[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

JPH01194628A - Secrecy protecting system - Google Patents

Secrecy protecting system

Info

Publication number
JPH01194628A
JPH01194628A JP63018945A JP1894588A JPH01194628A JP H01194628 A JPH01194628 A JP H01194628A JP 63018945 A JP63018945 A JP 63018945A JP 1894588 A JP1894588 A JP 1894588A JP H01194628 A JPH01194628 A JP H01194628A
Authority
JP
Japan
Prior art keywords
data
connection
interface part
information processing
transmitting system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP63018945A
Other languages
Japanese (ja)
Inventor
Noriyuki Tachibana
橘 則行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP63018945A priority Critical patent/JPH01194628A/en
Publication of JPH01194628A publication Critical patent/JPH01194628A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To make the wiretapping of a line difficult and to enhance confidentiality by adoping different systems for a data transmitting system used when the connection between information processor and a terminal side is confirmed and for the data transmitting system used after connection confirmation. CONSTITUTION:When a user communicates, the transmitting system for the connection is set at a terminal side line interface part 2. The same transmitting system is set at an information processor side line interface part 5 by an information processor 4. When the user inputs a signal for a connection procedure from the terminal, input data are inserted from the interface part 2 through a communication line 3 to an interface part 5. The information processor 4 checks the data from the interface part 5, confirms the justifiability of a connection request, sends the connection confirmation completing data to the terminal side, and then, sets the transmitting system of the said user registered in the interface part 5 beforehand. On the other hand, when the terminal side receives the connection confirmation completing data, the transmitting system registered into the interface part 2 is set, and thereafter, the data are exchanged.

Description

【発明の詳細な説明】 (産業上の利用分野) 本発明は、オンライン情報処理システムにおける機密保
護の方式に関する。
DETAILED DESCRIPTION OF THE INVENTION (Field of Industrial Application) The present invention relates to a security protection system in an online information processing system.

(従来の技術) 従来のオンライン情報処理システムにおける情報処理装
置と端末とのやりとりは最初に接続し九時の伝送方式(
通信速度、同期方式および伝送符号)を処理が終了まで
継続してい念。また、仮に処理の途中で変える場合であ
っても、その変更対象はコードかまたは、データのやり
と9の手順のみであつ九。
(Prior Art) In a conventional online information processing system, communication between an information processing device and a terminal is performed using the 9 o'clock transmission method (
(communication speed, synchronization method, and transmission code) to ensure that the processing continues until the end. Furthermore, even if changes are to be made during the process, the only changes to be made are to the code or data exchange and step 9.

(発明が解決しようとする課題) このように従来のオンライン情報処理システムでは乗切
に接続し友時の伝送方式ケ最後まで固定しているので、
接続回線を調べれば回線の盗聴が可能であり、パスワー
ドなどt知られると簡単に情報処理システムに侵入され
るという欠点があった。
(Problem to be Solved by the Invention) In this way, in conventional online information processing systems, the transmission method is fixed until the end by connecting to the terminal.
If the connection line is examined, it is possible to eavesdrop on the line, and if passwords and other information are known, the information processing system can be easily penetrated.

本発明の目的は上記欠点を解決するもので。The object of the present invention is to overcome the above-mentioned drawbacks.

回線の盗聴を困難にして機密性を向上させた機密保護方
式を提供することにある。
The object of the present invention is to provide a security protection method that improves confidentiality by making wiretapping difficult.

(課題を解決するための手段) 前記目的を達成する念めに本発明による機密保護方式は
通信回線を介して情報処理装置と端末との間でデータの
やりと9を行なうオンライン情報処理システムにおいて
、情報処理装置と端末側との接続確認時に使用するデー
タ伝送方式と接続確認後に使用するデータ伝送方式に異
なった方式會採用し、接続確認手続きが正常に終了した
後、前記情報処理装置は予じめ端末毎に登録してある情
報により伝送方式の切換え1行ない、前記端末側も接続
確認完了後、登録してある伝送方式に切り換えて通信上
行なうように構成してある。
(Means for Solving the Problem) In order to achieve the above object, the security protection method according to the present invention is applicable to an online information processing system in which data is exchanged between an information processing device and a terminal via a communication line. , a different data transmission method is adopted for the data transmission method used when confirming the connection between the information processing device and the terminal side, and the data transmission method used after the connection confirmation, and after the connection confirmation procedure is successfully completed, the information processing device Initially, the transmission method is switched in one line based on information registered for each terminal, and after the terminal side completes connection confirmation, it is configured to switch to the registered transmission method for communication.

(作用効果) 前記構成によれば接続確認完了後の切換えられ九情報処
理装蓋と端末との伝送方式が一致しない場合はデータの
やりとりができないので、登録がなされていない端末と
の通信は不能であV%機密保膿がなされる。
(Effect) According to the above configuration, if the transmission method between the information processing unit and the terminal does not match after switching after the connection confirmation is completed, data cannot be exchanged, so communication with an unregistered terminal is impossible. Then V% confidential suppuration is performed.

(実施例) 以下、内面を参照して本発明紮さらに詳しく説明する。(Example) Hereinafter, the ligature of the present invention will be described in more detail with reference to the inner surface.

第1崗は1本発明による機密保護方式の一実施    
例であるオンライン情報処理システムを示す図である。
The first implementation is an implementation of the security protection method according to the present invention.
FIG. 1 is a diagram illustrating an example online information processing system.

利用者は通信を行なう場合、端末1から、接続のための
伝送方式を端末側回線インタフェース部2に設定する。
When communicating, a user sets the transmission method for connection from the terminal 1 to the terminal-side line interface unit 2.

これと同じ伝送方式を情報処理装置4が情報処理装置側
回線インタフェース部5に設定する。
The information processing device 4 sets the same transmission method in the information processing device side line interface unit 5.

利用者が接続手続きのための信号を端末から入力すると
、入力データは端末回線インタフェース部2から通信回
線3を介して、情報処理装置側回線インタフェース部5
に入る。
When the user inputs a signal for the connection procedure from the terminal, the input data is sent from the terminal line interface section 2 via the communication line 3 to the information processing device side line interface section 5.
to go into.

情報処理装置4は情報処理装置側回線インタフェース部
5からのデータをチエツクし、接続要求の正轟性紮確認
し友後、端末側に対し接続確認完了データを送出する。
The information processing device 4 checks the data from the information processing device side line interface section 5, confirms the validity of the connection request, and then sends connection confirmation completion data to the terminal side.

そして情報処理装置側回線インタフェース部5に予じめ
当該利用者の登録してある伝送方式を設定する。
Then, the transmission method registered in advance by the user is set in the information processing device side line interface unit 5.

−万、端末側も情報処理システム側から接続確認完了デ
ータを受信すると、端末側回線インクフェース部2へ登
録した伝送方式を設定する。
- When the terminal side also receives the connection confirmation completion data from the information processing system side, it sets the transmission method registered in the terminal side line interface unit 2.

以後、情報処理システムと端末側の間でデータのやりと
r)k行うことができる。
Thereafter, data can be exchanged between the information processing system and the terminal side.

第2図は以上の手続の処理を示す図であり。FIG. 2 is a diagram showing the processing of the above procedure.

伝送方式の例として接続確認までは調歩同期式、偶数パ
リティ、通信速度300bps%周波数変調JISコー
ドを使用して伝送を行う場合である。
An example of a transmission method is a case where transmission is performed using an asynchronous method, even parity, and a communication speed of 300 bps% frequency modulation JIS code until connection confirmation.

端末側がIDとパスワードを送出して接続要求をした(
ステップ11)後、情報処理システム側で正当性をチエ
ツクしている(ステップ15)。
The terminal side sent an ID and password and requested a connection (
After step 11), the information processing system side checks the validity (step 15).

不正使用の場合は1回線を終了させられる(ステップ1
8)。正当な場合は接続OKのデータを、端末側へ送出
しくステップ16)、その後。
In case of unauthorized use, one line will be terminated (Step 1)
8). If it is valid, data indicating that the connection is OK is sent to the terminal side (step 16), and thereafter.

利用者の登録し念伝送万式に回線インタフェース部を設
定する(ステップ17)。この例では同期方式、CRC
チエツク、通信速度2400bps、特殊暗号1位相変
調方式に変わる。
The user is registered and the line interface section is set up in the Nen Tenshu Banshiki (step 17). In this example, the synchronization method, CRC
Check, communication speed is 2400 bps, special encryption 1 phase modulation method is used.

−万1gIa末側も登録した伝送方式上回線インタフェ
ース部に設定する(ステップ13)。
- If the terminal side of 1gIa is also set, the registered transmission method is set in the line interface section (step 13).

以上の動作によってお互いのデータ伝送方式が一致した
場合のみデータの送信、受信が可能となる。
Through the above operations, data transmission and reception becomes possible only when the mutual data transmission methods match.

(発明の効果) 以上、説明したように本発明は、接続確認時の伝送方式
と接続確認が正常完了した場合の伝送方式とを変えるこ
とにより、利用者毎に異なった伝送が実現できる。
(Effects of the Invention) As described above, the present invention can realize different transmissions for each user by changing the transmission method at the time of connection confirmation and the transmission method when connection confirmation is successfully completed.

そして回線全盗聴されても、複雑な伝送となっているの
で機密が保持でき1例え、ID番号。
Even if the entire line is wiretapped, the complicated transmission means that secrecy can be maintained, such as ID numbers.

パスワードが盗用されても変わった伝送方式と一致した
伝送方式が設定できなければ通信は不可能となり、より
高い機密保持ができるという効果がある。
Even if a password is stolen, communication will be impossible unless a transmission method matching the changed transmission method can be set, resulting in higher confidentiality.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は1本発明による機密保護方式の一実施例を示す
オンライン情報処理システム内、第2図は、本発明方式
の処理を示す因である。 1・・・端末  2・・・端末側1線インタフェース部
3・・・通信回線   4・・・情報処理装置5・・・
情報処理装置側回線インタフェース部代理人 弁理士 
井 ノ ロ   壽
FIG. 1 shows an online information processing system showing an embodiment of the security protection method according to the present invention, and FIG. 2 shows the processing of the method according to the present invention. 1... Terminal 2... Terminal side 1-line interface section 3... Communication line 4... Information processing device 5...
Information processing equipment side line interface department agent Patent attorney
Hisashi Inoro

Claims (1)

【特許請求の範囲】[Claims] 通信回線を介して情報処理装置と端末との間でデータの
やりとりを行なうオンライン情報処理システムにおいて
、情報処理装置と端末側との接続確認時に使用するデー
タ伝送方式と接続確認後に使用するデータ伝送方式に異
なつた方式を採用し、接続確認手続きが正常に終了した
後、前記情報処理装置は予じめ端末毎に登録してある情
報により伝送方式の切換えを行ない、前記端末側も接続
確認完了後、登録してある伝送方式に切り換えて通信を
行なうように構成したことを特徴とする機密保護方式。
In an online information processing system that exchanges data between an information processing device and a terminal via a communication line, the data transmission method used when confirming the connection between the information processing device and the terminal side, and the data transmission method used after the connection is confirmed. After the connection confirmation procedure is successfully completed, the information processing device switches the transmission method based on the information registered in advance for each terminal, and the terminal side also switches the transmission method after the connection confirmation procedure is completed. , a security protection method characterized in that the communication is performed by switching to a registered transmission method.
JP63018945A 1988-01-29 1988-01-29 Secrecy protecting system Pending JPH01194628A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP63018945A JPH01194628A (en) 1988-01-29 1988-01-29 Secrecy protecting system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP63018945A JPH01194628A (en) 1988-01-29 1988-01-29 Secrecy protecting system

Publications (1)

Publication Number Publication Date
JPH01194628A true JPH01194628A (en) 1989-08-04

Family

ID=11985784

Family Applications (1)

Application Number Title Priority Date Filing Date
JP63018945A Pending JPH01194628A (en) 1988-01-29 1988-01-29 Secrecy protecting system

Country Status (1)

Country Link
JP (1) JPH01194628A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8843515B2 (en) 2012-03-07 2014-09-23 Snap Trends, Inc. Methods and systems of aggregating information of social networks based on geographical locations via a network
US8874140B2 (en) 2000-12-19 2014-10-28 At&T Intellectual Property I, L.P. Location blocking service from a wireless service provider
US8886226B2 (en) 2008-03-14 2014-11-11 William J. Johnson System and method for timely whereabouts determination by a mobile data processing system
US8887177B2 (en) 2008-03-14 2014-11-11 William J. Johnson System and method for automated content distribution objects
US8897741B2 (en) 2009-11-13 2014-11-25 William J. Johnson System and method for mobile device usability by locational conditions
US8942733B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for location based exchanges of data facilitating distributed location applications
US8942693B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for targeting data processing system(s) with data
US9466076B2 (en) 2000-12-19 2016-10-11 At&T Intellectual Property I, L.P. Location blocking service from a web advertiser
US9477991B2 (en) 2013-08-27 2016-10-25 Snap Trends, Inc. Methods and systems of aggregating information of geographic context regions of social networks based on geographical locations via a network
US9501780B2 (en) 2000-12-19 2016-11-22 At&T Intellectual Property I, L.P. Surveying wireless device users by location
US9571958B2 (en) 2000-06-30 2017-02-14 At&T Intellectual Propery I, L.P. Anonymous location service for wireless networks
US9584647B2 (en) 2000-12-19 2017-02-28 At&T Intellectual Property I, L.P. System and method for remote control of appliances utilizing mobile location-based applications
US9894489B2 (en) 2013-09-30 2018-02-13 William J. Johnson System and method for situational proximity observation alerting privileged recipients
US10477994B2 (en) 2008-03-14 2019-11-19 William J. Johnson System and method for location based exchanges of data facilitiating distributed locational applications

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9571958B2 (en) 2000-06-30 2017-02-14 At&T Intellectual Propery I, L.P. Anonymous location service for wireless networks
US9466076B2 (en) 2000-12-19 2016-10-11 At&T Intellectual Property I, L.P. Location blocking service from a web advertiser
US8874140B2 (en) 2000-12-19 2014-10-28 At&T Intellectual Property I, L.P. Location blocking service from a wireless service provider
US10217137B2 (en) 2000-12-19 2019-02-26 Google Llc Location blocking service from a web advertiser
US9852450B2 (en) 2000-12-19 2017-12-26 At&T Intellectual Property I, L.P. Location blocking service from a web advertiser
US9763091B2 (en) 2000-12-19 2017-09-12 At&T Intellectual Property I, L.P. Location blocking service from a wireless service provider
US9584647B2 (en) 2000-12-19 2017-02-28 At&T Intellectual Property I, L.P. System and method for remote control of appliances utilizing mobile location-based applications
US9501780B2 (en) 2000-12-19 2016-11-22 At&T Intellectual Property I, L.P. Surveying wireless device users by location
US8942732B2 (en) 2008-03-14 2015-01-27 William J. Johnson Location based exchange operating system
US9456303B2 (en) 2008-03-14 2016-09-27 William J. Johnson System and method for service access via hopped wireless mobile device(s)
US9014658B2 (en) 2008-03-14 2015-04-21 William J. Johnson System and method for application context location based configuration suggestions
US9055406B2 (en) 2008-03-14 2015-06-09 William J. Johnson Server-less synchronized processing across a plurality of interoperating data processing systems
US9078095B2 (en) 2008-03-14 2015-07-07 William J. Johnson System and method for location based inventory management
US9088869B2 (en) 2008-03-14 2015-07-21 William J. Johnson System and method for application search results by locational conditions
US9088868B2 (en) 2008-03-14 2015-07-21 William J. Johnson Location based exchange permissions
US9100792B2 (en) 2008-03-14 2015-08-04 William J. Johnson System and method for service-free location based applications
US9113295B2 (en) 2008-03-14 2015-08-18 William J. Johnson System and method for location based exchange vicinity interest specification
US9204275B2 (en) 2008-03-14 2015-12-01 William J. Johnson System and method for targeting data processing system(s) with data
US9253597B2 (en) 2008-03-14 2016-02-02 William J. Johnson System and method for determining mobile users of interest
US9392408B2 (en) 2008-03-14 2016-07-12 William J. Johnson System and method for location based exchanges of data facilitating distributed locational applications
US9445238B2 (en) 2008-03-14 2016-09-13 William J. Johnson System and method for confirming data processing system target(s)
US10477994B2 (en) 2008-03-14 2019-11-19 William J. Johnson System and method for location based exchanges of data facilitiating distributed locational applications
US8942693B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for targeting data processing system(s) with data
US8886226B2 (en) 2008-03-14 2014-11-11 William J. Johnson System and method for timely whereabouts determination by a mobile data processing system
US8942733B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for location based exchanges of data facilitating distributed location applications
US8923806B2 (en) 2008-03-14 2014-12-30 William J. Johnson System and method for presenting application data by data processing system(s) in a vicinity
US9584993B2 (en) 2008-03-14 2017-02-28 William J. Johnson System and method for vector processing on behalf of image aperture aim
US10111034B2 (en) 2008-03-14 2018-10-23 Billjco Llc System and method for sound wave triggered content
US8887177B2 (en) 2008-03-14 2014-11-11 William J. Johnson System and method for automated content distribution objects
US8897741B2 (en) 2009-11-13 2014-11-25 William J. Johnson System and method for mobile device usability by locational conditions
US8897742B2 (en) 2009-11-13 2014-11-25 William J. Johnson System and method for sudden proximal user interface
US9626446B2 (en) 2012-03-07 2017-04-18 Snap Trends, Inc. Methods and systems of advertising based on aggregated information of social networks within geographical locations via a network
US8843515B2 (en) 2012-03-07 2014-09-23 Snap Trends, Inc. Methods and systems of aggregating information of social networks based on geographical locations via a network
US9477991B2 (en) 2013-08-27 2016-10-25 Snap Trends, Inc. Methods and systems of aggregating information of geographic context regions of social networks based on geographical locations via a network
US9894489B2 (en) 2013-09-30 2018-02-13 William J. Johnson System and method for situational proximity observation alerting privileged recipients
US10194293B2 (en) 2013-09-30 2019-01-29 William J. Johnson System and method for vital signs alerting privileged recipients

Similar Documents

Publication Publication Date Title
KR100743924B1 (en) Security setting system
RU2313916C2 (en) Method for acoustic two-factor authentication
JPH01194628A (en) Secrecy protecting system
US20020187808A1 (en) Method and arrangement for encrypting data transfer at an interface in mobile equipment in radio network, and mobile equipment in radio network
CN106789047A (en) A kind of block chain identification system
US20050120248A1 (en) Internet protocol telephony security architecture
EP0858186A3 (en) Method for secure communication in a telecommunication system
CN110278084B (en) eID establishing method, related device and system
JPH10215488A (en) Host access method in mobile radio system
GB2408129A (en) User authentication via short range communication from a portable device (eg a mobile phone)
CN106657045B (en) Multi-network integrated security and authentication method and system
CN114362946B (en) Key agreement method and system
JPH1139082A (en) Keyboard device having security function and method therefor
JP4941918B2 (en) Electronic authentication system
CN115527292A (en) Mobile phone terminal remote vehicle unlocking method of security chip and security chip device
EP1320975B1 (en) Internet protocol telephony security architecture
CN111263360A (en) Wireless encryption device and method for protecting variable mechanical authentication password by adopting public key
CN115171245B (en) Door lock security authentication method and system based on HCE
CN110717177A (en) Method for safely unlocking computer in real time by using mobile terminal
CN211630397U (en) Wireless encryption device adopting public key to protect variable mechanical authentication password
CN110932843B (en) Data communication encryption method for embedded system
JP2000224162A (en) Client authentication method using irreversible function
WO2016165429A1 (en) Service processing method and apparatus, and terminal
CN114282254A (en) Encryption and decryption method and device, and electronic equipment
CN114531225A (en) End-to-end communication encryption method, device, storage medium and terminal equipment