという事態に直面している。 Computer viruses can be stored at least continuously and can be transmitted and received inside and outside, so that the purpose of hackers and hackers can be achieved to a minimum. Therefore, Internet-connected devices called IoT are now subject to computer viruses. A DDOS attack has already been carried out in which an IoT device is infected, turned into a bot, and attacked, and the number of IoT devices at that time exceeds 100,000.
 ホームページ(http://www.aist.go.jp/aistj/press release/pr2006/pr20061122/pr20061122.htm)産総研:書き換え可能なハードウェアによる高速ウィルスチェックシステムの開発))に記載された手法は、すでにコンピュータウィルスのデータベースが存在した状態で、このデータベースの範囲で高速なコンピュータウィルスの検出を可能とするものであるが、昨今の標的攻撃型のコンピュータウィルスのようなデータベースに含まれないコンピュータウィルスに対応できるとは言い難い面がある。 The method described on the homepage (http://www.aist.go.jp/aistj/press release / pr2006 / pr20061122 / pr20061122.htm) AIST: Development of a high-speed virus check system using rewritable hardware)) Computer viruses that already exist in a computer virus database and can be detected at high speed within this database range, but are not included in the database, such as recent targeted attack computer viruses. It is hard to say that it is possible to cope with.
 サイバー戦争が行われている現在では、コンピュータソフトウェアのバージョンアップを常に行うといった決まりごとを設けることが最適な防御策とされているにとどまり、未知のコンピュータウィルスへの対応は未解明である。 At the present time of cyber warfare, it is considered that the best defense measure is to set a rule to always upgrade computer software, and the response to unknown computer viruses is still unclear.
 ましてや、インターフェースが限られるIoT端末は、特開2015-122744号公報で示される様に無線通信を利用した様々な操作が行われる様になる可能性が高くなることから、悪意のサイトとの接続の可能性が大きくなり、IoT機器の感染の可能性が益々高くなる。 Furthermore, IoT terminals with limited interfaces are more likely to perform various operations using wireless communication as disclosed in JP-A-2015-122744. This increases the possibility of infection of IoT devices.
 上記に鑑み本発明は、直接的又は間接的なインターフェースを具備し、前記インターフェースに基づいて、実行したデータを外部へ出力する信号処理手段、
 インターフェースデータを記憶する記憶手段、
 前記信号処理ユニットが外部へデータを送信する際、前記データと前記記憶手段に記憶したインターフェースデータを比較し、一致、略一致、近似又は該当した場合、真正なデータであることを判断し、前記外部操作データに対応した認証データを付加して外部へ送信をする出口ゲート手段、
 外部から送信されたデータを受信し、前記受信データから、認証データを検出し、予め記憶した比較用データと比較して一致、略一致、又は近似した場合、真正なデータであるとして受信する入口ゲート手段
よりなる組み合わせにより、コンピュータウィルスの影響を排除した正確なデータ送信を可能とする。
In view of the above, the present invention has a direct or indirect interface, and based on the interface, signal processing means for outputting executed data to the outside,
Storage means for storing interface data;
When the signal processing unit transmits data to the outside, it compares the data with the interface data stored in the storage means, and determines that the data is genuine if it matches, substantially matches, approximates, or falls true, An exit gate means for adding the authentication data corresponding to the external operation data and transmitting it to the outside,
An entrance that receives data transmitted from the outside, detects authentication data from the received data, and receives it as authentic data when it matches, approximately matches, or approximates compared with comparison data stored in advance. The combination of gate means enables accurate data transmission that eliminates the effects of computer viruses.
 更に本発明は、目的の動作、現象を受信し、センサ電気信号に変換するセンサユニット、
 前記センサユニットのセンサ電気信号をセンサデジタルデータに変換してセンサデータを送信する送信部と、外部よりデータを認証データと共に受信する受信部を有する信号処理ユニット、
 前記センサユニットのセンサ出力から、事象データと事象時間データを検出し、一時的に記録する記録手段、
 前記送信部が外部へセンサデータを出力する際、当該センサデータと前記記録手段に記録された事象データ及び事象時間データを読み出して、一致、略一致、近似又は該当するデータの有無を検出することで認証を行う認証手段、
 前記認証手段が一致、略一致、近似又は該当するデータを検出できない場合、外部へのデータの出力を遮断する出口ゲート
を有することで、センサ出力から実際センサから出力した信号であることを認証可能とし、インターフェースが限られている場合でも、コンピュータウィルスの影響を排除した正確なデータ送信を可能とする。
Furthermore, the present invention provides a sensor unit that receives a desired operation and phenomenon and converts it into a sensor electric signal,
A signal processing unit including a transmission unit that converts sensor electric signals of the sensor unit into sensor digital data and transmits the sensor data, and a reception unit that receives data from the outside together with the authentication data;
Recording means for detecting and temporarily recording event data and event time data from the sensor output of the sensor unit;
When the transmission unit outputs sensor data to the outside, the sensor data and the event data and event time data recorded in the recording unit are read to detect the presence / absence of matching, approximate matching, approximation, or corresponding data Authentication means to authenticate with,
If the authentication means does not detect coincidence, almost coincidence, approximation or applicable data, it can authenticate that it is a signal output from the sensor output from the sensor output by having an exit gate that blocks the output of data to the outside Even when the interface is limited, it is possible to transmit data accurately without the influence of a computer virus.
 更に、前記認証手段が一致、略一致、近似又は該当するデータを検出した場合、真正なセンサデータであると認証し、認証データを置換、変換又は付加して外部へ送信する。
 この認証データは、センサデータを受信する例えば管理サーバーで、予め記憶した送信元の機器のデータと比較又は照合することで、正当な送信元が認証できる。
Further, when the authentication means detects coincidence, substantially coincidence, approximation, or corresponding data, it authenticates that the sensor data is authentic, replaces, converts or adds the authentication data, and transmits it to the outside.
The authentication data can be authenticated by, for example, a management server that receives the sensor data, by comparing or collating with the data of the transmission source device stored in advance.
 更に本発明は、目的の動作、現象を受信し、センサ電気信号に変換するセンサユニット、
 前記センサユニットのセンサ電気信号をセンサデジタルデータに変換して外部へ認証信号と共にセンサデジタルデータを送信する送信部と、外部よりデータを認証データと共に受信する受信部を有する信号処理ユニット、
 前記認証信号を検証することで、前記信号処理ユニットから出力されるデータが真正データであるかどうかを認証する認証手段
を備えることで、センサユニットの信号処理の仕方に左右されず、安定したセンサデータの外部送信を可能とする。
 又、前記認証信号を検証することで、前記信号処理ユニットから出力されるデータが真正データであるかどうかを認証する認証手段の組み合わせ構成により、インターフェースを備えなくても、真正なデータの送信を行うことができると共に、受信するデータも認証データの秘匿的な取り扱いを可能とすることによって、真正なデータをうけとることができ、外部から不正に侵入するコンピュータウィルスの影響を排除し、安定したIoT端末の使用を実現する。
Furthermore, the present invention provides a sensor unit that receives a desired operation and phenomenon and converts it into a sensor electric signal,
A signal processing unit having a transmission unit that converts sensor electric signals of the sensor unit into sensor digital data and transmits the sensor digital data together with an authentication signal to the outside; and a reception unit that receives data from the outside together with the authentication data;
By providing authentication means for verifying whether or not the data output from the signal processing unit is authentic data by verifying the authentication signal, the sensor is stable regardless of the signal processing method of the sensor unit. Allows external transmission of data.
In addition, by verifying the authentication signal, it is possible to transmit authentic data without an interface by using a combination of authentication means for authenticating whether or not the data output from the signal processing unit is authentic data. In addition to being able to perform authentication, the authentication data can also be handled confidentially, so that the authentic data can be received, the influence of a computer virus illegally entering from the outside is eliminated, and stable IoT is achieved. Realize the use of the terminal.
 本発明は、出口でのセンサデータの真偽の認証の際、センサデータから検出した事象データ及び事象時間データとセンサデータの比較又は照合、又は、センサデータに付加した付加データと予め記憶した付加データの照合の2通りの構成を示し、両者の構成を別々に用いる他、両者を組み合わせたものを用いても良い。 In the present invention, when authenticating sensor data at the exit, event data and event time data detected from sensor data are compared or verified with sensor data, or additional data added to sensor data is stored in advance. Two configurations of data collation are shown, and both configurations may be used separately, or a combination of both may be used.
 本発明における直接的なインターフェースとは、外部へ送信するコンピュータ端末に接続した、キーボード、マウス、タッチパッド、プッシュボタン式、スライド式スイッチ等を例示する。 The direct interface in the present invention is exemplified by a keyboard, a mouse, a touch pad, a push button type, a slide type switch and the like connected to a computer terminal that transmits to the outside.
 本発明における間接的なインタフェースとは、センサ等、コンピュータ端末が処理したデータを外部へ送信する際、処理する対象となるパーツが出力するデータのことを示すものである。 The indirect interface in the present invention indicates data output from a part to be processed when data processed by a computer terminal such as a sensor is transmitted to the outside.
 本発明における認証とは、例えば、センサデータを分岐するなどして得られたセンサデータから、特徴部、雑音部、等の事象データとこの事象データが発生する事象時間データを抽出し、外部へセンサデータが送信される際、センサデータと事象データ等を比較し、一致、略一致、又は近似するデータかどうかを確認することを示す場合もある。 The authentication in the present invention refers to, for example, extracting event data such as a characteristic part, a noise part, etc. and event time data in which this event data occurs from sensor data obtained by branching sensor data, and the like. When the sensor data is transmitted, the sensor data may be compared with the event data to indicate whether the data is coincident, substantially coincident, or approximate.
 センサデータに付加データを加えて信号処理ユニットから出力されるデータを認証する場合や、信号処理ユニットがデータを受信する入口部で入力するデータに付加された認証データを認証する場合、所定の値又は計測アナログ信号をADC(アナログ信号をデジタル信号に変換するユニット(回路))で変換したデジタル信号を、付加データとして用いても良い。 When additional data is added to the sensor data to authenticate the data output from the signal processing unit, or when the signal processing unit authenticates the authentication data added to the data input at the entrance that receives the data, a predetermined value Alternatively, a digital signal obtained by converting a measurement analog signal with an ADC (a unit (circuit) that converts an analog signal into a digital signal) may be used as additional data.
 所定の値とは、例えば、使用するセンサ情報を出力する出力範囲外又は、範囲内であるが、通常出力しない値を含むデータ(例えば、オーナー認証信号は、温度センサを用いたIoT機器の場合は、計測を行う目的の温度範囲が、室温の場合、120度のデジタルデータ、や-50度のデジタルデータであって、センサのアナログ出力をAD変換して得られる限界のデジタルデータである。)、通常の範囲外の範囲を備えた値、又は通常の範囲であって、計測している値の一部又は全部をデジタルデータ化してこれを付加して出力データを形成することで、不正な目的で、送受信データを傍受し分析する際の分析を困難にすることができる。 The predetermined value is, for example, data including a value that is outside or within the output range for outputting sensor information to be used but is not normally output (for example, the owner authentication signal is for an IoT device using a temperature sensor) Is digital data at 120 degrees or -50 degrees when the target temperature range for measurement is room temperature, and is the limit digital data obtained by AD conversion of the analog output of the sensor. ), A value with a range outside the normal range, or a normal range, part or all of the measured value is converted into digital data and added to form output data, which is illegal For this purpose, it is possible to make analysis difficult when intercepting and analyzing transmitted / received data.
 認証データは、信号処理ユニットが送信するセンサデータに付加する付加デジタル信号の他、オーナーチェックを行う制御ユニットで、付加デジタル信号を、置換、変換する等して付加する付加デジタルデータや、センサで計測して得られたデジタル計測データを含む場合もある。 In addition to the additional digital signal added to the sensor data transmitted by the signal processing unit, the authentication data is a control unit that performs an owner check. Additional digital data that is added by replacing or converting the additional digital signal, or a sensor In some cases, it includes digital measurement data obtained by measurement.
 信号処理ユニットからセンサデータ等の間接的なインターフェースデータが付加データと共に送信された場合、制御ユニットでは、予め記憶された付加データと、出力しようとする付加データとの比較が行われ、一致、略一致、近似又は該当した場合、外部へセンサデータ等の間接的なインターフェースデータを送信するものとし、その際、付加データは、認証データに置換、変換され、センサデータと共に外部へ送信される。 When indirect interface data such as sensor data is transmitted together with the additional data from the signal processing unit, the control unit compares the pre-stored additional data with the additional data to be output, and the matching, In the case of coincidence, approximation or matching, indirect interface data such as sensor data is transmitted to the outside. At this time, the additional data is replaced and converted into authentication data, and transmitted to the outside together with the sensor data.
 又、信号処理ユニットに認証データと更新プログラム等が管理サーバ等から送信された場合、いわゆる信号処理ユニットの入口においてオーナーチェックを行う制御ユニットが認証データを読み取り、これを予め記憶したデータと比較し、一致、略一致した場合、この更新プログラムを実行許可がされる構成を有する。 In addition, when authentication data and an update program are transmitted to the signal processing unit from the management server or the like, the control unit that performs the owner check at the entrance of the so-called signal processing unit reads the authentication data and compares it with the data stored in advance. When there is a match or a close match, this update program is permitted to be executed.
 又、信号処理ユニットから出力されたセンサデータに付加された付加データをそのままオーナー認証用データとしてもよく、更に識別可能なテキスト状のデータを付加したり、新たに置き換えたデータであってもよい。又、認証データとして、送信データに付加する場合は、複数のパケットに、一部ずつ埋め込み送信したり、ひとまとめにして送信してもよい。 Further, the additional data added to the sensor data output from the signal processing unit may be used as the data for owner authentication as it is, or may be data that is further added with identifiable text data or newly replaced. . Further, in the case of adding to the transmission data as authentication data, it may be partially transmitted embedded in a plurality of packets or may be transmitted collectively.
 認証データには、通信相手と自分のIPアドレスipv6、ipv4の一部が含まれていてもよく、アナログデータで認証を行う場合、アナログデータをデジタルデータに変換した際、閾値を超える値をデジタルパルス化して、ipアドレス等の意味を含ませることで、送信元の情報等を含む認証データを形成しても良い。 The authentication data may include a part of the IP address ipv6 and ipv4 of the communication partner and one's own, and when authenticating with analog data, when analog data is converted into digital data, a value exceeding the threshold value is digitally converted. Authentication data including information of a transmission source or the like may be formed by pulsing and including the meaning of an ip address or the like.
 認証データは、上述の様にIoT端末が備えたセンサ出力に起因することが好ましいが、センサを持たず、例えば、電気信号をそのまま受信して分析する分析ユニット等を持つ場合、この分析ユニットの動作に起因するデータを間接的インターフェースデータとして使用しても良い。又、相手先IPアドレス、MACアドレス等を認証データから検出して、相手先を確認しながら、データの送受信を行っても良い。 The authentication data preferably originates from the sensor output provided in the IoT terminal as described above. However, if the authentication data does not have a sensor and has an analysis unit that receives and analyzes an electrical signal as it is, for example, Data resulting from operation may be used as indirect interface data. Alternatively, the other party's IP address, MAC address, etc. may be detected from the authentication data, and data may be transmitted and received while confirming the other party.
 更にウェアラブルな機器のように直接的なインターフェースを備えた場合は、使用者の操作を記憶して、時系列的出力、又は、大別する操作出力(文字の入力、目的等)、又は一連の操作出力を付加データとして記憶し、この機器が外部へデータを送信する際、この付加データと送信データを照合して一致、又は略一致、又は近似した場合真正なデータとして判断し、出力するものであっても良い。又、出力するデータには、この付加データをよりコンパクトな状態で比較ができるように置換、圧縮変換等してもよい。 In addition, when a direct interface is provided, such as a wearable device, the user's operation is memorized, time-series output, or roughly classified operation output (character input, purpose, etc.), or a series of Operation output is stored as additional data, and when this device transmits data to the outside, this additional data and the transmitted data are collated, matched, or nearly matched, or approximated and determined as genuine data and output It may be. Further, the output data may be replaced, compressed or converted so that the additional data can be compared in a more compact state.
 又、認証データを暗号化して防御性を高めるものであってもよい。
 暗号化としては、例えば、共有鍵方式、公開鍵方式等の暗号アルゴリズムの使用、バーナム暗号等のストリームサイファを用いても良い。特に本発明は、IoTと呼ばれる極小さい空間に配置されるコンピュータチップを使用する場合があることから、デジタルデータを記憶するメモリ容量も小さくなる為、ハードウェアで比較的簡易に構成可能な、バーナム暗号、合成式暗号、その他のストリームサイファが好適に利用可能である。
Further, the authentication data may be encrypted to enhance the protection.
As the encryption, for example, a cryptographic algorithm such as a shared key method or a public key method, or a stream cipher such as a Burnham cipher may be used. In particular, the present invention may use a computer chip arranged in a very small space called IoT, so that the memory capacity for storing digital data is also small, so that the Burnham can be configured relatively easily with hardware. Encryption, synthetic encryption, and other stream ciphers can be suitably used.
 本発明におけるセンサユニットとは、温度、湿度、位置、傾き、回転数、加速度、脈波、心電図、血流、血圧、GPS、工場、プラントの各構成の状態を検出するもの等、コネクテッドカー、スマート家電、ロボット、ウェアラブルデバイス、プラント、工場、公共施設に1乃至複数個配置される等のいわゆるIoT機器が備えるセンサを例示するものであって、チップ化されている超小型センサが例示される。 The sensor unit in the present invention is a connected car, such as one that detects the state of each component of temperature, humidity, position, inclination, rotation speed, acceleration, pulse wave, electrocardiogram, blood flow, blood pressure, GPS, factory, plant, etc. Examples of sensors included in so-called IoT devices such as one or more arranged in smart home appliances, robots, wearable devices, plants, factories, public facilities, etc., are exemplified as ultra-small sensors that are made into chips. .
 本発明における信号処理ユニットは、センサユニットが接続される場合は、AD変換器、DA変換器を場合によっては含み、赤外線入出力、電磁波入出力、等の為のユニットを組み込むマイコン等、プログラムによってデジタル動作するものであって、IoT機器が使用するものであってもよいが、ストアードプログラムタイプのマイコンではなく、FPGA、CPLD等のゲートアレイを含むICを用いても良い。 When the sensor unit is connected, the signal processing unit according to the present invention includes an AD converter and a DA converter depending on the case, and a program such as a microcomputer incorporating a unit for infrared input / output, electromagnetic wave input / output, etc. The digital operation may be performed by an IoT device, but an IC including a gate array such as FPGA or CPLD may be used instead of a stored program type microcomputer.
 本発明における事象データと事象時間データにおける事象とは、例えばセンサユニットが出力するデータであって、雑音信号、異常信号、特徴信号等を示す。 The event data and the event time data in the present invention are data output from the sensor unit, for example, and indicate noise signals, abnormal signals, feature signals, and the like.
 事象時間データとは、この事象が発生した時間であって、信号処理ユニットが記録する時間と、オーナーチェックユニットが記録する時間が同期した時間を示す。
 尚、事象時間データは、少なくともセンサユニットが事象データを出力した時間がわかればよいことから、例えば絶対時間を信号処理ユニット、及びオーナーチェックユニットが計測しているものであればそれでも良い。
The event time data is the time when this event occurs, and indicates the time when the time recorded by the signal processing unit is synchronized with the time recorded by the owner check unit.
The event time data only needs to know at least the time at which the sensor unit output the event data. For example, the event time data may be any data as long as the signal processing unit and the owner check unit measure the absolute time.
 本発明における記憶ユニットとは、ROM、RAM、NVRAM,FEPROM、SDカード、USBメモリ、SSD、HD、その他のメデイアであって、単体又はこれらを組み合わせて、書き込み可能な記憶ユニットを形成する。 The storage unit in the present invention is ROM, RAM, NVRAM, FEPROM, SD card, USB memory, SSD, HD, or other media, and a writable storage unit is formed by a single unit or a combination thereof.
 本発明における入出力ユニットとは、外部ネットワークと接続する為のパケット信号の送受信を行う為のものであって、イーサーネット(商標)仕様等、公知の形式のデータを入力し、送信するユニット等で示される。 The input / output unit in the present invention is for transmitting and receiving packet signals for connection to an external network, and is a unit for inputting and transmitting data in a known format such as Ethernet (trademark) specifications. Indicated by
 本発明におけるアンテナ、いわゆる無線LANを形成する周波数帯に基づいた導電性部材等で形成されるものの他、赤外線LED等、その他の無線媒体を使用する場合は、その媒体に沿ったアンテナが例示される。 In the case of using another wireless medium such as an infrared LED or the like in addition to the antenna in the present invention, which is formed of a conductive member based on a frequency band forming a so-called wireless LAN, the antenna along the medium is exemplified. The
 本発明は、主にIoT機器の為の構成を示すものであることから、TCP/IP、FTP等通信規格を用いるインターネットをネットワークとして用いることが主となるが、ブルートゥース(登録商標)、赤外線等の無線媒体も、ローカルエリアで使用されていることから、インターネットだけでなく、その他の媒体、通信規格に基づく、ネットワークも含まれる。 Since the present invention mainly shows a configuration for an IoT device, the Internet using a communication standard such as TCP / IP or FTP is mainly used as a network. However, Bluetooth (registered trademark), infrared rays, etc. Since the wireless medium is also used in the local area, it includes not only the Internet but also other media and networks based on communication standards.
 本発明は、インターフェースが限られたIoT機器について、センサデータと、センサデータから分離抽出した事象データ及び事象時間データの比較及び/又は付加された認証データの比較により真正なデータであることが判定された場合のみ、データの入力と出力をできるようにすることで、外部からの攻撃においても、防御できると共に万が一、内部にコンピュータウィルススクリプトが埋め込まれ感染実行しても、センサデータと事象データ及び事象時間データとが、一致、略一致、近似又は該当していない又は真正な付加データが検出できない場合は外部へデータ送信を遮断することで、悪意のサイトからの攻撃を防ぐと共に、感染しても、外部へデータを出力しないことで、安定したIoT端末の使用が可能となる。 The present invention determines that the IoT device having a limited interface is authentic data by comparing sensor data with event data and event time data separated and extracted from the sensor data and / or comparison of added authentication data. By only allowing data to be input and output, it is possible to protect against external attacks, and even if a computer virus script is embedded inside and executes infection, sensor data and event data and If event time data matches, approximately matches, approximates, does not correspond, or authentic additional data cannot be detected, data transmission to the outside is blocked to prevent attacks from malicious sites and However, since data is not output to the outside, a stable IoT terminal can be used.
 又、オーナー認証データを検査する際、アナログデータとして検査することで、容易な、認証データの取得を困難とし、コンピュータウィルスへの防御が可能となる。 Also, when the owner authentication data is inspected, it is difficult to easily obtain authentication data by inspecting it as analog data, and it is possible to protect against computer viruses.
 又、小型でありながら、秘匿性の高いストリームサイファにより認証データを暗号化することで、コンピュータウィルスへの防御が可能となり、安定したIoT端末を用いたシステムを形成可能とする。 In addition, it is possible to protect against computer viruses by encrypting authentication data with a stream cipher with high secrecy even though it is small, and it is possible to form a system using a stable IoT terminal.
本発明の一実施例を示す模式図である。It is a schematic diagram which shows one Example of this invention. 本発明の実施例の動作を説明する為の流れ図である。It is a flowchart for demonstrating operation | movement of the Example of this invention. 本発明の実施例の動作を説明する為の流れ図である。It is a flowchart for demonstrating operation | movement of the Example of this invention. 本発明の他の実施例を示す模式図である。It is a schematic diagram which shows the other Example of this invention. 本発明の他の実施例を示す模式図である。It is a schematic diagram which shows the other Example of this invention. 本発明の他の実施例を示す模式図である。It is a schematic diagram which shows the other Example of this invention. 本発明の他の実施例を示す模式図である。It is a schematic diagram which shows the other Example of this invention.
 本発明は、IoT機器、その他、自動処理(間接的インターフェース)、手動処理(直接的インターフェース)を備えた端末の入口と出口に位置し、IoT機器等の端末をオーナーとしたオーナーチェックを、IoT機器等から物理的に独立したユニット(回路)で構成することが好ましい。 The present invention is located at the entrance and exit of a terminal equipped with automatic processing (indirect interface), manual processing (direct interface), and other IoT devices. It is preferable to configure the unit (circuit) that is physically independent from the device or the like.
 本発明は、タッチパッド、操作スイッチ、キーボード等の直接的なインターフェース又はセンサ出力データ等の間接的なインターフェース、及びこのインタフェースに基づいたデータをデジタル信号に変換した後、信号処理を行い、処理されたインターフェースに基づいたデータを外部へ出力する信号処理ユニットにおいて、
 インターフェースに基づいたデータから特徴となる部位、雑音等使用されない不要な部位からなる事象データとこの事象データが発生した事象時間データを予め記憶し、信号処理ユニットが、インターフェースに基づいたデータを外部へ送信する際、記憶していた事象データ等がインターフェースに基づくデータ内に存在する場合真正なデータと判定し、この真正なデータと、認証データを組み合わせて外部へ送信する構成と、
 信号処理ユニットで作成されたインターフェースに基づくデータを外部へ送信しようとする際、付加データをこのデータに加えた状態とし、この付加データが予め記憶した付加データリストと一致した場合、真正なデータと判定して、この付加データを認証データとしたもの又は、付加データを痕跡を残しながら認証データに置換したもの(痕跡認証データ)と信号処理ユニットで作成されたインターフェースに基づくデータの両方を合わせたものを外部へ送信する構成のいずれか一方又は両方を出口処理として行う。
The present invention converts a direct interface such as a touch pad, operation switch, and keyboard or an indirect interface such as sensor output data, and data based on this interface into a digital signal, and then performs signal processing. In the signal processing unit that outputs data based on the selected interface to the outside,
Event data consisting of parts that are characteristic from the interface-based data, unnecessary parts that are not used, such as noise, and event time data when this event data occurred are stored in advance, and the signal processing unit sends the data based on the interface to the outside When transmitting, when the stored event data or the like is present in the data based on the interface, it is determined as authentic data, and the authentic data and authentication data are combined and transmitted to the outside.
When data based on the interface created by the signal processing unit is to be transmitted to the outside, the additional data is added to this data, and if this additional data matches the pre-stored additional data list, the authentic data Judgment was made by combining both the additional data used as authentication data or the additional data replaced with authentication data while leaving a trace (trace authentication data) and the data based on the interface created by the signal processing unit. Either or both of the configurations for transmitting the object to the outside are performed as exit processing.
 さらに本発明は、IoT機器の入口において、入力されるデータから認証データを抽出して予め登録された認証データと比較又は照合して、真正なデータであるかの判定を行う。 Further, according to the present invention, at the entrance of the IoT device, the authentication data is extracted from the input data and compared with or collated with the authentication data registered in advance to determine whether the data is authentic.
 このように、IoT機器の外部からのデータを受信する入口及びデータを外部へ送信する出口で、直接的インターフェース又は間接的インターフェースで形成されるデータの真偽を予め記憶した間接的又は直接的操作を行って得られたインターフェースデータの一部と、送信しようとするインターフェースデータとを比較して、真偽を判定することで、コンピュータウィルスの感染等の影響が無い安定したIoT機器の使用を可能とする。 In this way, an indirect or direct operation in which the authenticity of data formed by the direct interface or the indirect interface is stored in advance at the entrance for receiving data from the outside of the IoT device and the exit for transmitting data to the outside. By comparing part of the interface data obtained by performing the interface with the interface data to be transmitted and judging the authenticity, it is possible to use a stable IoT device that is not affected by computer virus infection, etc. And
 又、入口では、送信されてきたデータに含まれる認証データを検出し、照合することで、外部からのコンピュータウィルスの攻撃を受けることなく安定したデータの入出力が可能となる。 In addition, at the entrance, it is possible to input / output stable data without being attacked by an external computer virus by detecting and collating authentication data included in the transmitted data.
 本発明は、センサデータをデジタルデータに変換して送受信することが主なタスクである機器が主であるが、必ずしもセンシングする機器を備える場合以外でも、例えば、インターネットからデータを受け取り、駆動する電気ドリル等のような一方向の機器や、ウェアラブル端末、タブレット、スマートフォン等のPC端末であって、キーボード、タッチパネル等の操作用インターフェースを備えたものも含まれる。 The present invention is mainly a device whose main task is to convert sensor data into digital data and transmit / receive it. However, the present invention is not necessarily provided with a device for sensing, for example, an electric device that receives and drives data from the Internet. A one-way device such as a drill or a PC terminal such as a wearable terminal, a tablet, or a smartphone, which includes an operation interface such as a keyboard or a touch panel is also included.
 認証データ、オーナー認証データ、認証データの痕跡(オーナー認証データを置換等して変換したデータ)データ、及び事象データと事象時間データは、正規な送信元のデータを認証する為のデータであり、なりすましを防ぐことができる程度の内容、大きさを備えていることが好ましい。 Authentication data, owner authentication data, trace of authentication data (data converted by replacing the owner authentication data) data, event data and event time data are data for authenticating the data of the legitimate transmission source, It is preferable that the content and size are sufficient to prevent spoofing.
 具体的には、端末からセンサデータ、操作データ等が送信される際、このセンサデータ又は操作データ内に予め記憶しておいた事象データ又は操作軌跡データが含まれているか否かで真正のデータかどうかを判断し、真正なデータであると判断された場合は、付加データを認証データ(外部で、予め記憶され、比較可能なデータ)に置換、変換、又は付加した真正データを送信する。 Specifically, when sensor data, operation data, or the like is transmitted from the terminal, genuine data is determined by whether or not event data or operation trajectory data stored in advance is included in the sensor data or operation data. If the data is determined to be authentic data, the authentic data obtained by replacing, converting, or adding the additional data to the authentication data (data stored externally in advance and comparable) is transmitted.
 受信者は、送信されてきたデータから、認証データを分離抽出した後この認証データと予め記憶されたデータとを比較して、同じかおおよそ同じ場合は、真正データと判断する。 The receiver separates and extracts the authentication data from the transmitted data, compares this authentication data with the data stored in advance, and determines that the data is authentic if it is the same or approximately the same.
 この認証データは、暗号化することで、より秘匿性を高めることを可能とする。
 暗号化は、コンピュータウィルスの攻撃に対する防御機能を備えているが、IoT端末自体が小さいため、暗号アルゴリズムソフトウェアのサイズが限られてしまう。
 そこで、例えばXOR(排他的論理和)のICチップ、乱数発生回路、又は数列発生回路と選択回路の組み合わせで構成される構成を小さくできるストリームサイファ型暗号を使用することが好ましい。
This authentication data can be encrypted to further improve confidentiality.
Encryption has a protection function against computer virus attacks, but the size of the encryption algorithm software is limited because the IoT terminal itself is small.
Therefore, it is preferable to use, for example, an XOR (exclusive OR) IC chip, a random number generation circuit, or a stream cipher type encryption that can reduce the configuration constituted by a combination of a sequence generator and a selection circuit.
 尚、乱数発生回路は、周期性があることから、複数の数列発生回路をICチップ内にマウントして配置し、これを選択する信号を認証データと一緒に出力する合成型バーナム暗号方式を採用することで、小型で、秘匿性に優れ、しかもスピードが速い暗号回路が形成可能である。 Since the random number generator circuit has periodicity, it employs a composite Burnham encryption method in which multiple sequence generator circuits are mounted in an IC chip and a signal for selecting this is output together with authentication data. By doing so, it is possible to form a cryptographic circuit that is small in size, excellent in secrecy, and fast.
 更に本発明は、無線LANを主としたデータの送受信と共に、赤外線、電磁波を無線媒体とした通信を別途利用してもよい。 Furthermore, the present invention may separately utilize communication using infrared and electromagnetic waves as a wireless medium in addition to transmission / reception of data mainly using a wireless LAN.
 次に本発明の一実施例を図1を参照して詳細に説明する。 Next, an embodiment of the present invention will be described in detail with reference to FIG.
 図中、11aは、入口制御ユニットであり、マイコン、ゲートアレイ等で構成され、好ましくは、ADコンバータ(ADC)、その他、ブルートゥース(登録商標)、赤外線データ等の送受信ユニットと接続できる入出力ポートが形成されている。 In the figure, 11a is an inlet control unit, which is composed of a microcomputer, a gate array, and the like, and preferably an input / output port that can be connected to an AD converter (ADC), other transmission / reception units such as Bluetooth (registered trademark), infrared data, etc. Is formed.
 11bは、出口制御ユニットであり、入口制御ユニット11aと同様の構成を備えているものであって、両者は、説明用に分離したものであるが、一体化して一つの制御ユニットであってもよい。 11b is an outlet control unit, which has the same configuration as the inlet control unit 11a. Both are separated for explanation, but may be integrated into one control unit. Good.
 11cは、D/A変換器であり、デジタル信号をアナログ信号に変換する回路であり、制御ユニットに内蔵されている場合があるが、説明用に別途構成として示した。 11c is a D / A converter, which is a circuit for converting a digital signal into an analog signal, and may be built in the control unit, but is shown as a separate configuration for explanation.
 11dは、送受信ユニットAであり、赤外線LED、フォトトランジスタ、フォトダイオード、アンテナ、等で構成され、赤外線、電磁波等で構成される無線媒体11eによるデータの送受信を可能とするユニットである。送受信ユニットA11dは、送受信ユニットB17bとの間でデータの送受信を行う。これら送受信ユニットA11d、送受信ユニットB17bは、現在IoT機器が付属する赤外線通信、ブルートゥース(登録商標)通信で用いられているものと同じもので足り、信号処理ユニット、制御ユニット何れにも、赤外線通信電波通信をサポートするポート等のユニットが含まれているものを利用することが好ましい。 11d is a transmission / reception unit A, which is configured by an infrared LED, a phototransistor, a photodiode, an antenna, and the like, and enables transmission / reception of data by a wireless medium 11e including infrared rays, electromagnetic waves, and the like. The transmission / reception unit A11d transmits / receives data to / from the transmission / reception unit B17b. The transmission / reception unit A11d and the transmission / reception unit B17b may be the same as those currently used for infrared communication and Bluetooth (registered trademark) communication with IoT devices. It is preferable to use one that includes a unit such as a port that supports communication.
 12は、認証用デバイスであり、マイコン、記憶メモリ、等で構成され、マイコンの場合は、入口制御ユニット11a又は出口制御ユニット11bが代用して使用されてもよい。 12 is an authentication device, which includes a microcomputer, a storage memory, and the like. In the case of a microcomputer, the inlet control unit 11a or the outlet control unit 11b may be used instead.
 認証用デバイス12は、信号処理ユニット17から出力されたセンサデータ内の事象データ、及び事象時間データを記憶する。 The authentication device 12 stores event data and event time data in the sensor data output from the signal processing unit 17.
 又、認証用デバイス12は、センサデータに付加データが加えられ、制御ユニットで出口認証を行う場合に用いられる比較用付加データを記憶している。 Further, the authentication device 12 stores additional data for comparison that is used when additional data is added to the sensor data and outlet authentication is performed by the control unit.
 認証用デバイス12には、図1で示すコンパレータ12aが一部として含まれており、オペアンプによる一般的な回路を例示する。 The authentication device 12 includes the comparator 12a shown in FIG. 1 as a part, and exemplifies a general circuit using an operational amplifier.
 コンパレータ12aは、入力端子12a1の入力電圧が、閾値電圧12a2を上回った場合、出力端12a3の出力が反転する回路を示す。
 コンパレータ12aは、比較検出ユニットの一例であり、これに限るものではなく、閾値電圧12a2より入力電圧が上回った時、出力端12a3の出力が変化する回路であれば良い。
The comparator 12a is a circuit in which the output of the output terminal 12a3 is inverted when the input voltage of the input terminal 12a1 exceeds the threshold voltage 12a2.
The comparator 12a is an example of a comparison detection unit, and is not limited thereto, and may be any circuit that changes the output of the output terminal 12a3 when the input voltage exceeds the threshold voltage 12a2.
 このコンパレータ12aを複数配置し、それぞれ閾値電圧を上限と下限に設定し、帯域的な閾値としたり、閾値電圧12a2を超えて得られる信号をパルス化することで符号情報を持つデジタル信号として出力してもよい。この場合、符号情報が、認証データを示すこととなることから、より解読困難な認証データを得ることができる。 A plurality of the comparators 12a are arranged, and the threshold voltage is set to an upper limit and a lower limit, respectively, and a band-like threshold is set, or a signal obtained by exceeding the threshold voltage 12a2 is pulsed to output as a digital signal having code information. May be. In this case, since the code information indicates authentication data, authentication data that is more difficult to decipher can be obtained.
 13は、入口ゲートであり、主に入出力ユニット15から、信号処理ユニット17への信号の移動を遮断、制限、速度遅延を行う為の構成及び、入出力ユニット15の信号を入口制御ユニット11aへ切替送信したり、分岐送信したりするものであり、少なくとも認証中は、データの移動を中断する状態を形成することが好ましい。 Reference numeral 13 denotes an entrance gate, which is mainly configured to block, limit, and delay the movement of the signal from the input / output unit 15 to the signal processing unit 17 and the signal of the input / output unit 15 to the entrance control unit 11a. It is preferable to form a state in which the movement of data is interrupted at least during authentication.
 14は、出口ゲートであり、主に信号処理ユニット17から入出力ユニット15への送信データを、出口制御ユニット11bへ切替送信又は分岐送信したり、遮断、接続を行うものである。 14 is an exit gate, which mainly performs transmission transmission or branch transmission of the transmission data from the signal processing unit 17 to the input / output unit 15 to the exit control unit 11b, and performs blocking and connection.
 15は、入出力ユニットであり、アンテナ16から伝達された変調信号を復調し、デジタル信号に変換する為のものであり、フロントエンド回路を含む。 Numeral 15 is an input / output unit for demodulating the modulated signal transmitted from the antenna 16 and converting it into a digital signal, and includes a front-end circuit.
 16は、アンテナであり、使用する無線周波数に対応した長さ、幅等を備えた導電性部材よりなり、例えば数百MHzからGHz用のスマートフォンアンテナ等で形成されている。アンテナ16は、無線通信の利用の際用いるものであるが、必ずしも無線通信ではなく、有線による例えばイーサーネット(登録商標)を用いた通信を利用する場合もあり、適宜選択される場合もある。 Reference numeral 16 denotes an antenna, which is made of a conductive member having a length, a width, and the like corresponding to a radio frequency to be used, and is formed of, for example, a smartphone antenna for GHz from several hundred MHz. The antenna 16 is used when wireless communication is used. However, the antenna 16 is not necessarily wireless communication, and may use wired communication such as Ethernet (registered trademark), or may be appropriately selected.
 17は信号処理ユニットであり、IoT機器で用いられる、ADコンバータ、ブルートゥース(登録商標)ユニットが内蔵されているか又はこれらと接続するポートが備わっていることが好ましい。 Reference numeral 17 denotes a signal processing unit, which preferably has an AD converter and a Bluetooth (registered trademark) unit used in an IoT device or has a port connected to these.
 17aは、付加信号出力ユニットであり、RAM(例えば、その他の継続的に記録可能なメデイアから要時、付加信号データの受信を受ける構成を備えている状態のもの)、ROM、NVRAM、EEPROM、SDカード、USBメモリ等で構成され、記憶メモリに予め付加信号用のデータを記憶し、信号処理ユニット17からの要請に応じて、データを出力する為のものである。
 キーボード、スイッチ、タッチパネル型操作スイッチ等の直接的インターフェースが接続されている場合、付加信号出力ユニット17aには、インターフェース操作の時系列的軌跡データを直接データとして含む場合もある。
 センサデータ等の間接的なインターフェースデータを用いる場合、付加信号出力ユニット17aは不要になる場合もある。
Reference numeral 17a denotes an additional signal output unit, which includes a RAM (for example, a state in which additional signal data is received when necessary from other continuously recordable media), ROM, NVRAM, EEPROM, It is composed of an SD card, a USB memory or the like, and is used for storing additional signal data in the storage memory in advance and outputting the data in response to a request from the signal processing unit 17.
When a direct interface such as a keyboard, a switch, or a touch panel type operation switch is connected, the additional signal output unit 17a may include time series trajectory data of the interface operation as direct data.
When using indirect interface data such as sensor data, the additional signal output unit 17a may be unnecessary.
 17bは、送受信ユニットBであり、上述の送受信ユニットA11dと同様の構成を有する。 17b is the transmission / reception unit B, which has the same configuration as the transmission / reception unit A11d described above.
 18は、記憶ユニットであり、制御信号ユニット17を動作させるOSプログラム、アプリケーションプログラム、等が記憶されると共に、センサユニット19のセンサ電気出力であって、デジタル化されたデータを一時的に所定期間中記憶する場合もある。
 記憶ユニット18は、更に固有の付加データを備えている。これは、正規のプログラムが起動し、センサユニットからセンサデジタルデータを出力した場合に付加される場合、形成されるデータであり、事象データ等の比較を出口制御ユニット11bで行う場合は不要となる。
Reference numeral 18 denotes a storage unit that stores an OS program, an application program, and the like that operate the control signal unit 17, and is a sensor electrical output of the sensor unit 19, which temporarily stores the digitized data for a predetermined period. There is also a case of memorizing inside.
The storage unit 18 further includes specific additional data. This is data that is formed when a legitimate program is started and sensor digital data is output from the sensor unit, and is unnecessary when comparison of event data or the like is performed by the exit control unit 11b. .
 19はセンサユニットであり、上記の様に、IoT機器で使用されるセンサであればよいが、少なくともセンサ毎にグループが形成され、グループ毎に、認証用デバイスが同様のセンサを備えた状態が好ましいが、特にこれに限るものではない。 Reference numeral 19 denotes a sensor unit, as long as it is a sensor used in an IoT device as described above. At least a group is formed for each sensor, and the authentication device includes a similar sensor for each group. Although it is preferable, it is not limited to this.
 19aは、AD変換器であり、センサユニット19のセンサデータ出力をデジタル信号に変換するためのものであり、出口制御ユニット11bが内蔵する場合や、センサユニット19が内蔵する場合があるが、説明の為に付加したものである。尚、図4から図6では省略している。 Reference numeral 19a denotes an AD converter for converting the sensor data output of the sensor unit 19 into a digital signal. The outlet control unit 11b may be built in, or the sensor unit 19 may be built in. It is added for the purpose. It is omitted in FIGS. 4 to 6.
 20及び21は、入口側電気通信路と出口側電気通信路であり、有線、無線が示されるが、ここでは有線を使用したものを例示する。
 無線接続を用いる場合は、送受信ユニットA11d及び送受信ユニットB17bを介してデータの送受信が行われることが例示される。
Reference numerals 20 and 21 denote an entrance-side electrical communication path and an exit-side electrical communication path, in which wired and wireless are shown, but here, examples using wired are exemplified.
When wireless connection is used, data is transmitted / received via the transmission / reception unit A11d and the transmission / reception unit B17b.
 22は、無線ルーターであり、場合によっては、ゲートウェイ機能を備えることで、この部位でも認証データを用いた認証が行われる場合もある。 22 is a wireless router, and in some cases, by providing a gateway function, authentication using authentication data may also be performed at this part.
 23は、管理サーバーであり、制御ユニット17を含むIoT端末を操作したりデータを信号処理ユニットにアップロードした後、実行して、プログラムの更新を行う為のものである。 23 is a management server for operating the IoT terminal including the control unit 17 or uploading data to the signal processing unit and then executing it to update the program.
 24は、ネットワークであり、主にインターネットとして使用されるものであるが、その他、イントラネット、エクストラネット、ブルートゥース(登録商標)、赤外線による近距離ネットワークを示す場合もある。 24 is a network, which is mainly used as the Internet, but may indicate an intranet, extranet, Bluetooth (registered trademark), or a short-range network using infrared rays.
 次に図1の信号処理ユニット17が外部管理サーバー23等からデータを入力する場合における入口制御ユニットの動作(入口処理)を図2を参照して説明する。 Next, the operation of the entrance control unit (entrance processing) when the signal processing unit 17 of FIG. 1 inputs data from the external management server 23 or the like will be described with reference to FIG.
 信号処理ユニット17で作動するプログラムは、例えばWEBサーバー型のプログラムであり、このプログラムに基づいて動作をする。 The program that operates in the signal processing unit 17 is, for example, a WEB server type program, and operates based on this program.
 インターフェースを持たない信号処理ユニット又はインターフェースを制限的に持つ信号処理ユニットとは、TCP/IP、FTP等によるパケット通信を行うことで、更新プログラムのアップロード、実行が自動的に行われることが例示される。 A signal processing unit that does not have an interface or a signal processing unit that has an interface limitedly illustrates that uploading and executing an update program is automatically performed by performing packet communication using TCP / IP, FTP, or the like. The
 管理サーバー23から、信号処理ユニット17へデータを送信する際、送信されるデータパケットは、変調されたパケット信号が無線ルーター22から出力し、アンテナ16を介して入出力ユニット15に入力される。 入出力ユニット15は、変調されたパケット信号を復調して、入口ゲート13へ送信する。
 尚、信号処理ユニット17宛のデータが、更新プログラムと、認証データが別々で、それぞれ異なるIPアドレスのパケットデータが送信される場合があるが、その関連性を示すデータも認証データとして両者に含まれていることが好ましい。
When data is transmitted from the management server 23 to the signal processing unit 17, a modulated packet signal is output from the wireless router 22 and transmitted to the input / output unit 15 via the antenna 16. The input / output unit 15 demodulates the modulated packet signal and transmits it to the entrance gate 13.
There are cases where the data addressed to the signal processing unit 17 is different from the update program and the authentication data, and packet data having different IP addresses may be transmitted. Data indicating the relationship is also included in both as authentication data. It is preferable that
 入口ゲート13は、このパケット信号を入口制御ユニット11aへ出力する。その際、入口ゲート13は、その信号が、データを含むパケットであって、通信先が信号処理ユニット17の場合は、例えば、認証後であって所定の時間の間、そのまま通過させても良い場合もある。 The entrance gate 13 outputs this packet signal to the entrance control unit 11a. At that time, when the signal is a packet including data and the communication destination is the signal processing unit 17, the entrance gate 13 may pass it for a predetermined time after authentication, for example. In some cases.
 信号処理ユニット17へプログラムが供給される場合は、更新、変更、追加、等があり、人為的な入力を行うインターフェースが限られているか無い信号処理ユニットは、ダウンロード後実行を行うが、本実施例では、送受信ユニットB17bからの実行許可信号が無い限り実行しない状態又は、入力制御ユニット11aから入口ゲート13を介して実行許可信号を信号処理ユニット17へ送信されない限り実行しない状態となっている。 When the program is supplied to the signal processing unit 17, there are updates, changes, additions, etc., and the signal processing unit that does not have a limited interface for performing artificial input executes after downloading. In the example, the execution is not performed unless there is an execution permission signal from the transmission / reception unit B17b, or the execution is not performed unless the execution permission signal is transmitted to the signal processing unit 17 from the input control unit 11a via the entrance gate 13.
 最初プログラムを送信する送信元である管理サーバー23は、供給開始をするパケットデータを信号処理ユニット17へ送信する。信号処理ユニット17は、これを受信するとダウンロード実行コードが自動的に起動準備がされる。 The management server 23 which is a transmission source that transmits the first program transmits packet data for starting supply to the signal processing unit 17. When the signal processing unit 17 receives this, the download execution code is automatically prepared for activation.
 入口制御ユニット11aは、信号処理ユニット17宛のパケットの入力が受信したかどうかを確認しており(201)、パケットデータの受信があると、信号処理ユニット17宛のパケットの場合(yes)、オーナー認証が終了しているかどうか確認し(202)、終了している場合(yes)は、更に終了後の時間が所定時間を経過しているかどうか確認する(203)。この所定時間は、オーナー認証の有効期限に相当し、これを短くすると、よりセキュリテイを高めることができるが、あまり短いと、この認証だけで時間が取られてしまうことから、例えば、オーナー認証後、数秒間隔程度から数百秒間隔で行われることが示される。 The entrance control unit 11a confirms whether or not an input of a packet addressed to the signal processing unit 17 has been received (201), and if there is reception of packet data, a packet addressed to the signal processing unit 17 (yes), Whether or not the owner authentication has been completed is confirmed (202), and if it has been completed (yes), it is further confirmed whether or not a predetermined time has passed (203). This predetermined time corresponds to the expiration date of the owner authentication. If this is shortened, the security can be further improved. However, if it is too short, time is taken only by this authentication. It is shown that the process is performed at intervals of several seconds to hundreds of seconds.
 所定の時間内であれば(no)、ステップ219で、パケットデータが信号処理ユニット17へ送信される。尚信号処理ユニット17は、パケット内のデータを処理して、ペイロードのデータを取り出す工程をそなえている場合を示し、1500バイト以内に分解されたペイロードのデータを組み合わせて一つのコードにした後、これを実行する手段を併せて備えている。 If it is within the predetermined time (no), the packet data is transmitted to the signal processing unit 17 in step 219. The signal processing unit 17 shows a case where a process for processing the data in the packet and extracting the payload data is shown, and after combining the payload data decomposed within 1500 bytes into one code, A means for executing this is also provided.
 オーナー認証済で所定時間を経過している場合(203)(yes)又は、オーナー認証済でない場合(202)(no)、最初のパケットデータであるかどうか確認する(204)。
 最初のパケットデータである場合、認証可能時限時間(A時間)を設定しカウントを開始する(205)。
 この認証可能時間を有限とすることで、管理サーバー23が正規の送信をしているかどうかの判定や、ネットワークに異常があるかを確認することができる。
If the owner authentication has been completed and a predetermined time has elapsed (203) (yes), or if the owner authentication has not been completed (202) (no), it is confirmed whether the packet data is the first packet data (204).
If it is the first packet data, an authenticable time limit (A time) is set and counting is started (205).
By making this authenticable time finite, it is possible to determine whether or not the management server 23 performs regular transmission and to check whether there is an abnormality in the network.
 入口制御ユニット11aは、このパケット信号中に、認証データが存在するかどうかを確認するために、認証用デバイスから、認証データの所在部位を示すデータを抽出する。 The entrance control unit 11a extracts data indicating the location of the authentication data from the authentication device in order to confirm whether or not the authentication data exists in the packet signal.
 尚、一つのパケットの大きさが、1500バイト以下と決められていることから、認証データの、全部又は複数のパケットにまたがって認証データを分割して埋め込んでも良い。
 埋め込み場所は、例えば最初の数桁を、所定の余白の数バイト後に埋め込むものが示され、所定の余白を認証用デバイス12に記憶するものであってもよい。
Since the size of one packet is determined to be 1500 bytes or less, the authentication data may be divided and embedded across all or a plurality of packets.
As the embedding location, for example, the first few digits are embedded after several bytes of a predetermined margin, and the predetermined margin may be stored in the authentication device 12.
 次にそのパケットにオーナー認証用データが上述の検査を行って、含まれているか確認する(206)。検査は、パケット中認証用データを示す識別記号が含まれているかどうかを例示できる。 Next, it is checked whether or not the owner authentication data is included in the packet by performing the above-described inspection (206). The inspection can exemplify whether or not an identification symbol indicating authentication data in the packet is included.
 含まれている場合(yes)は、最初のオーナー認証データかが確認され、その場合(yes)は、オーナー認証データ確認時間タイマー(B時間)がカウント開始を行う(209)。
 オーナー認証データの受信でない場合(206)は、A時間が経過したかを確認する(207)。A時間内であれば、次に入力パケットデータの受信のステップ(201)を行い、A時間が過ぎた場合(yes)は、入力パケットデータが無かったものとして判断して、A時間、B時間がリセット(216)し、更に認証用データの構築が開始されている場合は、構築済認証用データをリセット(217)して、再び、入力パケットデータの受信ステップ(201)へ戻る。データの入出力は、データの通信速度が速い場合等、バッファに一時的にデータ蓄えながら行う場合は、データの漏れによる消去等が無いように認証時の入力パケットの処理時間は、時限でおこなうことが好ましい。
If it is included (yes), it is confirmed whether it is the first owner authentication data. If (yes), the owner authentication data confirmation time timer (B time) starts counting (209).
If the owner authentication data has not been received (206), it is confirmed whether A time has elapsed (207). If it is within A time, the next step (201) of receiving input packet data is performed. If A time has passed (yes), it is determined that there is no input packet data, and A time, B time Is reset (216), and when the construction of authentication data is started, the built-up authentication data is reset (217), and the process returns to the input packet data reception step (201) again. When input / output of data is performed while temporarily storing data in the buffer, such as when the data communication speed is high, the processing time of the input packet at the time of authentication is limited so that there is no erasure due to data leakage etc. It is preferable.
 次のオーナー認証データが受信されるか、オーナー認証データが受信されていない場合(208)、B時間経過かどうか確認する(210)。
 B時間が経過した場合(yes)、認証が時間切れであることとなり、A時間、B時間がリセットされ、更に認証用データとして蓄積されたデータがリセットされ(217)、入力パケットデータの受信ステップ(201)へ移行し、パケットデータを待つ。B時間が経過していない場合(no)、受信したオーナー認証データの一部を一時的に蓄積し、断片的な認証データを結合していく(211)。
If the next owner authentication data is received or no owner authentication data is received (208), it is confirmed whether or not the B time has elapsed (210).
When the time B has elapsed (yes), the authentication has timed out, the time A and time B are reset, and the data accumulated as authentication data is reset (217), and the input packet data reception step Go to (201) and wait for packet data. If the B time has not elapsed (no), a part of the received owner authentication data is temporarily stored, and fragmented authentication data is combined (211).
 一部のオーナー認証データが全部蓄積され、オーナー認証データが形成されたかどうか確認し(212)、不足している場合(no)は、受信ステップ(201)で、入力パケットの受信を待つ。認証データとして全部が取得でき、結合して認証データが形成できた場合は、次のステップ(213)で、オーナーチェック認証を行う。 It is confirmed whether all owner authentication data has been accumulated and the owner authentication data has been formed (212). If it is insufficient (no), the receiving step (201) waits for reception of an input packet. If all the authentication data can be acquired and combined to form the authentication data, the owner check authentication is performed in the next step (213).
 オーナーチェック認証は、予め認証用デバイス12が記憶したオーナーチェックデータとの比較を通じて一致した場合、オーナーであると認証する場合の他、この認証用データが暗号化されている場合は、これを復号化して、その値が真のオーナー認証データかどうかを判断する場合もある。
 更に認証用データが、アナログデータを意味するデジタルデータの場合は、DA変換器11cでアナログデータに変換され、認証用デバイス12のコンパレータ12aの入力端12a1に入力される。
 この入力端12a1に入力された入力信号の電圧は、閾値電圧12a2と比較され、閾値を上回った時、出力端12a3の出力が反転する。この反転したデータが、入口制御ユニット11aに入力されるとこの認証データが真であることが判断される。予め設定された閾値で比較する他、測定したセンサデータと付加データとして抽出した測定したセンサデータの一部をアナログ信号に変換した後、比較しても良い。例えば、脈波の場合は、ピーク電圧が比較的高い特徴的な部位の脈波を付加データとして抽出記録しておいて、アナログ信号によるオーナーチェック用データとして用いても良い。
The owner check authentication is performed by comparing with the owner check data stored in advance by the authentication device 12. In addition to authenticating the owner, the owner check authentication is decrypted if the authentication data is encrypted. In some cases, it is determined whether the value is true owner authentication data.
Further, when the authentication data is digital data representing analog data, it is converted into analog data by the DA converter 11 c and input to the input terminal 12 a 1 of the comparator 12 a of the authentication device 12.
The voltage of the input signal input to the input terminal 12a1 is compared with the threshold voltage 12a2, and when the voltage exceeds the threshold, the output of the output terminal 12a3 is inverted. When the inverted data is input to the entrance control unit 11a, it is determined that the authentication data is true. In addition to comparison with a preset threshold value, the measured sensor data and a part of the measured sensor data extracted as additional data may be converted into analog signals and then compared. For example, in the case of a pulse wave, a pulse wave at a characteristic part having a relatively high peak voltage may be extracted and recorded as additional data and used as owner check data using an analog signal.
 オーナー認証データが偽の場合(214)(no)、入口ゲート13、出口ゲート14は、データの送受信を停止するか遮断状態となり、更に、A時間、B時間及び認証データ等、全ての記憶をリセットし、場合によっては、使用者にアラートを出力する(215)。
 尚、入口ゲート13、出口ゲート14での物理的な遮断により管理サーバー23は、この端末での異常を交信が途絶えることで検知できるので、アラートが必要でない場合もある。
When the owner authentication data is false (214) (no), the entrance gate 13 and the exit gate 14 stop transmitting or receiving data or enter a shut-off state, and further store all data such as A time, B time and authentication data. Reset and, depending on the case, an alert is output to the user (215).
Note that the management server 23 can detect an abnormality at this terminal due to the interruption of communication due to physical interruption at the entrance gate 13 and the exit gate 14, so that an alert may not be necessary.
 更に入口制御ユニット11aは、送受信ユニットA11dに削除信号を出力する。送受信ユニットA11dは、無線媒体11e、送受信ユニットB17bを介して削除信号を送信し、信号処理ユニット17は、この信号を受けてダウンロードされたプログラム等のデータを削除する。 オーナー認証データが真の場合(214)(yes)、A時間、B時間の記録をリセットし(218)、入力パケットデータを入口側電気通信路20を介して、信号処理ユニット17へ送信する(219)。 Furthermore, the entrance control unit 11a outputs a deletion signal to the transmission / reception unit A11d. The transmission / reception unit A11d transmits a deletion signal via the wireless medium 11e and the transmission / reception unit B17b, and the signal processing unit 17 receives the signal and deletes data such as a downloaded program. If the owner authentication data is true (214) (yes), the recording of the A time and the B time is reset (218), and the input packet data is transmitted to the signal processing unit 17 via the entrance-side electric communication path 20 ( 219).
 更に送受信ユニットA11dに実行許可信号を出力し、信号処理ユニット17は、この実行許可信号の入力をうけて、ダウンロードされたプログラムを実行する。
 尚、目的とする更新プログラム等は、信号処理ユニット17にダウンロードまではするが、送受信ユニットB17bからの例えば特定の信号が入力され無い限りは実行できない状態とし、入口制御ユニット11aでの認証動作時、ダウンロードだけすることでスピードの速い通信時にデータの混乱を防ぐことができる。
Further, an execution permission signal is output to the transmission / reception unit A11d, and the signal processing unit 17 receives the execution permission signal and executes the downloaded program.
The target update program or the like is downloaded to the signal processing unit 17 but cannot be executed unless a specific signal is input from the transmission / reception unit B 17b, for example, during the authentication operation in the entrance control unit 11a. By just downloading, data confusion can be prevented during high-speed communication.
 DDOS攻撃や大量の意味のあるデータを送りつけて行う炎上攻撃等の意味を持つ又は意味を持たないデータを大量に送りつける攻撃に対しては、相手が認証できた場合でも、所定時間の範囲内で受信するデータ量(パケット数)が異常な量(所定時間内に、所定パケット数値を超える)かを検出し、もし検出した場合は、そのまま入口ゲート13を遮断することで、正規の管理サーバー攻撃を阻止できると共に、異常事態を、管理サーバー23に知らせることができる。IOT機器等の端末は、例えば鍵、チケット等収容するスペースが小さい容量の記憶と機能、又は必要とする機能と記憶が、その量に見合った記憶量以下の極小さい端末に収容する必要がある場合、ネットワーク接続の遮断は、必要とする機器をより少なくしながら、管理サーバへ異常を知らせるためにより有効である。 For attacks that send large amounts of meaningless or meaningless data such as DDOS attacks or flame attacks that send a large amount of meaningful data, even if the other party can authenticate, the range of the predetermined time It is detected whether the amount of data (number of packets) received within the network is an abnormal amount (exceeds the predetermined packet value within a predetermined time). A server attack can be prevented and an abnormal situation can be notified to the management server 23. A terminal such as an IOT device needs to be accommodated in a very small terminal in which, for example, a space for storing a key, a ticket or the like has a small capacity, or a function and a memory that are necessary, or less than a storage amount corresponding to the amount. In this case, the interruption of the network connection is more effective for notifying the management server of the abnormality while reducing the number of necessary devices.
 図1で示す実施例の外部へデータを送信する際の動作を図3に示し、説明する。 The operation when data is transmitted to the outside of the embodiment shown in FIG.
 センサユニット19のセンサ出力は、信号処理ユニット17へ供給されるが、併せて、AD変換器19aにも供給され、センサアナログデータは、デジタルデータに変換されると共に、出口処理ユニット11bに供給される。 The sensor output of the sensor unit 19 is supplied to the signal processing unit 17, but is also supplied to the AD converter 19a. The sensor analog data is converted into digital data and supplied to the outlet processing unit 11b. The
 出口処理ユニット11bは、このセンサユニットのデータ中、特徴となるデータを時間と共に計測する。
 特徴となるデータとは、例えば、電極、センサの動揺により信号に雑音が入った際の時間データ、この時間データは、信号処理ユニット17でセンサデータを処理する際の時間と、同期しているか、いつ発生したかわかる時間データと共に記録する。
The outlet processing unit 11b measures characteristic data in the sensor unit data with time.
The characteristic data is, for example, time data when noise is added to the signal due to the movement of the electrode and sensor. Is this time data synchronized with the time when the sensor data is processed by the signal processing unit 17? Record with time data to know when it occurred.
 雑音の場合は、信号処理ユニット17で削除される場合があるが、経時的な記録をとる場合があることから、その時間にデータが無いというデータは信号処理ユニット17から出力される場合がある。
 例えば、心拍データであれば、心拍数が通常より低く又は高くなった時のその現象を示すデータと時間を記録する。
 また、何ら変動が無く通常の出力を安定してセンサユニット19が出力する場合は、所定の時間間隔で安定したデータであるというデータを記録する。
 この事象データとこの事象データの発生時間を示す事象時間データを蓄積する。
In the case of noise, the signal processing unit 17 may delete the data. However, since there is a case where recording is performed over time, data indicating no data at that time may be output from the signal processing unit 17. .
For example, in the case of heart rate data, data and time indicating the phenomenon when the heart rate is lower or higher than normal are recorded.
Further, when the sensor unit 19 outputs a normal output stably without any fluctuation, data indicating that the data is stable at a predetermined time interval is recorded.
This event data and event time data indicating the occurrence time of this event data are accumulated.
 信号処理ユニット17がデータを例えば管理サーバー23へ送信する場合、予め送信する旨のデータが送信され、出口制御ユニット11bへの、データの供給路が形成される。
 信号処理ユニット17は、センサユニット19のセンサデータを管理サーバー23等へ送信する場合、送信用のデータを含む出力パケットデータを送受信ユニットB17bを介して出口制御ユニット11bへ出力し、出力制御ユニット11bは、送信用パケットデータを受信する(301)。
When the signal processing unit 17 transmits data to, for example, the management server 23, data to be transmitted in advance is transmitted, and a data supply path to the exit control unit 11b is formed.
When transmitting the sensor data of the sensor unit 19 to the management server 23 or the like, the signal processing unit 17 outputs output packet data including data for transmission to the exit control unit 11b via the transmission / reception unit B17b, and outputs the output control unit 11b. Receives the packet data for transmission (301).
 次に出口制御ユニット11bは、事象データ、及び事象時間データが入力されているか確認する(309)。 Next, the exit control unit 11b confirms whether event data and event time data are input (309).
 この時、出口ゲート14は、入出力ユニット15へパケット中のペイロードにデータを含むパケットデータを出力しない様に遮断しても良いが、センサデータを含まない等ペイロードに特にデータを含まない場合は、出力しても良い場合もある。 At this time, the exit gate 14 may be blocked so that packet data including data in the payload in the packet is not output to the input / output unit 15, but in the case where the payload does not particularly include data such as not including sensor data. In some cases, it may be output.
 出口制御ユニット11bは、事象データ等が含まれていない場合、この出力パケットデータに付加データが含まれていないかを検索検出する(309)。 When the event control data is not included, the exit control unit 11b searches and detects whether or not additional data is included in the output packet data (309).
 事象データが記憶されている場合は、次のステップ303で、信号処理ユニット17から出力されたセンサデータに事象データ、及び事象時間データがと一致、略一致、近似又は該当するデータがあるかどうか検索される。一致とは、データとして一致するか、又は、事象時間データ間にデータが無い(雑音なので削除されている)という点で一致することを示し、略一致は、相違する時間幅が所定の幅以内であるか、事象の程度が所定の幅である状態を示す。 If event data is stored, whether or not the event data and the event time data match, approximately match, approximate, or relevant data is present in the sensor data output from the signal processing unit 17 in the next step 303 Searched. Match indicates that the data match or that there is no data between the event time data (deleted because of noise), and the approximate match indicates that the different time width is within the specified width Or a state where the degree of the event is a predetermined width.
 近似とは、一致又は略一致していないが、その可能性が所定の割合で存在する場合を示す。この所定の割合は、予めセンシング対象によって異なるが、例えば心拍数の場合は、発生時間である事象時間データが、多少異なっていても、心臓疾患の可能性で同じである場合等である。 “Approximation” indicates a case where there is a coincidence or almost no coincidence but the possibility exists at a predetermined ratio. The predetermined ratio varies in advance depending on the sensing target. For example, in the case of a heart rate, the event time data as an occurrence time may be slightly different, but may be the same due to the possibility of heart disease.
 該当とは、例えば生体信号が特定の時間、現象、出力態様で特異的な個体差を持つ似た現象を示すデータをIOT機器が検出した場合等を示す。 “Applicable” indicates, for example, a case where the IOT device detects data indicating a similar phenomenon in which a biological signal has a specific individual difference in a specific time, phenomenon, and output mode.
 付加データは、付加信号出力ユニット17aに記憶され、制御処理ユニット17がデータを送信しようとする際、最初、中間、又は最後のパケットに処理したセンサデータであることを示すデータを含ませる為のデジタルデータ、又はアナログデータに変換される為のデジタルデータ等である。 The additional data is stored in the additional signal output unit 17a, and includes data indicating sensor data processed in the first, intermediate, or last packet when the control processing unit 17 tries to transmit data. Digital data or digital data to be converted into analog data.
 このデータは、信号処理ユニット17の固有のデータであることが好ましく、計測したデータの他、センサが出力するデータの種類に属しながら、センサでは、測定できるかどうか不明な臨界的データ等、明らかに固有であることがわかるデータが例示される。 This data is preferably data specific to the signal processing unit 17, and other than the measured data, it belongs to the type of data output by the sensor, and it is obvious that the sensor cannot measure whether critical data is unknown. Data that is known to be unique to each other is exemplified.
 アナログデータに変換する場合のデータとは、デジタル信号をD/A変換すると、その値を示すアナログデータが得られるデジタルデータである。又、インターフェースを使用者が操作して得られる時系列的操作データ(直接的データ)が含まれている場合は、送信データと、この時系列的操作データとを比較し、一致、不一致、又は近似するデータがあるかどうか判断しても良い。 The data in the case of converting to analog data is digital data from which analog data indicating the value is obtained when the digital signal is D / A converted. In addition, when time-series operation data (direct data) obtained by the user operating the interface is included, the transmission data is compared with this time-series operation data, and the match, mismatch, or It may be determined whether there is approximate data.
 この付加データが出口制御ユニット11bで検出される(ステップ302(yes))と、オーナーチェック認証ステップが起動する(303)。
 出口制御ユニット11bは、そのデータをD/A変換器に入力した後、得られるアナログデータが所定の閾値を設定したコンパレータ12aに入力する。
 このコンパレータ12aの出力がハイからロー又はローからハイへ変わった場合、その値がオーナー作成データであることが示されオーナー許可される(yes)。
When this additional data is detected by the exit control unit 11b (step 302 (yes)), an owner check authentication step is activated (303).
The exit control unit 11b inputs the data to the D / A converter, and then inputs the obtained analog data to the comparator 12a in which a predetermined threshold is set.
When the output of the comparator 12a changes from high to low or from low to high, the value is shown to be owner-created data and the owner is permitted (yes).
 ステップ304で許可がされない場合、出口ゲートを遮断するか、少なくとも、ペイロードにデータを含むパケットが外部へ出力がされない設定が行われる(306)。
 出口ゲートが遮断されることで、ネットワーク上では、端末アイコンが見えなくなる為、管理サーバー23へ異常を示すことができる場合がある。
If the permission is not permitted in step 304, the egress gate is blocked, or at least the packet including data in the payload is not output to the outside (306).
When the exit gate is blocked, the terminal icon becomes invisible on the network, and thus there may be a case where an abnormality can be indicated to the management server 23.
 ステップ304で、オーナー許可が行われた場合(yes)、事象データ及び事象時間データの比較による場合は、後続する複数の出力パケットの余白部分に、予め設定された認証データの一部が書き込まれたパケットデータを信号処理ユニット17に指示する。付加データによる認証の場合は、この付加データが出力パケットから削除され(305)、後続する複数の出力パケットの余白部分に、予め設定された認証データの一部が書き込まれたパケットデータを信号処理ユニット17に指示する(307)。 If the owner permission is given in step 304 (yes), if the event data and the event time data are compared, a part of the preset authentication data is written in the margins of the plurality of subsequent output packets. The received packet data is instructed to the signal processing unit 17. In the case of authentication by additional data, this additional data is deleted from the output packet (305), and packet data in which a part of preset authentication data is written in the margins of the plurality of subsequent output packets is subjected to signal processing. The unit 17 is instructed (307).
 ステップ305は、信号処理ユニット17が出力するセンサデータと、出口制御ユニット11bが一時的に記憶する事象データ等の比較の場合は不要となる場合もある。 Step 305 may be unnecessary when comparing sensor data output from the signal processing unit 17 with event data temporarily stored in the exit control unit 11b.
 尚、付加データが削除された部位に新たなデータを付加するよう送受信ユニットA11dを介して指示してもよい。
 又、時系列的操作データが存在する場合は、これを、予め記憶された認証データに変換するものであっても良い。
 センサデータに付加データを加えて認証を行う場合、この付加データを別の認証データに置き換えるか、変換する等して削除されることで、外部に認証データ(付加信号)が漏れることが無くなり、秘匿性が高まると共に新たに認証用のデータとしての使用が可能となる。
In addition, you may instruct | indicate via the transmission / reception unit A11d to add new data to the site | part from which the additional data was deleted.
If time-series operation data exists, it may be converted into authentication data stored in advance.
When authentication is performed by adding additional data to the sensor data, this additional data is replaced with another authentication data or deleted by conversion or the like, so that the authentication data (additional signal) is not leaked to the outside. As confidentiality increases, it can be used as new authentication data.
 認証データが埋め込まれた出力パケットデータは、入出力ユニット15へ送信され(308)、入出力ユニット15は、パケットデータを変調、電力増幅する等して、無線出力可能な状態としてアンテナ16へ出力する。
 アンテナ16から出力したパケットデータは、無線ルーター22で受信され、ネットワーク24を介して管理サーバー23へ送信される。
 管理サーバー23は、受信したパケットデータからオーナー認証データを分離抽出し、照合する等して、正規の端末からのデータかどうかを確認する。
The output packet data in which the authentication data is embedded is transmitted to the input / output unit 15 (308). The input / output unit 15 modulates the packet data, amplifies the power, etc., and outputs it to the antenna 16 as a wireless output enabled state. To do.
Packet data output from the antenna 16 is received by the wireless router 22 and transmitted to the management server 23 via the network 24.
The management server 23 separates and extracts the owner authentication data from the received packet data, and verifies whether the data is from a legitimate terminal.
 ここで、分割してパケットに埋め込まれたオーナー認証データは、例えば、付加データと同様、DA変換器に入力された後、比較ユニットで、閾値と比較され、真の認証データであることを確認する様な構成であっても良い場合もある。
 IoT機器は、アナログデータを取り扱うことから、AD変換器、DA変換器を内蔵するマイコン、FPGA、CPLDが用いられており、アナログデータによる認証を行うことにより構成を簡素化可能であると共に、物理的に分離した制御ユニットにより、IoT機器がコンピュータウィルスに感染し、悪意のプログラムに支配されたとしても、外部との接続を認証データに基づいて制御することで、外部と遮断して、コンピュータウィルスの影響を遮断できる。
Here, the owner authentication data divided and embedded in the packet is input to the DA converter, for example, like the additional data, and then compared with the threshold value by the comparison unit to confirm that it is the true authentication data. In some cases, such a configuration may be used.
Since IoT devices handle analog data, microcomputers with built-in AD converters and DA converters, FPGAs, and CPLDs are used, and the configuration can be simplified by performing authentication using analog data. Even if an IoT device is infected with a computer virus by a control unit that is automatically separated and is controlled by a malicious program, the connection with the outside is controlled based on the authentication data, so that the computer virus The influence of can be cut off.
 又、入口ゲートから入力されるデータが認証データを備えていない限り、信号処理ユニットに実行可能なコンピュータウィルスが形成されることはないので、外部からの攻撃を遮断できる。 Also, unless the data input from the entrance gate includes authentication data, an executable computer virus is not formed in the signal processing unit, so that it is possible to block attacks from the outside.
 図3に示した例では、信号処理ユニット17が管理サーバー23等の外部へデータを送信しようとした場合、事前に、出口制御ユニット11bで検査し、事象データ等の照合により真正なセンサデータであると認証された場合は、その旨を信号処理ユニット17へ送信し、信号処理ユニット17は、このセンサデータを出口ゲート14を介して管理サーバー23へ送信する。 In the example shown in FIG. 3, when the signal processing unit 17 tries to transmit data to the outside of the management server 23 or the like, it is checked in advance by the exit control unit 11 b and the sensor data is authentic by collating event data or the like. If it is authenticated, the fact is transmitted to the signal processing unit 17, and the signal processing unit 17 transmits this sensor data to the management server 23 via the exit gate 14.
 又、付加信号に基づいて認証を行い、真正な付加信号が付加されたセンサデータの場合は、この付加信号を認証データに置換する指示を信号処理ユニット17へ行って、出力用のパケットデータを変更処理させて出力する。 In addition, when the sensor data is authenticated based on the additional signal and the genuine additional signal is added, an instruction to replace the additional signal with the authentication data is sent to the signal processing unit 17 to output the packet data for output. Change and output.
 尚、出口制御ユニット11bと信号処理ユニット17間のみで通信可能なプロトコルの利用がされる場合、出口制御ユニット11bは、出口ゲート14を介して、信号処理ユニットから出力されたパケットデータを受信し、検査を行った後、付加信号を削除し、新たな認証データを付加したパケットデータを作成し、これを出口制御ユニット11bから、管理サーバー23へ送信しても良い場合もある。この場合は、出口制御ユニット11bのIPアドレスが管理サーバー23に登録されていることが好ましいが、暗号化する場合等は、復号化処理が認証となるため登録が必要でない場合もある。 When a protocol that allows communication only between the exit control unit 11b and the signal processing unit 17 is used, the exit control unit 11b receives the packet data output from the signal processing unit via the exit gate 14. After the inspection, the additional signal may be deleted, packet data with new authentication data added may be created, and this may be transmitted from the exit control unit 11b to the management server 23. In this case, it is preferable that the IP address of the exit control unit 11b is registered in the management server 23. However, in the case of encryption or the like, registration may not be necessary because the decryption process is authenticated.
 信号処理ユニット17は、センサデータのみを送信し、出口制御ユニット11bは、認証データを送信し、管理サーバー23は、両者を用いて認証し、真正なデータを取得する。 The signal processing unit 17 transmits only sensor data, the exit control unit 11b transmits authentication data, and the management server 23 authenticates using both to acquire authentic data.
 次に他の実施例を図4を参照して説明する。 Next, another embodiment will be described with reference to FIG.
 図中、40aは、出入口制御デバイスであり、外部からのデータの送受信を行う為の部分である。40bは、センサデータ処理部であり、センサの出力信号をデジタルデータに変換して赤外線、電波を媒体とした近距離送受信を行う送受信部B410へ出力する。 In the figure, reference numeral 40a denotes an entrance / exit control device, which is a part for transmitting and receiving data from the outside. Reference numeral 40b denotes a sensor data processing unit that converts the sensor output signal into digital data and outputs the digital data to the transmission / reception unit B410 that performs near-field transmission / reception using infrared and radio waves as a medium.
 401は、制御ユニットであり、図1で示すDA変換器、AD変換器、等を含むマイコン、FPGA、CPLD、その他のSoC等で構成され、オーナー認証動作をおこなう他、外部から送信されたパケットデータから、プログラムデータを分離形成する手段、センサ端末から出力するセンサデータを外部へ認証データを含むパケットデータとして送信するものである。 401 is a control unit, which is composed of a microcomputer including the DA converter and AD converter shown in FIG. 1, FPGA, CPLD, other SoC, etc., and performs an owner authentication operation, and also a packet transmitted from the outside A means for separating and forming program data from data, and sensor data output from a sensor terminal are transmitted to the outside as packet data including authentication data.
 402は、認証用センサユニットであり、図1で示すコンパレータ回路を含む他、認証データ等を予め記憶している。認証センサユニットは、特定のセンサを含むフォトカプラ等のアナログデジタル変換部を含み、入力されるアナログ信号を、一度光信号に変換して、再度電気信号に変換し、その際のアナログ電気信号を、デジタル信号に変換する構成を取っても良い。
 又、認証センサユニットは、例えば、定格上は無い光の波長スペクトル毎の変換効率の悪さを持つ部位を予め捉えた光学素子等を備え、その変換効率の悪い部分の波長の出力を行わせるアナログ信号に変換可能なデジタル認証データにより、オーナーである認証を行うものであっても良い。
 この認証センサユニットは、センサユニット409と同じ働きをし、同じ部位を測定する場合もある。
 同じ測定をすることで、間接的なインターフェースデータが2つ形成され比較することで、オーナーチェックを可能とする場合もある。
Reference numeral 402 denotes an authentication sensor unit that includes the comparator circuit shown in FIG. 1 and stores authentication data and the like in advance. The authentication sensor unit includes an analog-to-digital converter such as a photocoupler including a specific sensor, converts an input analog signal into an optical signal, converts it into an electrical signal again, and converts the analog electrical signal at that time The digital signal may be converted into a digital signal.
In addition, the authentication sensor unit includes, for example, an optical element or the like that previously captures a part having poor conversion efficiency for each wavelength spectrum of light that is not rated, and an analog that outputs the wavelength of the part with low conversion efficiency. The authentication may be performed by digital authentication data that can be converted into a signal.
This authentication sensor unit functions in the same manner as the sensor unit 409 and sometimes measures the same part.
By performing the same measurement, two indirect interface data are formed and compared, and an owner check may be possible.
 403は、ゲートユニットであり、図1で示す入口ゲートと出口ゲートで構成され、異常な信号の入出力時にデータを遮断、又は規制することができる構成を有する。 Reference numeral 403 denotes a gate unit, which includes the entrance gate and the exit gate shown in FIG. 1, and has a configuration capable of blocking or regulating data when an abnormal signal is input / output.
 404は、入出力ユニットであり、所望の周波数帯でのデータの送受信を行う為の変調ユニット、復調ユニット及びアンテナからパケットデータを送受信するための電力増幅回路等を備えている。 Reference numeral 404 denotes an input / output unit, which includes a modulation unit for transmitting / receiving data in a desired frequency band, a demodulation unit, a power amplification circuit for transmitting / receiving packet data from an antenna, and the like.
 405は、アンテナであり、無線通信を行うため無線パケットデータの送受信を行う為のものである。 405 is an antenna for transmitting and receiving wireless packet data for wireless communication.
 406は、送受信部Aであり、ブルートゥース(登録商標)用インダクタ、赤外線(LED、フォトトランジスタ)、ダイレクトWi-Fi、ZIGbee(登録商標)等の媒体を利用することができるための入出力デバイスで構成されている。
 尚、この送受信部A406は、アンテナ405が併用されても良く、ネットワークを媒介して、利用されるものでもよい。
Reference numeral 406 denotes a transmission / reception unit A, which is an input / output device for using a medium such as an inductor for Bluetooth (registered trademark), infrared (LED, phototransistor), direct Wi-Fi, or ZIGbee (registered trademark). It is configured.
The transmission / reception unit A406 may be used in combination with the antenna 405 or may be used via a network.
 407は、信号処理ユニットであり、IoT機器を構成する、マイコン、FPGA、CPLDその他のSoC(System-on-a-chip)等で構成され、センサユニット409からのセンサ信号のデータをデジタル変換して受信した後、記憶ユニット408のメモリへこのセンサデジタルデータを一時的に又は継続的に記憶したり、記憶ユニット408に記憶したOS、アプリケーション等のプログラムを読み込んで実行するものである。
 407aは、付加信号出力ユニットであり、信号処理ユニット407からセンサデータなどを出力する際、任意の部位に付加信号を出力するためのものである。
Reference numeral 407 denotes a signal processing unit, which is composed of a microcomputer, FPGA, CPLD, or other SoC (System-on-a-chip) that constitutes an IoT device, and digitally converts sensor signal data from the sensor unit 409. The sensor digital data is temporarily or continuously stored in the memory of the storage unit 408, and programs such as OS and applications stored in the storage unit 408 are read and executed.
Reference numeral 407a denotes an additional signal output unit for outputting an additional signal to an arbitrary part when sensor data or the like is output from the signal processing unit 407.
 409は、センサユニット、408は、記憶ユニットであり、図1と同様の構成を具備するものであるが、センサデータから事象データ、及び事象時間データを、制御ユニット401へ送信して、認証を行う場合は、AD変換器(図示せず)を備えており、このAD変換器でデジタルデータに変換された後、送受信部B410へ送信される。
 センサユニット409のセンサ出力は、送受信部B410と接続し、制御ユニット401へセンサデジタル信号を送信する。
Reference numeral 409 denotes a sensor unit, and 408 denotes a storage unit, which has the same configuration as in FIG. 1, but transmits event data and event time data from the sensor data to the control unit 401 for authentication. When performing, an AD converter (not shown) is provided, and after being converted into digital data by this AD converter, it is transmitted to the transmission / reception unit B410.
The sensor output of the sensor unit 409 is connected to the transmission / reception unit B410 and transmits a sensor digital signal to the control unit 401.
 410は、送受信部Bであり、出入口制御デバイス40aの送受信部と同様の構成で、通信可能なものである。
 41は、無線通信可能な無線ルーターであって、場合によっては、他のネットワークとも接続するゲートウェイ機能をそなえたものが例示される。数MHZから数十GHZの電波を無線媒体41aとして使用し、データの送受信を行う。
 42は、ネットワークであり、主にインターネットが例示されるが、ローカルエリアネットワーク、その他携帯電話網が含まれる場合がある。
 43は、管理者サーバーであり、IoT機器を正規に管理する為のものである。
Reference numeral 410 denotes a transmission / reception unit B, which can communicate with the same configuration as the transmission / reception unit of the entrance / exit control device 40a.
Reference numeral 41 denotes a wireless router capable of wireless communication, and in some cases, a router having a gateway function for connecting to other networks is exemplified. Data is transmitted and received using radio waves of several MHZ to several tens of GHZ as the wireless medium 41a.
Reference numeral 42 denotes a network, which is mainly exemplified by the Internet, but may include a local area network and other mobile phone networks.
Reference numeral 43 denotes an administrator server for normally managing IoT devices.
 図4で示す実施例の動作を説明する。 The operation of the embodiment shown in FIG. 4 will be described.
 入口処理
 管理サーバー43、その他のIoT端末等から信号処理ユニット用アプリケーションプログラムの更新、追加、アップグレード用ソフトウェアその他のプログラムが送信される場合、送信データは、ネットワーク42、無線ルーター41を介して、アンテナ405に受信される。尚、データは、TCP/IPプロトコルを用いたパケット式のデータであるため、送受信が交互に行われるが、説明上、データの入力に限った説明を行う。
When an update, addition, upgrade software or other program for the signal processing unit application program is transmitted from the entrance processing management server 43 or other IoT terminal, the transmission data is transmitted via the network 42 and the wireless router 41 to the antenna. Received at 405. Since the data is packet-type data using the TCP / IP protocol, transmission and reception are alternately performed. However, for the sake of explanation, explanation is limited to data input.
 又、正規の管理サーバー43から、プログラムのアップロード等のデータの入力の場合は、パケットデータにその旨のデータが付加されており、制御ユニット401は、これを認識し、データ受信モードを形成することができる。従って、出入口制御デバイス40aは、センサユニットの代理として、自動又は、固定でIPアドレスが付される構成を備えている。
 入出力ユニット404に入力されたデータは、1500バイト以下に切断されたパケットデータであり、このパケットデータはゲートユニット403を介して、制御ユニット401へ供給される。
In addition, in the case of data input such as program upload from the regular management server 43, data to that effect is added to the packet data, and the control unit 401 recognizes this and forms a data reception mode. be able to. Therefore, the entrance / exit control device 40a has a configuration in which an IP address is automatically or fixedly assigned as a substitute for the sensor unit.
The data input to the input / output unit 404 is packet data cut to 1500 bytes or less, and this packet data is supplied to the control unit 401 via the gate unit 403.
 制御ユニット401は、パケットデータ中のペイロードに記述され埋め込まれた分断されたプログラムデータを結合すると共に、パケットデータの主にペイロードの部位から、認証データを検出し、分断されている場合は、これをつなぎ合わせる動作を行う。
 認証データと、アップロード用データとは、スペース等で区切られた状態で、併記される場合や、異なるパケットに組み込まれても良い場合もある。
 制御ユニット401は、分断された認証データを結合した状態で、これを認証用センサユニット402へ送信し、予め記憶された認証データと照合して、正規のデータかどうか判別する場合や、これを、DA変換器に入力して、アナログ信号に変換し、これをコンパレータ等のアナログ検出装置で、図1の動作で説明したように正当性を判断するものであってもよい。
The control unit 401 combines the divided program data described and embedded in the payload in the packet data, and detects the authentication data mainly from the part of the payload of the packet data. Perform the operation of stitching together.
The authentication data and the upload data may be written together in a state separated by a space or the like, or may be incorporated into different packets.
When the divided authentication data is combined, the control unit 401 transmits the authentication data to the authentication sensor unit 402 and compares it with the authentication data stored in advance to determine whether it is legitimate data. The analog signal may be input to the DA converter and converted into an analog signal, and this may be judged by an analog detection device such as a comparator as described in the operation of FIG.
 制御ユニット401が入力されたデータが認証用センサユニット402から出力された判定信号より正規のデータであると認証できた場合は、送受信部A406、端末用送受信部B410を介して、信号処理ユニット407へ送信する。
 信号処理ユニット407は、このデータを受信すると、記憶ユニット408へ、記憶させると共に、必要に応じて受信プログラムを自動実行する。
When the data input by the control unit 401 can be authenticated as legitimate data based on the determination signal output from the authentication sensor unit 402, the signal processing unit 407 is transmitted via the transmission / reception unit A406 and the terminal transmission / reception unit B410. Send to.
Upon receiving this data, the signal processing unit 407 stores the data in the storage unit 408 and automatically executes the reception program as necessary.
 出口処理
 事象データ及び事象時間データに基づく認証の場合
 センサユニット409のセンサデータは、デジタル信号に変換された後、送受信ユニットB410、送受信ユニットA406を介して制御ユニット401へ送信される。
 制御ユニット401は、このセンサデータから、事象データ及び事象時間データを検出し、一時的に記録する。
 事象データは、1以上あれば良いが時間間隔に区切りその時間内で事象データの検出を行うことがセンサの種類によって、好ましい場合もある。
In the case of authentication based on the exit processing event data and event time data, the sensor data of the sensor unit 409 is converted into a digital signal and then transmitted to the control unit 401 via the transmission / reception unit B410 and the transmission / reception unit A406.
The control unit 401 detects event data and event time data from the sensor data, and temporarily records them.
The event data may be one or more, but it may be preferable depending on the type of sensor that event data is detected within a time interval.
 信号処理ユニット407は、センサユニット409から出力されるセンサデータを管理サーバー43へ送信する際、信号処理ユニット407から送信されたセンサデータと、事象データ及び事象時間データを照合して、一致、略一致、又は近似するデータがあるか認証し、ある場合は、認証データを付してセンサデータを管理サーバー43へ出力する。
 無い場合は、ゲートユニット403を遮断して、データの送受信を遮断し、管理サーバー43に異常を知らせる。
When the signal processing unit 407 transmits the sensor data output from the sensor unit 409 to the management server 43, the signal processing unit 407 collates the sensor data transmitted from the signal processing unit 407 with the event data and the event time data, and matches, If there is data that matches or approximates, authentication is performed. If there is data, authentication data is attached and sensor data is output to the management server 43.
If not, the gate unit 403 is shut off, data transmission / reception is shut off, and the management server 43 is notified of the abnormality.
 付加データに基づいて認証を行う場合
 信号処理ユニット407は、センサユニット409から出力されるセンサデータを管理サーバー43へ送信する際、管理サーバー43で、データを送信する旨の送信開始信号を端末送受信部B410へ出力する。送信開始信号は、送受信部A406を介して、制御ユニット401に受信され、送信元IPアドレス(出入口部)、送信先IPアドレス(管理サーバ)を含むパケット信号として、ゲートユニット403、入出力ユニット404及びアンテナ405、無線媒体(電波)41aを介して無線ルーター41へ送信する。
When performing authentication based on the additional data, when the signal processing unit 407 transmits the sensor data output from the sensor unit 409 to the management server 43, the management server 43 transmits a transmission start signal indicating that the data is transmitted to the terminal. Output to part B410. The transmission start signal is received by the control unit 401 via the transmission / reception unit A406, and as a packet signal including the transmission source IP address (entrance / exit unit) and the transmission destination IP address (management server), the gate unit 403 and the input / output unit 404 are transmitted. And it transmits to the wireless router 41 via the antenna 405 and the wireless medium (radio wave) 41a.
 信号処理ユニット407は、センサデータを整理し、送信データとして形成した後、付加信号出力ユニット407aから付加信号データを入手し、これをセンサーデータと共に制御ユニット401へ送信する。 The signal processing unit 407 organizes the sensor data and forms it as transmission data, obtains the additional signal data from the additional signal output unit 407a, and transmits it to the control unit 401 together with the sensor data.
 制御ユニット401は、受信したセンサーデータから付加信号データを分離して、これを、認証用センサユニット402へ送信するか又は、内蔵するDA変換器(図1に示す)へデータを入力して、アナログ信号に変換した後、認証用センサユニット402へ出力する。この付加信号が、信号処理ユニット407から正規に出力されたものと判断した場合は、この付加信号から構成される認証データ又は、予め調整された認証データをパケット送信用に分断又は調整し、更にセンサデータをパケット信号形式に分断調整し、認証データパケットとセンサデータパケットを識別可能に組み合わせてゲートユニット403へ送信し、ゲートユニット403、入出力ユニット404を介してアンテナ405へ出力する。 The control unit 401 separates the additional signal data from the received sensor data, and transmits this to the authentication sensor unit 402 or inputs the data to the built-in DA converter (shown in FIG. 1). After being converted to an analog signal, it is output to the authentication sensor unit 402. If it is determined that the additional signal is normally output from the signal processing unit 407, the authentication data composed of the additional signal or the authentication data adjusted in advance is divided or adjusted for packet transmission, and The sensor data is divided and adjusted into a packet signal format, the authentication data packet and the sensor data packet are identifiably combined and transmitted to the gate unit 403, and output to the antenna 405 through the gate unit 403 and the input / output unit 404.
 付加信号データが、認証用センサユニット402の照合、操作等で正規の信号処理ユニット407で正規に作成されたものではないと判定された場合、制御ユニット401は、ゲートユニット403へのデータの送信を遮断する信号を出力すると共にパケットデータの作成を中断する。
 ゲートユニット403がデータの送受信の中断をした場合、管理サーバー43は、データの送受信が中断されたことを管理サーバー43のネットワーク管理用コンピュータのモニター画面上のネットワーク構成を示す表示から消える等したことで認識し、IoT端末に異常があったことを認証することができる。
 コンピュータウィルスの攻撃においても、制御ユニット401への攻撃となり、認証データが無い場合は、ゲートユニット403により、データ遮断状態が形成される為、信号処理ユニット407への影響がなく安定したデータ通信を行うことができる。
When it is determined that the additional signal data is not normally created by the regular signal processing unit 407 due to verification, operation, or the like of the authentication sensor unit 402, the control unit 401 transmits the data to the gate unit 403. A signal for shutting off the packet is output and the creation of packet data is interrupted.
When the gate unit 403 interrupts transmission / reception of data, the management server 43 disappears from the display showing the network configuration on the monitor screen of the network management computer of the management server 43, etc. And can authenticate that there is an abnormality in the IoT terminal.
Even in the case of a computer virus attack, the control unit 401 is attacked, and when there is no authentication data, a data blocking state is formed by the gate unit 403, so that the signal processing unit 407 is not affected and stable data communication is performed. It can be carried out.
 次に他の実施例を図5に示し説明する。 Next, another embodiment will be described with reference to FIG.
 図5において、50aは、認証ユニットであり、50bは、IoT用端末ユニットである。 In FIG. 5, 50a is an authentication unit, and 50b is an IoT terminal unit.
 501は、AD変換器、DA変換器、ブルートゥース(登録商標)出力、赤外線出力を行うポートなどを備えたマイコン、FPGA、CPLD、その他のSoCにより構成され、制御ユニットであり、信号処理ユニット505から入力されるデータから付加データ及び認証データを分離抽出して、正規のデータかどうか認証判定するユニットである。
 又、制御ユニット501は、判定した内容に基づき、指示信号を指示出力部504へ出力する。
Reference numeral 501 denotes a control unit including an AD converter, a DA converter, a Bluetooth (registered trademark) output, a microcomputer having a port for performing infrared output, an FPGA, a CPLD, and other SoCs. This is a unit that separates and extracts additional data and authentication data from input data and determines whether the data is legitimate.
Further, the control unit 501 outputs an instruction signal to the instruction output unit 504 based on the determined content.
 502は、認証用センサユニットであり、図1及び図4で示したものと同様の構成を有するものであり、制御ユニット501から入力される認証データ、付加データの真偽を判定するデータ、及び真偽を判定するコンパレータ回路等を具備する。 Reference numeral 502 denotes an authentication sensor unit, which has the same configuration as that shown in FIGS. 1 and 4, and includes authentication data input from the control unit 501, data for determining the authenticity of additional data, and Comparator circuits for determining authenticity are provided.
 503は、送受信部Aであり、ブルートゥース(登録商標)用アンテナ、赤外線送受信用LED、フォトトランジスタ、ダイレクトWi-Fi等で構成されている。 Reference numeral 503 denotes a transmission / reception unit A, which includes a Bluetooth (registered trademark) antenna, an infrared transmission / reception LED, a phototransistor, direct Wi-Fi, and the like.
 504は指示出力部であり、送受信部A503と同様の素子で構成されており、送受信部A503と併用される場合もある。 Reference numeral 504 denotes an instruction output unit, which is composed of the same elements as the transmission / reception unit A503, and may be used together with the transmission / reception unit A503.
 505は、信号処理ユニットであり、図1、図4と同様、AD変換器、DA変換器、ななどを備えたマイコン、FPGA、CPLD、その他のSoCで構成され、センサユニット506からのデータを受信し、付加データと共にセンサデータを形成し、更にパケット信号化して入出力ユニット511へ送信するためものものである。
 又、信号処理ユニット505は、送受信部B508へ、外部から入力されたパケットデータを結合した後、実行せず、そのまま、送受信部B508へ出力する。
Reference numeral 505 denotes a signal processing unit, which is composed of an A / D converter, a D / A converter, a microcomputer equipped with an analog converter, FPGA, CPLD, and other SoCs as in FIGS. 1 and 4, and receives data from the sensor unit 506. This is for receiving, forming sensor data together with the additional data, further converting it into a packet signal and transmitting it to the input / output unit 511.
Further, the signal processing unit 505 combines the packet data input from the outside with the transmission / reception unit B508, and then outputs it to the transmission / reception unit B508 without executing it.
 505aは、付加信号出力ユニットであり、図1と同様に付加信号を生成又は予め記憶し、信号処理ユニット505へ出力する為のものである。本実施例では、この付加信号がそのまま認証データとなる構成を有する。  505a is an additional signal output unit for generating or previously storing an additional signal and outputting it to the signal processing unit 505 in the same manner as in FIG. In this embodiment, the additional signal is directly used as authentication data.
 506は、センサユニットであり、図1で示したものと同様、目的とするセンサを備え、アナログ電気信号を出力する為のものであり、更に事象データ及び事象時間データによる比較認証を行う場合は、AD変換器によりデジタル信号に変換して送受信部B508へ送信する。 Reference numeral 506 denotes a sensor unit, which is provided with a target sensor and outputs an analog electric signal, similar to that shown in FIG. 1, and in the case of performing comparative authentication using event data and event time data. , Converted into a digital signal by an AD converter and transmitted to the transmission / reception unit B508.
 507は、記憶ユニットであり、図1で示したものと同様に、メモリIC、記憶メディア、ストレージデバイス等で構成され、OSプログラム、アプリケーションプログラム、その他、センサデータを一時的又は継続的に記憶する為のものである。 Reference numeral 507 denotes a storage unit, which is composed of a memory IC, a storage medium, a storage device, etc., similar to the one shown in FIG. 1, and temporarily or continuously stores an OS program, application program, and other sensor data. Is for the purpose.
 508は、送受信部Bであり、送受信部A503と同様の構成を示すものである。
 509は、指示入力部であり、指示出力部504からの出力を受信し、指示データに変換するためのものであり、指示出力部504が赤外線LEDの場合は、指示入力部509は、赤外線受光ユニットにより構成されている。
 510は、指示ユニットであり、指示入力部509から送信された指示データに基づいて、入出力ユニット511の送受信動作を停止する為の信号を形成し出力する。
 又指示ユニット510は、指示入力部509から送信された指示データが、プログラムの実行可能指示データの場合は、信号処理ユニット505へ実行可能指示データを送信する。
Reference numeral 508 denotes a transmission / reception unit B, which has the same configuration as that of the transmission / reception unit A503.
Reference numeral 509 denotes an instruction input unit that receives an output from the instruction output unit 504 and converts it into instruction data. When the instruction output unit 504 is an infrared LED, the instruction input unit 509 receives infrared rays. It is composed of units.
Reference numeral 510 denotes an instruction unit that forms and outputs a signal for stopping the transmission / reception operation of the input / output unit 511 based on instruction data transmitted from the instruction input unit 509.
The instruction unit 510 transmits the executable instruction data to the signal processing unit 505 when the instruction data transmitted from the instruction input unit 509 is the executable instruction data of the program.
 511は、入出力ユニットであり、パケットデータの変調、復調等を行うと共に、送受信するパケットデータを、指示ユニット510からの指示に基づいて、入出力の遮断、停止を行う為のものである。 Reference numeral 511 denotes an input / output unit for modulating and demodulating packet data, and for blocking and stopping input / output of packet data to be transmitted / received based on an instruction from the instruction unit 510.
 次に動作を説明する。 Next, the operation will be described.
 入口処理
 ネットワーク52を介して伝達されたプログラムデータよりなるパケットデータは、IoT用端末ユニット50bが備えるIPアドレス宛に送信される。送信されたパケットデータは、無線ルーター51を介して、電波等の無線媒体51aを介してアンテナ512で受信される。
The packet data composed of the program data transmitted via the entrance processing network 52 is transmitted to the IP address provided in the IoT terminal unit 50b. The transmitted packet data is received by the antenna 512 via the wireless router 51 and the wireless medium 51a such as radio waves.
 アンテナ512を介して、入力されたパケットデータは、入出力ユニット511で復調されて、信号処理ユニット505へ送信される。信号処理ユニット505は、このパケットデータに分散されたプログラムデータ及び認証データを結合し、一つの実行可能なプログラムを生成する。認証データは、プログラムデータの数カ所に分散して記憶されたり、その他のペイロードに分散して記載され、その部分は、識別できる符号と共に記載されていたり、所定の空白により識別される様に記録されている。認証データは、テキストデータの場合、バイナリーデータの場合の何れであっても良く、空白等をそのまま含む形で結合して、送受信部B508へ出力するものであってもよい。 The packet data input via the antenna 512 is demodulated by the input / output unit 511 and transmitted to the signal processing unit 505. The signal processing unit 505 combines the program data and authentication data distributed in the packet data to generate one executable program. The authentication data is distributed and stored in several places in the program data, or is distributed and described in other payloads, and the part is recorded with a identifiable code or recorded so as to be identified by a predetermined blank. ing. The authentication data may be either text data or binary data, and may be output to the transmission / reception unit B 508 by being combined with a blank or the like as it is.
 送受信部A503は、このデータを受信し、制御ユニット501へ送信する。
 制御ユニット501は、この分散した認証データを検出し結合する等して、完成させ、そのまま認証用センサユニット502へ送信する。 バイナリデータであって、DA変換用データの場合は、これを、DAコンバータへ送信して、アナログ信号に変換した後、コンパレータ回路に入力する等して閾値検査を行い、正規のデータかを確認する。
The transmission / reception unit A 503 receives this data and transmits it to the control unit 501.
The control unit 501 completes the distributed authentication data by detecting and combining the data, and transmits the authentication data to the authentication sensor unit 502 as it is. In the case of binary data and data for DA conversion, it is sent to the DA converter, converted to an analog signal, and then input to the comparator circuit to check the threshold value to confirm that it is legitimate data. To do.
 正規のデータの場合は、その旨を指示出力部504へ送信する。
 指示出力部504の指示データは、指示入力部509で受信され、実行可能指示データを指示ユニット510に送信し、指示ユニット510は、信号処理ユニット505へ実行許可信号を出力する。
 この実行許可信号は、特定のデジタル入力ポートへ、”1”の信号を出力することで、信号処理ユニット505のプログラムがこれを認識し、プログラムの実行をする動作を信号処理ユニット505へ行わせる。
In the case of regular data, the fact is transmitted to the instruction output unit 504.
The instruction data of the instruction output unit 504 is received by the instruction input unit 509, and the executable instruction data is transmitted to the instruction unit 510. The instruction unit 510 outputs an execution permission signal to the signal processing unit 505.
This execution permission signal outputs a signal “1” to a specific digital input port, so that the program of the signal processing unit 505 recognizes this and causes the signal processing unit 505 to execute the program. .
 正規のデータでない場合は、その旨を示す信号を指示出力部504へ送信する。指示出力部504は、正規データでない旨の信号を指示入力部509へ出力し、指示入力部509は、この信号を、指示ユニット510へ出力する。
 指示ユニット510は、入出力ユニット511へ送受信路の遮断する旨の信号を出力する。入出力ユニット511は、送受信路の遮断を行う。
 管理サーバー53は、データの遮断を検知し、IoT用端末に異常があったことを確認する。
If the data is not regular data, a signal indicating that is transmitted to the instruction output unit 504. The instruction output unit 504 outputs a signal indicating that the data is not regular data to the instruction input unit 509, and the instruction input unit 509 outputs this signal to the instruction unit 510.
The instruction unit 510 outputs a signal to the input / output unit 511 to interrupt the transmission / reception path. The input / output unit 511 blocks the transmission / reception path.
The management server 53 detects the interruption of data and confirms that there is an abnormality in the IoT terminal.
 又、実行不許可信号であって、消去信号を、信号処理ユニット505の他の入力ポートへ送信する。この信号に基づいて、信号処理ユニット505は、この他の入力ポートに入力する信号を監視し、内部に存在する結合後のプログラムデータを消去する。 Also, an erasure signal that is an execution non-permission signal is transmitted to another input port of the signal processing unit 505. Based on this signal, the signal processing unit 505 monitors the signal input to the other input port and erases the combined program data existing inside.
 出口処理
 事象データ及び事象時間データに基づく認証の場合
 センサユニット506のセンサデータは、デジタル信号に変換された後、送受信ユニットB508、送受信ユニットA503を介して制御ユニット501へ送信される。
 制御ユニット501は、このセンサデータから、事象データ及び事象時間データを検出し、内部メモリに一時的に記録する。
 事象データは、1以上あれば良いが時間間隔に区切りその時間内で事象データの検出を行うことがセンサの種類によって、好ましい場合もある。
In the case of authentication based on the exit processing event data and event time data, the sensor data of the sensor unit 506 is converted into a digital signal and then transmitted to the control unit 501 via the transmission / reception unit B508 and the transmission / reception unit A503.
The control unit 501 detects event data and event time data from the sensor data, and temporarily records them in the internal memory.
The event data may be one or more, but it may be preferable depending on the type of sensor that event data is detected within a time interval.
 信号処理ユニット505は、センサユニット506から出力されるセンサデータを管理サーバー53へ送信する際、信号処理ユニット505から送信されたセンサデータと、事象データ及び事象時間データを比較して、一致、略一致、又は近似するデータがあるか認証し、ある場合は、認証データを付してセンサデータを管理サーバー53へ出力する。
 無い場合(センサデータが偽の場合)は、指示出力部504からセンサデータの送信をしない旨の信号を出力する。
 指示出力部504から出力された信号は、指示入力部509を介して指示ユニット510で、信号処理ユニット505からセンサデータを送信しない旨の信号を出力するか、入出力ユニット511へ出入り口遮断信号を送信する。出入口を遮断した場合、管理サーバー43に異常を知らせることになる。
When the signal processing unit 505 transmits the sensor data output from the sensor unit 506 to the management server 53, the signal processing unit 505 compares the sensor data transmitted from the signal processing unit 505 with the event data and the event time data so as to agree with each other. If there is data that matches or approximates, authentication is performed. If there is data, authentication data is attached and sensor data is output to the management server 53.
If there is no sensor data (if the sensor data is false), the instruction output unit 504 outputs a signal indicating that sensor data is not transmitted.
As for the signal output from the instruction output unit 504, the instruction unit 510 outputs a signal indicating that sensor data is not transmitted from the signal processing unit 505 via the instruction input unit 509, or sends an input / output block signal to the input / output unit 511. Send. When the doorway is shut off, the management server 43 is notified of the abnormality.
 付加信号データによる認証の場合
 信号処理ユニット505は、センサデータと、付加信号出力ユニット505aから送信される付加信号データを、送受信部B508へ送信する。
 送受信部B508に出力されたセンサデータと、付加信号データは、送受信部A503へ伝達され、制御ユニット501へ供給される。
 付加信号データは、例えば、認証用センサユニット502へ送信され、予め記憶された認証データ(付加信号データ)と照合したり、DA変換器に入力された後、コンパレータ回路で閾値データと比較されたりして、一致した場合は、正規の信号である旨の信号が、指示出力部504へ出力し、指示入力部509を介して、指示ユニット510へ送信される。
In the case of authentication using additional signal data, the signal processing unit 505 transmits sensor data and additional signal data transmitted from the additional signal output unit 505a to the transmission / reception unit B508.
The sensor data and additional signal data output to the transmission / reception unit B508 are transmitted to the transmission / reception unit A503 and supplied to the control unit 501.
For example, the additional signal data is transmitted to the authentication sensor unit 502 and collated with authentication data (additional signal data) stored in advance, or input to the DA converter and then compared with threshold data by a comparator circuit. If they match, a signal indicating that the signal is a normal signal is output to the instruction output unit 504 and transmitted to the instruction unit 510 via the instruction input unit 509.
 指示ユニット510は、送信を許可する信号を信号処理ユニット505の特定のポートへ出力し、又、入出力ユニット511の特定の入力ポートへ許可信号を出力する。
 入出力ユニット511は、この許可信号に基づいて外部との接続を可能とする。
 制御ユニット501が、正規でないデータであるとした場合は、その旨を指示出力部504へ出力し、指示入力部509を介して指示ユニット510へ正規でないデータである旨の信号を出力する。指示ユニット510は、信号処理ユニット505の特定の入力ポートへ、消去信号を出力し、信号処理ユニット505は、データを消去する。
 更に指示ユニット510は、入出力ユニット511のデータ送受信路を遮断し、管理サーバー53へIoT端末の異常を知らせる。
 本実施例では、IoT端末を中心に、外部ユニットとして認証ユニットを用いる構成を示すものであり、この認証ユニットの交換を容易にすることで、適用範囲を広げた認証が可能となる。
The instruction unit 510 outputs a signal for permitting transmission to a specific port of the signal processing unit 505 and outputs a permission signal to a specific input port of the input / output unit 511.
The input / output unit 511 enables connection to the outside based on the permission signal.
If the control unit 501 determines that the data is not normal, the control unit 501 outputs that fact to the instruction output unit 504 and outputs a signal indicating that the data is not normal to the instruction unit 510 via the instruction input unit 509. The instruction unit 510 outputs an erasure signal to a specific input port of the signal processing unit 505, and the signal processing unit 505 erases the data.
Further, the instruction unit 510 blocks the data transmission / reception path of the input / output unit 511 and notifies the management server 53 of the abnormality of the IoT terminal.
In this embodiment, a configuration in which an authentication unit is used as an external unit centering on an IoT terminal is shown. By making this authentication unit easy to exchange, it is possible to perform authentication with a wider application range.
 次に本発明の他の実施例を図6に示し説明する。 Next, another embodiment of the present invention will be described with reference to FIG.
 オーナーチェックする際、更に外部での解読を困難にして、安定した認証を行う実施例を図6に示し説明する。 FIG. 6 shows an embodiment in which stable authentication is performed by making it difficult to perform external decryption when performing an owner check.
 図6において、601は、制御ユニットであり、マイコン、その他のSoCで構成され、図1で示す実施例と同様の構成を備えている。
 601aは、送受信部Aであり、LED、赤外線LED、アンテナ、フォトトランジスタ等で構成され、図1等の送受信部と同様赤外線、電波等の媒体無線601a1により、近距離でデータの送受信を行うためのものである。
In FIG. 6, reference numeral 601 denotes a control unit, which is composed of a microcomputer and other SoCs, and has the same configuration as the embodiment shown in FIG.
Reference numeral 601a denotes a transmission / reception unit A, which includes an LED, an infrared LED, an antenna, a phototransistor, and the like. belongs to.
 602は、入口ゲートであり、バススイッチ、アナログスイッチ、リレースイッチ、ロジック型のデジタルスイッチ又は、データの伝送をオンオフできるICチップ等、伝送路をデータの送受信がされないようなことができるSoCデバイスで形成されている。 Reference numeral 602 denotes an entrance gate, which is a SoC device capable of preventing data transmission / reception such as a bus switch, an analog switch, a relay switch, a logic digital switch, or an IC chip that can turn on / off data transmission. Is formed.
 603は、出口ゲートであり、入口ゲート602と同様のハードウェアスイッチ類で形成される。 603 is an exit gate, which is formed of hardware switches similar to the entrance gate 602.
 604は、XOR(排他的論理和)ゲートであり、XORゲートIC、ロジックICで構成されることが好ましいが、制御ユニット601のソフトウェアで構成されても良い。 604 is an XOR (exclusive OR) gate, which is preferably composed of an XOR gate IC and a logic IC, but may be composed of software of the control unit 601.
 605は、数列発生器Aであり、不連続な数値又は、2値化データの配列が、所定数配列されたものを出力する。606は、数列発生器Bであり、607は、数列発生器Cであり、数列発生器A 605と同様の構成を備えながら、互いに異なるパターンの数列データが出力するものである。尚、この数列は、バイナリーデータの場合でハードウェア処理の場合は、2値化されたデータ列で表示される。 605 is a sequence generator A, which outputs a discontinuous numerical value or an array of binarized data arranged in a predetermined number. Reference numeral 606 denotes a sequence generator B, and reference numeral 607 denotes a sequence generator C, which has a configuration similar to that of the sequence generator A 605 and outputs sequence data of different patterns. This numerical sequence is displayed as a binary data sequence in the case of binary data and in the case of hardware processing.
 60aは、選択器であり、数列発生器A605、数列発生器B606、及び数列発生器C607の組み合わせ選択する為のものであり、選択信号の入力により選択を行う。
 例えば選択信号がBCAの場合、数列発生器B606を所定時間出力、数列発生器C607を所定時間出力、数列発生器A605を所定時間出力する順番で出力し、これをORゲート60bで一つの信号路に加算してXORゲートへ出力する。
Reference numeral 60a denotes a selector for selecting a combination of the sequence generator A605, the sequence generator B606, and the sequence generator C607, and performs selection by inputting a selection signal.
For example, when the selection signal is BCA, the sequence generator B606 is output for a predetermined time, the sequence generator C607 is output for a predetermined time, and the sequence generator A605 is output for a predetermined time, and this is output to one signal path by the OR gate 60b. And output to the XOR gate.
 所定時間は、予め設定された時間であり、付加データ、認証データの大きさによって調整される。
 ソフトウェアの場合は、数列発生器A605から数列発生器C607は、テキストデータによる数列発生器となることが好ましい。
The predetermined time is a preset time and is adjusted according to the sizes of the additional data and the authentication data.
In the case of software, the sequence generators A605 to C607 are preferably sequence generators based on text data.
 60bは、ORゲートであり、3入力端子を持つCMOS、TTL、汎用ロジックICで構成され、3つのデジタル信号を加算して一つのデジタル信号に変換出力するものである。 Reference numeral 60b denotes an OR gate, which is composed of a CMOS, TTL, and general-purpose logic IC having three input terminals, adds three digital signals, and converts them into one digital signal.
 608は、DA変換器であり、デジタル信号をアナログ信号に変換するユニット(回路)であり、制御ユニット601に内蔵する場合は、そのDA変換器を用いても良い。 Reference numeral 608 denotes a DA converter, which is a unit (circuit) that converts a digital signal into an analog signal. When the digital signal is built in the control unit 601, the DA converter may be used.
 609は、認証用デバイスであり、前記DA変換器608又はXOR(排他的論理和)ゲート604の出力と接続し、復号した認証データと予め記憶した認証データを比較照合したり、コンパレータ回路によるアナログ出力値を閾値で比較照合する。
 認証用デバイス609は、比較又は、照合の結果を、制御ユニット501へ出力する為のものである。
Reference numeral 609 denotes an authentication device which is connected to the output of the DA converter 608 or the XOR (exclusive OR) gate 604 and compares the decrypted authentication data with previously stored authentication data, The output value is compared and checked with a threshold value.
The authentication device 609 is for outputting the result of comparison or verification to the control unit 501.
 610は、入出力ユニットであり、無線通信の為の変調、復調、電力増幅を行う為の回路である。 610 is an input / output unit that is a circuit for performing modulation, demodulation, and power amplification for wireless communication.
 611は、アンテナであり、所定の周波数帯で、変調したデータを送信したり、受信したりする導電性部材、コイル等で構成されている。 Reference numeral 611 denotes an antenna, which includes a conductive member, a coil, and the like that transmit and receive modulated data in a predetermined frequency band.
 612は、信号処理ユニットであり、AD変換器、DA変換器、ブルートゥース(登録商標)、赤外線送受信ポートを含み、全体的には図1と同様の構成を具備し、センサユニット613のセンサデータ及び付加データを組み合わせたデータをパケットデータ化して出力する為のものである。
 612aは、付加データ出力部であり、正規の出力データである旨の内容を含むアナログ、又はデジタルのデータで形成されており、図1で示すものと同様の構成を有する。
A signal processing unit 612 includes an AD converter, a DA converter, Bluetooth (registered trademark), an infrared transmission / reception port, and has a configuration similar to that of FIG. Data for combining additional data is converted into packet data and output.
Reference numeral 612a denotes an additional data output unit, which is formed of analog or digital data including the content that it is regular output data, and has the same configuration as that shown in FIG.
 付加データ出力部612aは、記憶ユニット614に予めデータの内容が記憶され、要時、読み出されて使用される場合もある。
 612bは、送受信部Bであり、フォトトランジスタ、CDS、フォトダイオード、アンテナ等で構成され、送受信部Aと一組で、赤外線、電波等の無線媒体601a1を利用してデータの送受信を行う。
The additional data output unit 612a may store the content of data in the storage unit 614 in advance, and may be read and used when necessary.
A transmission / reception unit B 612b includes a phototransistor, a CDS, a photodiode, an antenna, and the like. The transmission / reception unit B 612b performs transmission / reception of data using a wireless medium 601a1 such as infrared rays and radio waves in one set with the transmission / reception unit A.
 613は、センサユニットであり、図1で示す構成を取り、例えば温度センサであれば温度値を示すアナログデータを出力し、信号処理ユニット612に内蔵されるAD変換器又は、独立したAD変換器によりデジタル信号に変換して、デジタル信号を出力する。 Reference numeral 613 denotes a sensor unit, which has the configuration shown in FIG. 1. For example, in the case of a temperature sensor, analog data indicating a temperature value is output, and an AD converter built in the signal processing unit 612 or an independent AD converter Is converted into a digital signal, and the digital signal is output.
 614は、記憶ユニットであり、デジタルメモリで構成され、OSプログラム、アプリケーションプログラム、等を記憶すると共に、センサが出力したデジタルデータをバイナリー形式、テキスト形式で一時的に、又は継続的に記憶する。 Reference numeral 614 denotes a storage unit which is composed of a digital memory and stores an OS program, an application program, and the like, and temporarily or continuously stores digital data output from the sensor in a binary format or a text format.
 図6で示す実施例の動作の説明をする。 The operation of the embodiment shown in FIG. 6 will be described.
 出口処理
 事象データと事象時間データによる認証
 センサユニット613から出力されるセンサアナログデータは、AD変換器(図示せず)でデジタルデータに変換された後、制御ユニット601へ送信され、制御ユニット601で事象データ及び事象時間データが検出され一時的に記憶される。
 信号処理ユニット612が管理サーバー64へセンサデータを送信しようとする場合、事前に送受信ユニットB612b、送受信ユニットA601aを介してセンサデータが制御ユニット601へ送信され、事象データ及び事象時間データと一致、略一致、近似、該当する部位があるかどうか認証する。
The sensor analog data output from the authentication sensor unit 613 based on the exit processing event data and the event time data is converted into digital data by an AD converter (not shown), and then transmitted to the control unit 601. Event data and event time data are detected and stored temporarily.
When the signal processing unit 612 intends to transmit sensor data to the management server 64, the sensor data is transmitted to the control unit 601 via the transmission / reception unit B 612b and the transmission / reception unit A 601a in advance, and matches the event data and event time data. Authenticate whether there is a match, approximation, or applicable part.
 一致、略一致、近似又は該当する部位があった場合、制御ユニット601から送受信ユニットA601aへ送信許可の信号を出力する。信号処理手段612は、送受信ユニット612bを介して送信許可信号を入力すると、付加データ(既に真正である認証済のアナログ信号に変換可能なデータ)を付加したセンサデータを出口ゲート603へ送信する。
 信号処理ユニット612が、外部へセンサデータ等を送信しようとする場合、付加データをセンサデータに組み合わせて、パケット化したデータを送受信ユニット612b方向へ出力する。
 送受信ユニット612bは、このパケットデータを受信すると、制御ユニット601へ送受信ユニット601aを介して送信する。
 制御ユニット601は、受信した付加データを、DA変換器608へ出力する。
 DA変換器608へ入力された付加データは、アナログ信号に変換され、認証用デバイス609のコンパレータ回路で閾値と比較され、その結果を制御ユニット601へ出力する。
When there is a coincidence, a substantially coincidence, an approximation, or a corresponding part, a transmission permission signal is output from the control unit 601 to the transmission / reception unit A 601a. When a transmission permission signal is input via the transmission / reception unit 612b, the signal processing unit 612 transmits sensor data to which additional data (data that can be converted into an already authenticated authentic analog signal) is added to the exit gate 603.
When the signal processing unit 612 intends to transmit sensor data or the like to the outside, the additional data is combined with the sensor data, and the packetized data is output in the direction of the transmission / reception unit 612b.
When receiving the packet data, the transmission / reception unit 612b transmits the packet data to the control unit 601 via the transmission / reception unit 601a.
The control unit 601 outputs the received additional data to the DA converter 608.
The additional data input to the DA converter 608 is converted into an analog signal, compared with the threshold value by the comparator circuit of the authentication device 609, and the result is output to the control unit 601.
 制御ユニット601は、この付加データを数列選択信号に基づいて選択器60aで組み合わせた数列発生器A605から数列発生器607の出力数列をORゲートで組み合わせて組み合わせ合成数列を形成しこの組み合わせ合成数列データと、付加データをXORゲート604で、暗号化され、暗号化付加データ及び数列選択データが組み合わせられた後、送受信手段A601aから送受信手段B612bを介して信号処理ユニット612に伝送する。信号処理ユニット612は、暗号化付加データと選択データを埋め込んだパケットデータを再度作成して、出口ゲート603を介して入出力ユニット610へ出力する。
 一致、略一致、近似又は該当する部位がなかった場合、出口ゲート603を遮断し、管理サーバー64に異常を知らせる。
The control unit 601 forms a combined composite number sequence data by combining the output number sequences of the number sequence generator A605 to the number sequence generator 607 by combining the additional data with the selector 60a based on the number sequence selection signal by an OR gate. The additional data is encrypted by the XOR gate 604, and the encrypted additional data and the sequence selection data are combined, and then transmitted from the transmission / reception means A601a to the signal processing unit 612 via the transmission / reception means B612b. The signal processing unit 612 again creates packet data in which the encrypted additional data and the selection data are embedded, and outputs the packet data to the input / output unit 610 via the exit gate 603.
When there is no coincidence, substantially coincidence, approximation, or corresponding part, the exit gate 603 is shut off and the management server 64 is notified of the abnormality.
 付加データ(付加信号データ)をセンサデータに組み合わせた場合であって、事象データ等による認証が無い場合の認証
 信号処理ユニット612が、外部へセンサデータ等を送信しようとする場合、付加データをセンサデータに組み合わせて、パケット化したデータを送受信ユニット612b方向へ出力する。
 送受信ユニット612bは、このパケットデータを受信すると、制御ユニット601へ送受信ユニット601aを介して送信する。
 制御ユニット601は、受信した付加データを、DA変換器608へ出力する。
 DA変換器608へ入力された付加データは、アナログ信号に変換され、認証用デバイス609のコンパレータ回路で閾値と比較され、その結果を制御ユニット601へ出力する。
When additional data (additional signal data) is combined with sensor data, and authentication signal processing unit 612 in the case where there is no authentication by event data or the like intends to transmit sensor data or the like to the outside, the additional data is In combination with the data, the packetized data is output in the direction of the transmission / reception unit 612b.
When receiving the packet data, the transmission / reception unit 612b transmits the packet data to the control unit 601 via the transmission / reception unit 601a.
The control unit 601 outputs the received additional data to the DA converter 608.
The additional data input to the DA converter 608 is converted into an analog signal, compared with the threshold value by the comparator circuit of the authentication device 609, and the result is output to the control unit 601.
 制御ユニット601は、認証用デバイス609の認証結果が、真の場合は、この付加データを数列選択信号に基づいて選択器60aで組み合わせた数列発生器A605から数列発生器607の出力数列をORゲートで組み合わせて組み合わせ合成数列を形成しこの組み合わせ合成数列データと、付加データをXORゲート604で、暗号化され、暗号化付加データ及び数列選択データが組み合わせられた後、送受信手段A601aから送受信手段B612bを介して信号処理ユニット612に伝送する。信号処理ユニット612は、暗号化付加データと選択データを埋め込んだパケットデータを再度作成して、出口ゲート603を介して入出力ユニット610へ出力する。
 入出力ユニット610は、これを変調して、アンテナ611から無線出力し、無線媒体62aを介して無線ルーター62へ送信される。無線ルーター62に到達したセンサデータは、ネットワーク63を介して管理サーバー64へ送信される。
When the authentication result of the authentication device 609 is true, the control unit 601 ORs the output sequence of the sequence generator A605 to the sequence generator 607 in which this additional data is combined by the selector 60a based on the sequence selection signal. The combined composite number sequence data and the additional data are encrypted by the XOR gate 604 and the encrypted additional data and the sequence selection data are combined, and the transmission / reception means A 601a to the transmission / reception means B 612b are combined. To the signal processing unit 612. The signal processing unit 612 again creates packet data in which the encrypted additional data and the selection data are embedded, and outputs the packet data to the input / output unit 610 via the exit gate 603.
The input / output unit 610 modulates this, outputs it wirelessly from the antenna 611, and transmits it to the wireless router 62 via the wireless medium 62a. The sensor data that has reached the wireless router 62 is transmitted to the management server 64 via the network 63.
 管理サーバー64は、図6で示す構成を備えており、暗号化された認証データと選択データを分離抽出し、選択データに基づいて数列発生器AからCを選択して、ORゲートで合成された数列データと、暗号化付加データがXOR変換器へ入力されることで、暗号化付加データが復元され、正規のデータかどうか、DA変換器、及び認証用デバイスに入力され、コンパレータ回路で閾値と比較され、その結果から判定される。
 付加データが偽りの場合、制御ユニット601は、出口ゲート603を遮断する。この遮断により、管理サーバー64は、パケットデータの交信が遮断したことで異常に気づくことができる。
The management server 64 has the configuration shown in FIG. 6, separates and extracts the encrypted authentication data and selection data, selects C from the sequence generators A to C based on the selection data, and combines them with an OR gate. The encrypted additional data is restored by inputting the sequence data and the encrypted additional data to the XOR converter, and is input to the DA converter and the authentication device whether the data is legitimate data. And determined from the result.
When the additional data is false, the control unit 601 blocks the exit gate 603. Due to this blocking, the management server 64 can notice an abnormality because the packet data communication is blocked.
 入口処理
 ネットワーク63を介して、管理サーバー64等から更新用プログラム等の実行可能なデータパケットが送信され、パケットデータには、暗号化された認証データ及び数列発生器選択データが含まれている。
 無線ルーター62は、このデータパケットを搬送波で変調して無線出力し、無線媒体62aを介して、アンテナ611が受信する。
 アンテナ611で受信した変調パケットデータは、入出力ユニット610で、復調されて、入口ゲート602を介して制御ユニット601へ送信される。
An executable data packet such as an update program is transmitted from the management server 64 or the like via the entrance processing network 63, and the packet data includes encrypted authentication data and sequence generator selection data.
The wireless router 62 modulates this data packet with a carrier wave and outputs it wirelessly, and the antenna 611 receives it via the wireless medium 62a.
The modulated packet data received by the antenna 611 is demodulated by the input / output unit 610 and transmitted to the control unit 601 through the entrance gate 602.
 制御ユニット601は、この復調パケットデータから暗号化認証データを抽出すると共に数列発生器を選択する選択データを抽出し、選択データを選択器60aに入力する。
 選択器60aは、選択データに基づいた順番で、数列発生器の発生データをORゲート60bで組み合わせて合成数列を発生させる。この合成数列データと、暗号化認証データをXORゲート604へ入力することで、復号化して、DA変換器608へ、復号認証データが入力される。暗号化と復号化の際の合成数列データは、同期がとられている。
 DA変換器608は、入力されたデジタル信号をアナログ信号に変換し、認証用デバイス609のコンパレータ回路に入力され、閾値比較される。
The control unit 601 extracts the encryption authentication data from the demodulated packet data, extracts selection data for selecting the sequence generator, and inputs the selection data to the selector 60a.
The selector 60a generates a composite number sequence by combining the generated data of the number sequence generator by the OR gate 60b in the order based on the selection data. The composite number sequence data and the encrypted authentication data are input to the XOR gate 604 to be decrypted, and the decryption authentication data is input to the DA converter 608. Synthetic sequence data at the time of encryption and decryption is synchronized.
The DA converter 608 converts the input digital signal into an analog signal, which is input to the comparator circuit of the authentication device 609 and compared with a threshold value.
 閾値比較の結果、閾値を超えた場合、又は上下の閾値電圧範囲にあるデータの場合、これを真正認証データとして、認証用デバイス609は、制御ユニット601へその旨のデータを送信し、制御ユニット601は、入口ゲート602を介して、パケットデータを信号処理ユニット612へ送信する。
 尚、ここで改めてパケットデータを信号処理ユニット612へ送信する場合は、時間を要し、通信に支障が生じる可能性があることから、同時に信号処理ユニット612と制御ユニット601へパケットデータを送信し、信号処理ユニット612は、分割されたデータを結合して実行可能なプログラムデータまでを形成し、ドライブ(実行)は、送受信手段B612bに入力される実行許可信号又は制御ユニット501からの信号に基づいて行われることが好ましい。
As a result of the threshold comparison, if the threshold is exceeded, or if the data is in the upper and lower threshold voltage ranges, this is regarded as authentic authentication data, and the authentication device 609 transmits the data to that effect to the control unit 601, 601 transmits the packet data to the signal processing unit 612 via the entrance gate 602.
Here, when packet data is transmitted again to the signal processing unit 612, it takes time and there is a possibility that communication may be hindered. Therefore, packet data is transmitted to the signal processing unit 612 and the control unit 601 at the same time. The signal processing unit 612 combines the divided data to form executable program data, and the drive (execution) is based on an execution permission signal input to the transmission / reception means B 612b or a signal from the control unit 501. It is preferable to be performed.
 又、復元後の認証データが偽であった場合、制御ユニット501は、入力ゲート602と入出力ユニット610間を遮断する。この遮断により管理サーバー64は、IoT端末で異常が発生したことに気づくことができる。
 更に、信号処理ユニット612に既にパケットデータ及びこれを結合したプログラムデータが送信されていた場合は、これらを削除する命令データを送受信ユニットA601aを介して送信する。
 信号処理ユニット612は、この命令データ信号を送受信ユニットB612bを介して受信し、命令データに基づいて、パケットプログラム及び結合プログラムを削除する。
If the restored authentication data is false, the control unit 501 blocks the input gate 602 and the input / output unit 610. By this interruption, the management server 64 can notice that an abnormality has occurred in the IoT terminal.
Further, when packet data and program data obtained by combining the packet data have already been transmitted to the signal processing unit 612, command data for deleting them is transmitted via the transmission / reception unit A601a.
The signal processing unit 612 receives this command data signal via the transmission / reception unit B 612b, and deletes the packet program and the combined program based on the command data.
 XOR(排他的論理和)ゲートを用いたストリームサイファ方式は、非常に簡素でありながら、強い暗号系が形成可能であることから、これを回路デバイス化することで、IoT機器の負担を減らしながら、認証データによるオーナーチェックが実現できる点で好適である。尚、数列発生器を複数個用意しこれを組み合わせて乱数データを形成する合成手法を用いたが、これに限らず、一つの乱数発生器でも、認証データ及び付加データの大きさが小さいことから十分に利用可能な場合もある。
 又、XORゲートを用いたストリームサイファの場合、暗号化と複合化の際、入力される乱数は、同期がとれていることが好ましい。
The stream cipher method using an XOR (exclusive OR) gate is very simple and can form a strong encryption system. By making this a circuit device, the burden on the IoT device is reduced. It is preferable in that an owner check using authentication data can be realized. In addition, although the synthetic | combination method which forms several random number generators and combines this and forms random number data was used, it is not restricted to this, Since the size of authentication data and additional data is small also in one random number generator. It may be fully available.
In the case of a stream cipher using an XOR gate, it is preferable that the input random numbers are synchronized during encryption and decryption.
 本発明の他の実施例を図7(a)及び(b)を参照して説明する。 Another embodiment of the present invention will be described with reference to FIGS. 7 (a) and 7 (b).
 図中、70は、検査ユニットであり、温度、湿度、気圧、照度、騒音、体温、心電図、その他のセンサ、テレビやデジタルカメラ、デジタルオーディオプレーヤー、HDレコーダー、等における目的とするセンシングユニット、を含み、更にオーナーチェック用の制御ユニットを組み合わせる。 In the figure, reference numeral 70 denotes an inspection unit, which includes a temperature, humidity, barometric pressure, illuminance, noise, body temperature, electrocardiogram, other sensors, a target sensing unit in a television, a digital camera, a digital audio player, an HD recorder, and the like. In addition, a control unit for owner check is combined.
 具体的には、CPU、GPU、オンボードメモリ、CFAST、CF、SD、USBメモリ、mSATA、その他のメモリコンピュータ及びGPIO等のIOポート、UART、RS232C等のシリアルポート、等を備えたカスタム、セミカスタムな小型、超小型シングルボードコンピュータで構成され、独立した端末又はPC(パーソナルコンピュータ)のUSBソケットに接続して使用する付属的端末等で構成され、それぞれIoT機器として必要な部分に組み込み配置されている。 Specifically, CPU, GPU, onboard memory, CFAST, CF, SD, USB memory, mSATA, other memory computers and IO ports such as GPIO, serial ports such as UART and RS232C, etc. It is composed of a custom small and ultra-small single board computer, and is composed of an independent terminal or an attached terminal that is used by connecting to a USB socket of a PC (personal computer). ing.
 次いで、検査ユニット70の構成を説明する。 Next, the configuration of the inspection unit 70 will be described.
 701は、信号処理ユニットであり、CPU、GPU、FPGA、CPLD、その他の上述したメモリ等で構成され、ソフトウェアにより動作したり、ハードウェアロジックにより動作する。
 信号処理ユニット701は、合成ユニット709から送られてくるセンサ信号を、センタサーバ73へ、送信する機能を備えるほか、これを処理し、その他のIoT端末へデータを送信する機能を備えているが、スケジュール信号を含む信号又は別々区別した信号として入出力ユニットへ出力するか又は、少なくとも分離したスケジュール信号のみを制御ユニット707へ出力を行う場合もある。
Reference numeral 701 denotes a signal processing unit, which includes a CPU, GPU, FPGA, CPLD, and other memory as described above, and operates by software or hardware logic.
The signal processing unit 701 has a function of transmitting the sensor signal sent from the synthesis unit 709 to the center server 73, and also has a function of processing this and transmitting data to other IoT terminals. In some cases, a signal including a schedule signal or a signal that is separately distinguished is output to the input / output unit, or at least only the separated schedule signal is output to the control unit 707.
 702は、センサユニットであり、温度、湿度、気圧、照度、騒音、体温、心電図、その他のセンサ、テレビやデジタルカメラ、デジタルオーディオプレーヤー、HDレコーダー、等における目的とするセンシングを行い、デジタル信号、アナログ信号として出力する。 Reference numeral 702 denotes a sensor unit which performs a desired sensing in a temperature, humidity, atmospheric pressure, illuminance, noise, body temperature, electrocardiogram, other sensors, a television, a digital camera, a digital audio player, an HD recorder, etc. Output as an analog signal.
 703は、付加ユニットであり、PICマイコン等のコンピュータ、FPGA、CPLD等のASICで構成され、スケジュール化された特徴信号を出力する。タイムスケージュールデータと、タイムスケジュールを備えたセンサユニット702が出力する信号に対してノイズ的な信号を信号処理ユニット701からのリクエスト信号で、作成すると共にタイムスケジュール信号を信号処理ユニット701又は制御ユニット707へ出力する。 Reference numeral 703 denotes an additional unit, which is composed of a computer such as a PIC microcomputer, an ASIC such as FPGA and CPLD, and outputs scheduled feature signals. A noisy signal is generated by the request signal from the signal processing unit 701 for the time schedule data and the signal output from the sensor unit 702 having the time schedule, and the time schedule signal is generated by the signal processing unit 701 or the control unit. To 707.
 付加ユニット703は、少なくとも、複数のスケジュール及び乱数を記憶し、信号処理ユニット701と所定期間だけ接続し、スケジュール設定が行われる。所定期間とは、リセット後、ネットワークを介した最初の外部入力までの時間であって、スケジュール設定ができる期間である。
 付加ユニット703が出力する信号は、スケジュール化された一種の雑音信号であり、周波数帯域がフィルタで削除できる程度に狭く又、センサユニット702が出力するアナログ信号の周波数帯域から離れていることが好ましいが、容易に分離できる信号が好ましい。
 スケジュール信号は、好ましくはフィルタ削除容易な狭い帯域のパルス信号の振幅値及びパルス間隔、パルス振幅が、所定の時間で可変して出力されるものであり、このスケジュール信号のパルス間隔、パルス幅、パルス振幅を時間スケジュール化したデータを作成する。
 パルスに限らず、例えば、画素値の場合は、位置座標と、輝度値等の変化等のデジタルスケジュールを例示する。
The additional unit 703 stores at least a plurality of schedules and random numbers, is connected to the signal processing unit 701 for a predetermined period, and schedule setting is performed. The predetermined period is a period from the reset until the first external input via the network, and is a period in which a schedule can be set.
The signal output from the additional unit 703 is a kind of scheduled noise signal, and the frequency band is preferably narrow enough to be removed by a filter, and is preferably separated from the frequency band of the analog signal output from the sensor unit 702. However, signals that can be easily separated are preferred.
The schedule signal is preferably a signal whose amplitude value, pulse interval, and pulse amplitude of a narrow band pulse signal that can be easily removed by filtering are output at a predetermined time, and the pulse interval, pulse width, Create data with time-scheduled pulse amplitude.
For example, in the case of a pixel value, a digital schedule such as a change in position coordinates and a luminance value is exemplified.
 704は、記憶ユニットAであり、主にOSプログラム、アプリケーションプログラム等が記憶され、更に書き込み可不可を手動で行うスイッチ、電気信号で書き込み可不可を行うトランジスタ、FETリレー等のスイッチにより制御される構成を有する。 Reference numeral 704 denotes a storage unit A, which mainly stores an OS program, an application program, and the like, and is further controlled by a switch for manually enabling / disabling writing, a transistor for enabling / disabling writing by an electric signal, and a switch such as an FET relay. It has a configuration.
 デフォルトでは、書き込み不可の状態(リードオンリーRead Only)に設定されることが好ましく、必要に応じ、書き込み可能状態が外部操作によって可能となるが、好ましくは、ハードウェアスイッチとソフトウェアスイッチの両方を備えているものであり、この両方のスイッチがプロテクトオンになることで、完全なプロテクトが行われる。 By default, it is preferably set to a write-disabled state (read-only read only), and if necessary, a write-enabled state can be enabled by an external operation, but preferably includes both a hardware switch and a software switch. When both of these switches are protected on, complete protection is performed.
 ソフトウェアスイッチは、例えばwindowsであれば、uwfmgr.exeにおける、ボリュームプロテクトがイネーブルになった状態、LINUXにおいては、OverlayFS、 UnionFs、又はaufs+fsprotectの組み合わせによるRead Only化が例示される。 Software switch is, for example, Windows, uwmggr. In the state where volume protection is enabled in exe, and in LINUX, Read Only conversion is performed by a combination of OverFS, UnionFs, or aufs + fsprotect.
 ハードウェアプロテクトは、書き込み端子にDisable信号を出力する設定などが例示され、市販であれば、(CUCTUS社製)等の筐体にハードウェアプロテクトスイッチがついたもの又は付属リーダに書き込み禁止スイッチのついたCfastタイプのメモリ、書き込み禁止スイッチのついたUSBメモリ(バッファロー社製等が例示される。
この両プロテクトを装着することで、ソフトウェアプロテクトのセキュリテイホールを補う完全なリードオンリー化を形成することができる。
Hardware protection is exemplified by the setting to output a Disable signal to the write terminal. If it is commercially available, a hardware protection switch is attached to the case (made by CUCTUS) or a write prohibition switch is attached to the attached reader. Cfast type memory, USB memory with a write-protect switch (Buffalo, etc.).
By mounting both of these protects, it is possible to form a complete read-only configuration that compensates for the software protection security hole.
 又、SDカードのような外部で、SDカードの書き込みをプロテクトする状態を側面のスイッチの状態で、認識し、読み書きを制御する回路を用いても良い。 Also, a circuit that recognizes the state of protecting the writing of the SD card from the outside, such as an SD card, by the state of the switch on the side, and controls reading and writing may be used.
 記憶ユニット704は、LTSBモード等の長期間バージョンアップ等を行わないソフトウェアで構成されることが好ましいが、アップデートを行う場合等は、リレー回路で構成されるハードウェアプロテクトスイッチを制御ユニット707が解除した後、リセット後の信号処理ユニット701であって、外部処理をおこなう迄のクリーンな状態で、制御ユニット707から信号処理ユニット701へ指示信号が送られ、信号処理ユニット701は、ソフトウェアプロテクトを解除するプロセスモジュールを起動させることが好ましい。 The storage unit 704 is preferably configured by software that does not perform long-term version upgrades such as the LTSB mode, but the control unit 707 releases the hardware protection switch configured by a relay circuit when performing an update or the like. After that, the reset signal processing unit 701 is in a clean state until external processing is performed, and an instruction signal is sent from the control unit 707 to the signal processing unit 701, and the signal processing unit 701 releases the software protection. It is preferable to start the process module.
 信号処理ユニット701と制御ユニット707は、信号処理ユニット701が、再起動後、外部との交信を行うまでの間、接続を可能とする構成が好ましい。 The signal processing unit 701 and the control unit 707 are preferably configured so that they can be connected until the signal processing unit 701 communicates with the outside after the restart.
 705は、記憶ユニットBであり、データであって、一時的、又は継続的に記憶することを可能とする。書き込み不可の記憶ユニットA704に替わって、主にコンピュータ動作コードへ影響を与えない形式のデータが記憶される。コンピュータ動作コードへ影響を与えない形式とは、少なくとも、信号処理ユニット701が起動時、直接参照できず、起動時読み込まない状態の形式であり、テキスト、jpeg、exe、dll等の形式であっても良いが、少なくともそのままでは信号処理ユニット701が起動時に常に決まったプロセスで起動するが、その際、参照できない状態(例えば、ホルダー、圧縮ホルダー内等に配置する)で記憶される。 705 is a storage unit B, which is data and can be stored temporarily or continuously. Instead of the non-writable storage unit A704, data in a format that mainly does not affect the computer operation code is stored. The format that does not affect the computer operation code is a format in which at least the signal processing unit 701 cannot be directly referred to at the time of startup and is not read at startup, such as text, jpeg, exe, dll, etc. However, at least as it is, the signal processing unit 701 is always started in a predetermined process at the time of starting, but at that time, it is stored in a state where it cannot be referred to (for example, placed in a holder, a compression holder or the like).
 706は、入出力ユニットであり、ルータ、アクセスポイント化した親機と呼ばれている無線LANユニットなどで形成される。 706 is an input / output unit, which is formed by a router, a wireless LAN unit called an access point, or the like.
 707は、制御ユニットであり、信号処理ユニット701と同様のコンピュータで形成されている。制御ユニット707は、信号処理ユニット701へ、リセット信号を出力する他、制御ユニット701の所定の時間においてデータの入力を行う。 707 is a control unit, which is formed of the same computer as the signal processing unit 701. The control unit 707 outputs a reset signal to the signal processing unit 701 and inputs data at a predetermined time of the control unit 701.
 708は、アンテナであり、例えば、WiFi等で用いられている導電性部材からなる。本実施例では、WiFiなる電磁波通信を用いたが、赤外線等、他の伝達媒体を用いる場合は、例えば、光通信の場合は、発光ダイオード等が該当することになる。 708 is an antenna, which is made of, for example, a conductive member used in WiFi or the like. In this embodiment, the electromagnetic wave communication of WiFi is used. However, in the case of using other transmission media such as infrared rays, for example, in the case of optical communication, a light emitting diode or the like is applicable.
 709は、合成ユニットであり、コンピュータ、FPGA、CPLD等で構成され、センサユニット702と付加ユニット703のアナログ出力信号、又はデジタル出力信号を合成する。合成は、OR、AND、XOR等の演算が例示される。 709 is a synthesis unit, which is composed of a computer, FPGA, CPLD, etc., and synthesizes analog output signals or digital output signals of the sensor unit 702 and the additional unit 703. The composition is exemplified by operations such as OR, AND, and XOR.
 71は、中継端末であり、72は、有線又は無線のインターネット、イントラネット等のネットワーク、73は、端末を管理し、制御するクラウド形式等で形成されるセンタサーバである。中継端末71は、モデム、アクセスポイントルーター等で構成され、インターネット等のネットワーク72と接続する。 71 is a relay terminal, 72 is a network such as a wired or wireless Internet or an intranet, and 73 is a center server formed in a cloud format for managing and controlling the terminal. The relay terminal 71 includes a modem, an access point router, and the like, and is connected to a network 72 such as the Internet.
 センタサーバ73は、IOT端末から情報得て、目的に応じた処理を行い命令データの送信等の管理する立場の無人操作又は有人操作のサーバが例示される。
 71aは、伝達媒体であり、有線であれば、LANケーブル、無線であれば、電磁波、レーザー光、赤外光、可視光等を示す。
The center server 73 is exemplified by a server for unattended operation or manned operation in the position of obtaining information from the IOT terminal, performing processing according to the purpose, and managing transmission of command data.
Reference numeral 71a denotes a transmission medium, which indicates a LAN cable if wired, or an electromagnetic wave, laser light, infrared light, visible light, etc. if wireless.
 次に、実施例の動作を図7(b)を参照して説明する。 Next, the operation of the embodiment will be described with reference to FIG.
 信号処理ユニット701は、記憶ユニットA704のプログラムを読み込み実行する。 記憶ユニットA704は、Read Onlyの状態であり、初期の状態が維持されたまま実行されるので、起動時は、常にクリーンな状態が形成されている。
 このクリーンな状態の間制御ユニット707との限定的な送受信が行われる場合がある。
 例えば、記憶ユニットA704に記憶されたOS、アプリケーション等のプログラムの更新、修正等である。
 尚、BIOSを形成するファームウェアプログラム等も、この時期にだけ更新、修正可能とする事が好ましい。
The signal processing unit 701 reads and executes the program in the storage unit A 704. Since the storage unit A 704 is in a Read Only state and is executed while the initial state is maintained, a clean state is always formed at startup.
Limited transmission / reception with the control unit 707 may be performed during this clean state.
For example, updating or correction of a program such as an OS or an application stored in the storage unit A 704 is performed.
Note that it is preferable that the firmware program or the like forming the BIOS can be updated and corrected only at this time.
 検査ユニット70の起動(又は再起動)
 起動後、信号処理ユニット701は、付加ユニット703にスケジュール信号を作成指示信号を出力する。付加ユニット703は、スケジュール信号を形成した後、このスケジュール信号を信号処理ユニット701へ出力する。スケジュール信号の例えば、パルス列の場合は、パルス間隔、パルス幅、パルス振幅を示すパラメータ  は、毎回異なることが好ましく、乱数程度の周期性があっても良い。
Starting (or restarting) the inspection unit 70
After activation, the signal processing unit 701 outputs a schedule signal creation instruction signal to the additional unit 703. After forming the schedule signal, the additional unit 703 outputs the schedule signal to the signal processing unit 701. In the case of a schedule signal, for example, in the case of a pulse train, the parameters indicating the pulse interval, the pulse width, and the pulse amplitude are preferably different each time, and may have a periodicity equivalent to a random number.
 付加ユニット703で作成されたスケジュール信号のパラメータデータは、信号処理ユニット701へ出力する。
 信号処理ユニット701は、このパラメータデータを、再起動時から、最初の外部との更新がある迄に制御ユニット707へ出力する。
 制御ユニット707は、このデータが利用されている期間だけemmc等のフラッシュメモリ、RAM等に記憶し、新たなスケジュールパラメータデータが送られてきた時、上書きして、消去される事が好ましい。
The parameter data of the schedule signal created by the additional unit 703 is output to the signal processing unit 701.
The signal processing unit 701 outputs this parameter data to the control unit 707 from the time of restart until the first update with the outside.
The control unit 707 is preferably stored in a flash memory such as emmc, RAM, etc. only during the period when this data is used, and is overwritten and deleted when new schedule parameter data is sent.
 当該データは、合成ユニット709が出力する合成信号のどの部分に特徴信号(ノイズ信号)が付加するかを示すものであり、例えば、温度センサにおいて、出力するアナログデータに特徴信号(計画的ノイズ)を計画的に付加する。この特徴信号は、後で、フィルタ処理によって削除可能な信号であることが好ましい。特徴点は、予め複数設定され付加されており、どの特徴点を使用するかを選択して通知するものである。 The data indicates to which part of the combined signal output by the combining unit 709 the characteristic signal (noise signal) is added. For example, in the temperature sensor, the characteristic signal (planned noise) is added to the analog data output. Is added systematically. This feature signal is preferably a signal that can be deleted later by filtering. A plurality of feature points are set and added in advance, and a feature point to be used is selected and notified.
 以上の動作は、起動後又は再起動後から、少なくとも外部との接続が開始され、外部からデータが入力される迄に行われることが好ましい。
 即ち、信号処理ユニット701は、Read Onlyな記憶ユニットA704から、OS等を読み取り、実行するため、外部からデータが入力されるまでは常にクリーンな状態が形成されるからである。
It is preferable that the above operation is performed after starting or restarting, at least until connection with the outside is started and data is input from the outside.
That is, since the signal processing unit 701 reads and executes the OS from the read-only storage unit A 704, a clean state is always formed until data is input from the outside.
 信号処理ユニット701は、制御ユニット707へ、スケジュールデータを出力した後、関連するデータ等を完全に消去、デリートする。これにより、信号処理ユニット701にマルウェアが感染して関連するデータを探しても、データ自体は消滅しており、スケジュール信号の取得は不可能となる。 The signal processing unit 701 outputs the schedule data to the control unit 707, and then completely deletes and deletes related data and the like. As a result, even if the signal processing unit 701 is infected with malware and searches for related data, the data itself has disappeared, and the schedule signal cannot be acquired.
 オーナーユニットによるチェックの実行
 ここで、オーナーユニットは、制御ユニット707となった状態で、センサユニット702は、目的のセンシングを行い、図7(b)の(i)で示すアナログ信号を信号処理ユニット送信する。又は図示していないが、ADコンバータにより、デジタル信号に変換して出力する。
Execution of Check by Owner Unit Here, the owner unit becomes the control unit 707, and the sensor unit 702 performs target sensing and outputs an analog signal shown in (i) of FIG. 7B as a signal processing unit. Send. Alternatively, although not shown, the signal is converted into a digital signal by an AD converter and output.
 付加ユニット703は、設定されたパラメータに基づき図7(b)の(ii)で示すスケジュール信号を端子703aを介して合成ユニット709出力する。図7(b)の(ii)は、アナログ信号であるが、これをデジタル信号に変換したものであってもよい。 The additional unit 703 outputs a schedule signal indicated by (ii) in FIG. 7B based on the set parameters via the terminal 703a. Although (ii) in FIG. 7B is an analog signal, it may be converted into a digital signal.
 スケジュールデータは、付加ユニット703が、センサユニット702に対し、どの部分に特徴となる信号が付加するかを示すものであり、例えば、温度センサにおいて、出力するアナログデータに特徴信号(計画的ノイズ)を計画的に付加する。この特徴信号は、後で、フィルタ処理によって削除可能な信号であることが好ましい。特徴となる信号は、予め複数設定され付加されており、どの特徴点を使用するかを選択して通知するものである。 The schedule data indicates to which part the characteristic signal is added by the additional unit 703 to the sensor unit 702. For example, in the temperature sensor, the characteristic data (planned noise) is output from the analog data to be output. Is added systematically. This feature signal is preferably a signal that can be deleted later by filtering. A plurality of characteristic signals are set and added in advance, and a feature point to be used is selected and notified.
 センサユニット702は、温度、速度、画像等目的に応じたセンシングを行い、出力点702aを介して合成ユニット709へ出力する(図7(b)の(i))。センシングした出力は、アナログ信号の他、ADコンバータ処理により変換されたデジタル信号、その他数値信号の形態を有する。 The sensor unit 702 performs sensing according to the purpose such as temperature, speed, and image, and outputs it to the synthesis unit 709 via the output point 702a ((i) in FIG. 7B). The sensed output has the form of a digital signal converted by AD converter processing and other numerical signals in addition to an analog signal.
 付加ユニット703は、起動又は再起動設定において設定された付加信号(図7(b)の(ii))を出力端703aを介して合成ユニット709へ出力する。 The additional unit 703 outputs the additional signal ((ii) in FIG. 7B) set in the activation or restart setting to the synthesis unit 709 via the output terminal 703a.
 合成ユニット709は、これらの入力を例えば図7(b)の(iii)で示す様に合成して信号処理ユニット701へ出力する。 The synthesizing unit 709 synthesizes these inputs as shown in (iii) of FIG. 7B, for example, and outputs the synthesized signal to the signal processing unit 701.
 信号処理ユニット701は、目的に応じたデータの処理を行い、入出力ユニット706へ出力する。 The signal processing unit 701 processes data according to the purpose and outputs it to the input / output unit 706.
 入出力ユニット706は、これらのデータをアンテナ708を介して、インターネット等のネットワーク72に接続する中継端末71へ出力する。
 入出力ユニット706は、更にこれらのデータを制御ユニット707へ送信する。
The input / output unit 706 outputs these data to the relay terminal 71 connected to the network 72 such as the Internet via the antenna 708.
The input / output unit 706 further transmits these data to the control unit 707.
 入出力ユニット706が制御ユニット707へ送信するデータ形式は、キャプチャ信号と同様の信号が例示されるが、別途、制御ユニット707用に、調整されたデータであっても良いが、少なくとも、信号処理ユニット701自体がコンピュータウィルス等に感染の可能性があるため、制御ユニット707は、入出力ユニット706からデータを入手することが好ましい。
 制御ユニット707は、入出力ユニット706からの信号の他、直接信号処理ユニット701からセンサ信号を受けとる場合もある。
The data format transmitted to the control unit 707 by the input / output unit 706 is exemplified by the same signal as the capture signal, but may be separately adjusted data for the control unit 707, but at least the signal processing Since the unit 701 itself may be infected by a computer virus or the like, the control unit 707 preferably obtains data from the input / output unit 706.
The control unit 707 may receive a sensor signal from the direct signal processing unit 701 in addition to the signal from the input / output unit 706.
 信号処理ユニット701は、合成ユニット709から出力された合成信号が例えばアナログ信号の場合は、デジタル信号に変換されて送信された場合、デジタル信号化されたセンサ信号中の付加信号の有無を、予め信号処理ユニット701から送信された付加ユニット703のスケジュールデータに基づき、検索して、スケジュール信号に基づけば、enableとして、入出力ユニット706から外部への出力を許可する信号を出力し、スケジュール信号に基づかない場合は、コンピュータウィルス、マルウェア等の感染や、その他の異常が、信号処理ユニット701にあると判断し、更にリセット信号707aを信号処理ユニット701へ出力する。 When the combined signal output from the combining unit 709 is, for example, an analog signal, the signal processing unit 701 converts the digital signal into a digital signal and transmits the presence / absence of an additional signal in the sensor signal converted into a digital signal in advance. Based on the schedule data of the additional unit 703 transmitted from the signal processing unit 701, and searching based on the schedule signal, a signal permitting output from the input / output unit 706 to the outside is output as enable, If not, it is determined that there is an infection such as a computer virus or malware or other abnormality in the signal processing unit 701, and a reset signal 707a is output to the signal processing unit 701.
 リセット信号の入力により、信号処理ユニット701は、リードオンリーの記憶ユニット704の記憶内容に基づいて再起動する。
 この再起動により、元の状態に戻り、コンピュータウィルス等に感染していた場合は、完全に感染が消去され、付加ユニット703に前回とは相違するスケジュールデータの作成が行われ、このスケジュールデータは、信号処理ユニット701から制御ユニット707へ、再起動後、所定時間以内に送信される。
In response to the input of the reset signal, the signal processing unit 701 is restarted based on the storage contents of the read-only storage unit 704.
By this restart, if the computer is infected with a computer virus or the like, the infection is completely erased, and schedule data different from the previous time is created in the additional unit 703. The signal is transmitted from the signal processing unit 701 to the control unit 707 within a predetermined time after restarting.
 このようにスケジュールデータに基づいた付加ユニット703の送信出力スケジュールは、信号処理ユニット701が感染可能期間(再起動した後ネットワーク接続状態で、最初の外部からのアクセス後)では、入手困難であるため、スケジュールを記憶するオーナーユニットとなる制御ユニット707のみが検査可能とすることができる。 As described above, the transmission output schedule of the additional unit 703 based on the schedule data is difficult to obtain during the period when the signal processing unit 701 can be infected (in the network connection state after restarting and after the first external access). Only the control unit 707 serving as the owner unit for storing the schedule can be inspected.
 今般、急速に拡大しているIoT機器分野で、オーナーチェックによる安定したデータの送受信を実現することで、セキュリテイ問題を解決し、更に当該分野を広範囲に広めることを可能とする。 In recent years, in the field of IoT equipment, which is expanding rapidly, by realizing stable data transmission / reception by owner check, it is possible to solve the security problem and further spread the field widely.
11a 入口制御ユニット
11b 出口制御ユニット
12  認証用デバイス
13  入口ゲート
14  出口ゲート
15  入出力ユニット
16  アンテナ
17  信号処理ユニット
18  記憶ユニット
19  センサユニット
20  入口側電気通信路
21  出口側電気通信路
22  無線ルーター
23  管理サーバー
24  ネットワーク
11a Entrance control unit 11b Exit control unit 12 Authentication device 13 Entrance gate 14 Exit gate 15 Input / output unit 16 Antenna 17 Signal processing unit 18 Storage unit 19 Sensor unit 20 Entrance side electrical communication path 21 Exit side electrical communication path 22 Wireless router 23 Management server 24 network

Claims (12)

  1.  直接的又は間接的なインターフェースを具備し、前記インターフェースに基づいて、実行したデータを外部へ出力する信号処理手段、
     インターフェースデータを記憶する記憶手段、
     前記信号処理ユニットが外部へデータを送信する際、前記データと前記記憶手段に記憶したインターフェースデータを比較し、一致、略一致、近似又は該当した場合、真正なデータであることを判断し、前記外部操作データに対応した認証データを付加して外部へ送信をする出口ゲート手段
    よりなるオーナーチェックシステム。
    A signal processing means comprising a direct or indirect interface and outputting the executed data to the outside based on the interface;
    Storage means for storing interface data;
    When the signal processing unit transmits data to the outside, it compares the data with the interface data stored in the storage means, and determines that the data is genuine if it matches, substantially matches, approximates, or falls true, An owner check system comprising exit gate means that adds authentication data corresponding to external operation data and transmits it to the outside.
  2.  外部から送信されたデータを受信し、前記受信データから、認証データを検出し、予め記憶した比較用データと比較して一致、略一致、又は近似した場合、真正なデータであるとして受信する入口ゲート手段よりなるオーナーチェックシステム。 An entrance that receives data transmitted from the outside, detects authentication data from the received data, and receives it as authentic data when it matches, approximately matches, or approximates compared with comparison data stored in advance. Owner check system consisting of gate means.
  3.  目的の動作、現象を受信し、センサ電気信号に変換するセンサユニット、
     前記センサユニットのセンサ電気信号をセンサデジタルデータに変換してセンサデータを送信する送信部と、外部よりデータを認証データと共に受信する受信部を有する信号処理ユニット、
     前記センサユニットのセンサ出力から、事象データと事象時間データを検出し、一時的に記録する記録手段、
     前記送信部が外部へセンサデータを出力する際、当該センサデータと前記記録手段に記録された事象データ及び事象時間データを読み出して、一致、略一致、近似又は該当するデータの有無を検出することで認証を行う認証手段、
     前記認証手段が一致、略一致、近似又は該当するデータを検出できない場合、外部へのデータの出力を遮断するゲート、
     前記認証手段が一致、略一致、近似又は該当するデータを検出した場合、真正なセンサデータであると認証し、認証データを付加して外部へ送信する認証データ付加手段
    を有するオーナーチェックシステム。
    Sensor unit that receives the desired operation and phenomenon and converts it into a sensor electrical signal,
    A signal processing unit including a transmission unit that converts sensor electric signals of the sensor unit into sensor digital data and transmits the sensor data, and a reception unit that receives data from the outside together with the authentication data;
    Recording means for detecting and temporarily recording event data and event time data from the sensor output of the sensor unit;
    When the transmission unit outputs sensor data to the outside, the sensor data and the event data and event time data recorded in the recording unit are read to detect the presence / absence of matching, approximate matching, approximation, or corresponding data Authentication means to authenticate with,
    A gate that shuts off the output of data to the outside when the authentication means cannot detect matching, approximately matching, approximation or applicable data;
    An owner check system comprising authentication data adding means for authenticating that the sensor data is authentic, adding authentication data and transmitting the data to the outside when the authentication means detects coincidence, substantially coincidence, approximation or corresponding data.
  4.  前記認証手段が一致、略一致、近似又は該当するデータを検出した場合、真正なセンサデータであると認証し、認証データを付加して外部へ送信する、請求項3に記載のオーナーチェックシステム。 4. The owner check system according to claim 3, wherein when the authentication means detects coincidence, substantially coincidence, approximation or corresponding data, the authentication unit authenticates that the sensor data is authentic, adds the authentication data, and transmits the data to the outside.
  5.  目的の動作、現象を受信し、センサ電気信号に変換するセンサユニット、
     前記センサユニットのセンサ電気信号をセンサデジタルデータに変換して外部へ認証信号と共にセンサデジタルデータを送信する送信部と、外部よりデータを認証データと共に受信する受信部を有する信号処理ユニット、
     前記認証信号を検証することで、前記信号処理ユニットから出力されるデータが真正データであるかどうかを認証する認証手段
    を備えたオーナーチェックシステム。
    Sensor unit that receives the desired operation and phenomenon and converts it into a sensor electrical signal,
    A signal processing unit having a transmission unit that converts sensor electric signals of the sensor unit into sensor digital data and transmits the sensor digital data together with an authentication signal to the outside; and a reception unit that receives data from the outside together with the authentication data;
    An owner check system comprising authentication means for authenticating whether the data output from the signal processing unit is authentic data by verifying the authentication signal.
  6.  真正データでない場合は、外部との接続を遮断するゲート手段によりこれら機器を管理する機関に異常を通知する、請求項1、2、3又は5に記載のオーナーチェックシステム。 6. The owner check system according to claim 1, 2, 3 or 5, wherein if the data is not genuine data, an abnormality is notified to an organization managing these devices by a gate means for cutting off the connection with the outside.
  7.  前記認証手段は、認証信号中のデジタルデータをアナログ信号に変換し、比較することで、真偽を判定する、請求項1、2、3又は5に記載のオーナーチェックシステム。 6. The owner check system according to claim 1, 2, 3 or 5, wherein the authenticating means converts the digital data in the authenticating signal into an analog signal and compares the digital data for comparison.
  8.  前記認証データは、物理的に暗号、復号化する手段を用いて暗号データ化されている、請求項1、2、3又は5に記載のオーナーチェックシステム。 The owner check system according to claim 1, 2, 3 or 5, wherein the authentication data is encrypted using a means for physically encrypting and decrypting.
  9.  前記デジタルデータは、パケット化したデータであって、認証データは、分割して、複数のパケットに組み込まれている、請求項1、2、3又は5に記載のオーナーチェックシステム。 The owner check system according to claim 1, 2, 3 or 5, wherein the digital data is packetized data, and the authentication data is divided and incorporated into a plurality of packets.
  10.  前記センサユニットが、温度、湿度、位置、傾き、回転数、加速度、脈波、心電図、血流、血圧、工場、プラントの各構成の状態を検出するもの等、コネクテッドカー、スマート家電、ロボット、ウェアラブルデバイス、プラント、工場、公共施設に1乃至複数個配置される等のいわゆるIoT(Internet of Things)、M2M等で用いられるセンサである、請求項1、2、3又は5に記載のオーナーチェックシステム。 The sensor unit detects temperature, humidity, position, inclination, rotation speed, acceleration, pulse wave, electrocardiogram, blood flow, blood pressure, factory, plant, etc., such as a connected car, smart home appliance, robot, The owner check according to claim 1, 2, 3 or 5, which is a sensor used in so-called IoT (Internet of Things), M2M, etc., such as one or more arranged in a wearable device, a plant, a factory, or a public facility. system.
  11.  前記暗号化は、XORロジックICチップと数列発生器を1乃至複数を乱数的用いて形成されるハードウェアユニットで形成される、請求項8に記載のオーナーチェックシステム。 The owner check system according to claim 8, wherein the encryption is formed by a hardware unit formed by randomly using one or more XOR logic IC chips and a number sequence generator.
  12.  前記データ認証は、複数のパケットデータに分散して記憶された認証データを一定の時間以内に収集し認証する、請求項1、2、3又は5に記載のオーナーチェックシステム。 6. The owner check system according to claim 1, wherein the data authentication is performed by collecting and authenticating authentication data distributed and stored in a plurality of packet data within a predetermined time.
PCT/JP2017/038373 2016-10-24 2017-10-24 Owner checking system WO2018079554A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2016208171 2016-10-24
JP2016-208171 2016-10-24

Publications (1)

Publication Number Publication Date
WO2018079554A1 true WO2018079554A1 (en) 2018-05-03

Family

ID=62025039

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2017/038373 WO2018079554A1 (en) 2016-10-24 2017-10-24 Owner checking system

Country Status (2)

Country Link
JP (1) JP7067892B2 (en)
WO (1) WO2018079554A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102493034B1 (en) * 2021-04-27 2023-01-30 주식회사 멕서스 A REMOTE CONTROL SOLUTION SERVER THAT INTEGRATES AND MANAGES IoT DEVICE AND 5G/LTE WIRELESS ROUTER

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009093573A (en) * 2007-10-12 2009-04-30 Obic Co Ltd E-mail management system
JP2014146139A (en) * 2013-01-28 2014-08-14 Advance Co Ltd Data communication system
JP2015115001A (en) * 2013-12-13 2015-06-22 株式会社東芝 Communication controller

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6519702B1 (en) 1999-01-22 2003-02-11 Sun Microsystems, Inc. Method and apparatus for limiting security attacks via data copied into computer memory
JP2002149060A (en) 2000-11-10 2002-05-22 Toppan Label Co Ltd Measuring device, measurement data transmission method, physical amount measuring device, and counting processor
FR2841997B1 (en) 2002-07-08 2005-11-11 Gemplus Card Int SECURING APPLICATION DOWNLOADED IN PARTICULAR IN A CHIP CARD
WO2010103613A1 (en) 2009-03-10 2010-09-16 Suginaka Junko Network system and method for authentication used in network system
US9692732B2 (en) 2011-11-29 2017-06-27 Amazon Technologies, Inc. Network connection automation
JP5766780B2 (en) 2013-12-27 2015-08-19 株式会社パレス興業 Cryptographic communication method between devices and data communication method using the same
US10470018B2 (en) 2014-10-24 2019-11-05 Qualcomm Incorporated Data aggregation and delivery

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009093573A (en) * 2007-10-12 2009-04-30 Obic Co Ltd E-mail management system
JP2014146139A (en) * 2013-01-28 2014-08-14 Advance Co Ltd Data communication system
JP2015115001A (en) * 2013-12-13 2015-06-22 株式会社東芝 Communication controller

Also Published As

Publication number Publication date
JP2018073416A (en) 2018-05-10
JP7067892B2 (en) 2022-05-16

Similar Documents

Publication Publication Date Title
CN109711171B (en) Method, device and system for positioning software bugs, storage medium and electronic device
Ling et al. Security vulnerabilities of internet of things: A case study of the smart plug system
KR101953547B1 (en) Method and apparatus for controlling management of mobile device by using secure event
JP7080829B2 (en) Systems and methods for establishing secure communication channels with Internet of Things (IOT) devices
JP6926085B2 (en) Secure Things Internet of Things (IoT) Device Provisioning Systems and Methods
JP5607130B2 (en) Safety box
US20180337932A1 (en) Cyber-physical security
US11284257B2 (en) Validation engine
US20190364023A1 (en) Method and apparatus for operating a connected device using a secure element device
WO2018146757A1 (en) Information processing device, information processing method, and information processing program
Li et al. Passwords in the air: Harvesting wi-fi credentials from smartcfg provisioning
Schiller et al. Drone Security and the Mysterious Case of DJI's DroneID.
WO2018079554A1 (en) Owner checking system
US20200099715A1 (en) Method and Mechanism for Detection of Pass-the-Hash Attacks
US10305930B2 (en) Wireless portable personal cyber-protection device
JP2006040196A (en) Software monitoring system and monitoring method
KR101878709B1 (en) Security management service system using security-enhanced residential gateway device
US20190102533A1 (en) Peripheral Cyber-Security Device
JP7176569B2 (en) Information processing device, log analysis method and program
CN112398787B (en) Mailbox login verification method and device, computer equipment and storage medium
US10687214B2 (en) Secure key fob
CN115484070A (en) Security detection method and security detection device for encrypted file
US11115199B2 (en) Information processing method, and computer program product
KR20170078320A (en) Real-time monitoring system for preventing malicious code penetration and a counterfeit access of user mobile terminal and method thereof
CN111292488A (en) Image data processing method, device and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17865366

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17865366

Country of ref document: EP

Kind code of ref document: A1