JPH01194628A - Secrecy protecting system - Google Patents
Secrecy protecting systemInfo
- Publication number
- JPH01194628A JPH01194628A JP63018945A JP1894588A JPH01194628A JP H01194628 A JPH01194628 A JP H01194628A JP 63018945 A JP63018945 A JP 63018945A JP 1894588 A JP1894588 A JP 1894588A JP H01194628 A JPH01194628 A JP H01194628A
- Authority
- JP
- Japan
- Prior art keywords
- data
- connection
- interface part
- information processing
- transmitting system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 41
- 238000012790 confirmation Methods 0.000 claims abstract description 14
- 238000004891 communication Methods 0.000 claims abstract description 13
- 230000005540 biological transmission Effects 0.000 claims description 29
- 230000010365 information processing Effects 0.000 claims description 27
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 208000033809 Suppuration Diseases 0.000 description 1
Abstract
Description
【発明の詳細な説明】
(産業上の利用分野)
本発明は、オンライン情報処理システムにおける機密保
護の方式に関する。DETAILED DESCRIPTION OF THE INVENTION (Field of Industrial Application) The present invention relates to a security protection system in an online information processing system.
(従来の技術)
従来のオンライン情報処理システムにおける情報処理装
置と端末とのやりとりは最初に接続し九時の伝送方式(
通信速度、同期方式および伝送符号)を処理が終了まで
継続してい念。また、仮に処理の途中で変える場合であ
っても、その変更対象はコードかまたは、データのやり
と9の手順のみであつ九。(Prior Art) In a conventional online information processing system, communication between an information processing device and a terminal is performed using the 9 o'clock transmission method (
(communication speed, synchronization method, and transmission code) to ensure that the processing continues until the end. Furthermore, even if changes are to be made during the process, the only changes to be made are to the code or data exchange and step 9.
(発明が解決しようとする課題)
このように従来のオンライン情報処理システムでは乗切
に接続し友時の伝送方式ケ最後まで固定しているので、
接続回線を調べれば回線の盗聴が可能であり、パスワー
ドなどt知られると簡単に情報処理システムに侵入され
るという欠点があった。(Problem to be Solved by the Invention) In this way, in conventional online information processing systems, the transmission method is fixed until the end by connecting to the terminal.
If the connection line is examined, it is possible to eavesdrop on the line, and if passwords and other information are known, the information processing system can be easily penetrated.
本発明の目的は上記欠点を解決するもので。The object of the present invention is to overcome the above-mentioned drawbacks.
回線の盗聴を困難にして機密性を向上させた機密保護方
式を提供することにある。The object of the present invention is to provide a security protection method that improves confidentiality by making wiretapping difficult.
(課題を解決するための手段)
前記目的を達成する念めに本発明による機密保護方式は
通信回線を介して情報処理装置と端末との間でデータの
やりと9を行なうオンライン情報処理システムにおいて
、情報処理装置と端末側との接続確認時に使用するデー
タ伝送方式と接続確認後に使用するデータ伝送方式に異
なった方式會採用し、接続確認手続きが正常に終了した
後、前記情報処理装置は予じめ端末毎に登録してある情
報により伝送方式の切換え1行ない、前記端末側も接続
確認完了後、登録してある伝送方式に切り換えて通信上
行なうように構成してある。(Means for Solving the Problem) In order to achieve the above object, the security protection method according to the present invention is applicable to an online information processing system in which data is exchanged between an information processing device and a terminal via a communication line. , a different data transmission method is adopted for the data transmission method used when confirming the connection between the information processing device and the terminal side, and the data transmission method used after the connection confirmation, and after the connection confirmation procedure is successfully completed, the information processing device Initially, the transmission method is switched in one line based on information registered for each terminal, and after the terminal side completes connection confirmation, it is configured to switch to the registered transmission method for communication.
(作用効果)
前記構成によれば接続確認完了後の切換えられ九情報処
理装蓋と端末との伝送方式が一致しない場合はデータの
やりとりができないので、登録がなされていない端末と
の通信は不能であV%機密保膿がなされる。(Effect) According to the above configuration, if the transmission method between the information processing unit and the terminal does not match after switching after the connection confirmation is completed, data cannot be exchanged, so communication with an unregistered terminal is impossible. Then V% confidential suppuration is performed.
(実施例) 以下、内面を参照して本発明紮さらに詳しく説明する。(Example) Hereinafter, the ligature of the present invention will be described in more detail with reference to the inner surface.
第1崗は1本発明による機密保護方式の一実施
例であるオンライン情報処理システムを示す図である。The first implementation is an implementation of the security protection method according to the present invention.
FIG. 1 is a diagram illustrating an example online information processing system.
利用者は通信を行なう場合、端末1から、接続のための
伝送方式を端末側回線インタフェース部2に設定する。When communicating, a user sets the transmission method for connection from the terminal 1 to the terminal-side line interface unit 2.
これと同じ伝送方式を情報処理装置4が情報処理装置側
回線インタフェース部5に設定する。The information processing device 4 sets the same transmission method in the information processing device side line interface unit 5.
利用者が接続手続きのための信号を端末から入力すると
、入力データは端末回線インタフェース部2から通信回
線3を介して、情報処理装置側回線インタフェース部5
に入る。When the user inputs a signal for the connection procedure from the terminal, the input data is sent from the terminal line interface section 2 via the communication line 3 to the information processing device side line interface section 5.
to go into.
情報処理装置4は情報処理装置側回線インタフェース部
5からのデータをチエツクし、接続要求の正轟性紮確認
し友後、端末側に対し接続確認完了データを送出する。The information processing device 4 checks the data from the information processing device side line interface section 5, confirms the validity of the connection request, and then sends connection confirmation completion data to the terminal side.
そして情報処理装置側回線インタフェース部5に予じめ
当該利用者の登録してある伝送方式を設定する。Then, the transmission method registered in advance by the user is set in the information processing device side line interface unit 5.
−万、端末側も情報処理システム側から接続確認完了デ
ータを受信すると、端末側回線インクフェース部2へ登
録した伝送方式を設定する。- When the terminal side also receives the connection confirmation completion data from the information processing system side, it sets the transmission method registered in the terminal side line interface unit 2.
以後、情報処理システムと端末側の間でデータのやりと
r)k行うことができる。Thereafter, data can be exchanged between the information processing system and the terminal side.
第2図は以上の手続の処理を示す図であり。FIG. 2 is a diagram showing the processing of the above procedure.
伝送方式の例として接続確認までは調歩同期式、偶数パ
リティ、通信速度300bps%周波数変調JISコー
ドを使用して伝送を行う場合である。An example of a transmission method is a case where transmission is performed using an asynchronous method, even parity, and a communication speed of 300 bps% frequency modulation JIS code until connection confirmation.
端末側がIDとパスワードを送出して接続要求をした(
ステップ11)後、情報処理システム側で正当性をチエ
ツクしている(ステップ15)。The terminal side sent an ID and password and requested a connection (
After step 11), the information processing system side checks the validity (step 15).
不正使用の場合は1回線を終了させられる(ステップ1
8)。正当な場合は接続OKのデータを、端末側へ送出
しくステップ16)、その後。In case of unauthorized use, one line will be terminated (Step 1)
8). If it is valid, data indicating that the connection is OK is sent to the terminal side (step 16), and thereafter.
利用者の登録し念伝送万式に回線インタフェース部を設
定する(ステップ17)。この例では同期方式、CRC
チエツク、通信速度2400bps、特殊暗号1位相変
調方式に変わる。The user is registered and the line interface section is set up in the Nen Tenshu Banshiki (step 17). In this example, the synchronization method, CRC
Check, communication speed is 2400 bps, special encryption 1 phase modulation method is used.
−万1gIa末側も登録した伝送方式上回線インタフェ
ース部に設定する(ステップ13)。- If the terminal side of 1gIa is also set, the registered transmission method is set in the line interface section (step 13).
以上の動作によってお互いのデータ伝送方式が一致した
場合のみデータの送信、受信が可能となる。Through the above operations, data transmission and reception becomes possible only when the mutual data transmission methods match.
(発明の効果)
以上、説明したように本発明は、接続確認時の伝送方式
と接続確認が正常完了した場合の伝送方式とを変えるこ
とにより、利用者毎に異なった伝送が実現できる。(Effects of the Invention) As described above, the present invention can realize different transmissions for each user by changing the transmission method at the time of connection confirmation and the transmission method when connection confirmation is successfully completed.
そして回線全盗聴されても、複雑な伝送となっているの
で機密が保持でき1例え、ID番号。Even if the entire line is wiretapped, the complicated transmission means that secrecy can be maintained, such as ID numbers.
パスワードが盗用されても変わった伝送方式と一致した
伝送方式が設定できなければ通信は不可能となり、より
高い機密保持ができるという効果がある。Even if a password is stolen, communication will be impossible unless a transmission method matching the changed transmission method can be set, resulting in higher confidentiality.
第1図は1本発明による機密保護方式の一実施例を示す
オンライン情報処理システム内、第2図は、本発明方式
の処理を示す因である。
1・・・端末 2・・・端末側1線インタフェース部
3・・・通信回線 4・・・情報処理装置5・・・
情報処理装置側回線インタフェース部代理人 弁理士
井 ノ ロ 壽FIG. 1 shows an online information processing system showing an embodiment of the security protection method according to the present invention, and FIG. 2 shows the processing of the method according to the present invention. 1... Terminal 2... Terminal side 1-line interface section 3... Communication line 4... Information processing device 5...
Information processing equipment side line interface department agent Patent attorney
Hisashi Inoro
Claims (1)
やりとりを行なうオンライン情報処理システムにおいて
、情報処理装置と端末側との接続確認時に使用するデー
タ伝送方式と接続確認後に使用するデータ伝送方式に異
なつた方式を採用し、接続確認手続きが正常に終了した
後、前記情報処理装置は予じめ端末毎に登録してある情
報により伝送方式の切換えを行ない、前記端末側も接続
確認完了後、登録してある伝送方式に切り換えて通信を
行なうように構成したことを特徴とする機密保護方式。In an online information processing system that exchanges data between an information processing device and a terminal via a communication line, the data transmission method used when confirming the connection between the information processing device and the terminal side, and the data transmission method used after the connection is confirmed. After the connection confirmation procedure is successfully completed, the information processing device switches the transmission method based on the information registered in advance for each terminal, and the terminal side also switches the transmission method after the connection confirmation procedure is completed. , a security protection method characterized in that the communication is performed by switching to a registered transmission method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP63018945A JPH01194628A (en) | 1988-01-29 | 1988-01-29 | Secrecy protecting system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP63018945A JPH01194628A (en) | 1988-01-29 | 1988-01-29 | Secrecy protecting system |
Publications (1)
Publication Number | Publication Date |
---|---|
JPH01194628A true JPH01194628A (en) | 1989-08-04 |
Family
ID=11985784
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP63018945A Pending JPH01194628A (en) | 1988-01-29 | 1988-01-29 | Secrecy protecting system |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPH01194628A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8843515B2 (en) | 2012-03-07 | 2014-09-23 | Snap Trends, Inc. | Methods and systems of aggregating information of social networks based on geographical locations via a network |
US8874140B2 (en) | 2000-12-19 | 2014-10-28 | At&T Intellectual Property I, L.P. | Location blocking service from a wireless service provider |
US8886226B2 (en) | 2008-03-14 | 2014-11-11 | William J. Johnson | System and method for timely whereabouts determination by a mobile data processing system |
US8887177B2 (en) | 2008-03-14 | 2014-11-11 | William J. Johnson | System and method for automated content distribution objects |
US8897741B2 (en) | 2009-11-13 | 2014-11-25 | William J. Johnson | System and method for mobile device usability by locational conditions |
US8942733B2 (en) | 2008-03-14 | 2015-01-27 | William J. Johnson | System and method for location based exchanges of data facilitating distributed location applications |
US8942693B2 (en) | 2008-03-14 | 2015-01-27 | William J. Johnson | System and method for targeting data processing system(s) with data |
US9466076B2 (en) | 2000-12-19 | 2016-10-11 | At&T Intellectual Property I, L.P. | Location blocking service from a web advertiser |
US9477991B2 (en) | 2013-08-27 | 2016-10-25 | Snap Trends, Inc. | Methods and systems of aggregating information of geographic context regions of social networks based on geographical locations via a network |
US9501780B2 (en) | 2000-12-19 | 2016-11-22 | At&T Intellectual Property I, L.P. | Surveying wireless device users by location |
US9571958B2 (en) | 2000-06-30 | 2017-02-14 | At&T Intellectual Propery I, L.P. | Anonymous location service for wireless networks |
US9584647B2 (en) | 2000-12-19 | 2017-02-28 | At&T Intellectual Property I, L.P. | System and method for remote control of appliances utilizing mobile location-based applications |
US9894489B2 (en) | 2013-09-30 | 2018-02-13 | William J. Johnson | System and method for situational proximity observation alerting privileged recipients |
US10477994B2 (en) | 2008-03-14 | 2019-11-19 | William J. Johnson | System and method for location based exchanges of data facilitiating distributed locational applications |
-
1988
- 1988-01-29 JP JP63018945A patent/JPH01194628A/en active Pending
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9571958B2 (en) | 2000-06-30 | 2017-02-14 | At&T Intellectual Propery I, L.P. | Anonymous location service for wireless networks |
US9466076B2 (en) | 2000-12-19 | 2016-10-11 | At&T Intellectual Property I, L.P. | Location blocking service from a web advertiser |
US8874140B2 (en) | 2000-12-19 | 2014-10-28 | At&T Intellectual Property I, L.P. | Location blocking service from a wireless service provider |
US10217137B2 (en) | 2000-12-19 | 2019-02-26 | Google Llc | Location blocking service from a web advertiser |
US9852450B2 (en) | 2000-12-19 | 2017-12-26 | At&T Intellectual Property I, L.P. | Location blocking service from a web advertiser |
US9763091B2 (en) | 2000-12-19 | 2017-09-12 | At&T Intellectual Property I, L.P. | Location blocking service from a wireless service provider |
US9584647B2 (en) | 2000-12-19 | 2017-02-28 | At&T Intellectual Property I, L.P. | System and method for remote control of appliances utilizing mobile location-based applications |
US9501780B2 (en) | 2000-12-19 | 2016-11-22 | At&T Intellectual Property I, L.P. | Surveying wireless device users by location |
US8942732B2 (en) | 2008-03-14 | 2015-01-27 | William J. Johnson | Location based exchange operating system |
US9456303B2 (en) | 2008-03-14 | 2016-09-27 | William J. Johnson | System and method for service access via hopped wireless mobile device(s) |
US9014658B2 (en) | 2008-03-14 | 2015-04-21 | William J. Johnson | System and method for application context location based configuration suggestions |
US9055406B2 (en) | 2008-03-14 | 2015-06-09 | William J. Johnson | Server-less synchronized processing across a plurality of interoperating data processing systems |
US9078095B2 (en) | 2008-03-14 | 2015-07-07 | William J. Johnson | System and method for location based inventory management |
US9088869B2 (en) | 2008-03-14 | 2015-07-21 | William J. Johnson | System and method for application search results by locational conditions |
US9088868B2 (en) | 2008-03-14 | 2015-07-21 | William J. Johnson | Location based exchange permissions |
US9100792B2 (en) | 2008-03-14 | 2015-08-04 | William J. Johnson | System and method for service-free location based applications |
US9113295B2 (en) | 2008-03-14 | 2015-08-18 | William J. Johnson | System and method for location based exchange vicinity interest specification |
US9204275B2 (en) | 2008-03-14 | 2015-12-01 | William J. Johnson | System and method for targeting data processing system(s) with data |
US9253597B2 (en) | 2008-03-14 | 2016-02-02 | William J. Johnson | System and method for determining mobile users of interest |
US9392408B2 (en) | 2008-03-14 | 2016-07-12 | William J. Johnson | System and method for location based exchanges of data facilitating distributed locational applications |
US9445238B2 (en) | 2008-03-14 | 2016-09-13 | William J. Johnson | System and method for confirming data processing system target(s) |
US10477994B2 (en) | 2008-03-14 | 2019-11-19 | William J. Johnson | System and method for location based exchanges of data facilitiating distributed locational applications |
US8942693B2 (en) | 2008-03-14 | 2015-01-27 | William J. Johnson | System and method for targeting data processing system(s) with data |
US8886226B2 (en) | 2008-03-14 | 2014-11-11 | William J. Johnson | System and method for timely whereabouts determination by a mobile data processing system |
US8942733B2 (en) | 2008-03-14 | 2015-01-27 | William J. Johnson | System and method for location based exchanges of data facilitating distributed location applications |
US8923806B2 (en) | 2008-03-14 | 2014-12-30 | William J. Johnson | System and method for presenting application data by data processing system(s) in a vicinity |
US9584993B2 (en) | 2008-03-14 | 2017-02-28 | William J. Johnson | System and method for vector processing on behalf of image aperture aim |
US10111034B2 (en) | 2008-03-14 | 2018-10-23 | Billjco Llc | System and method for sound wave triggered content |
US8887177B2 (en) | 2008-03-14 | 2014-11-11 | William J. Johnson | System and method for automated content distribution objects |
US8897741B2 (en) | 2009-11-13 | 2014-11-25 | William J. Johnson | System and method for mobile device usability by locational conditions |
US8897742B2 (en) | 2009-11-13 | 2014-11-25 | William J. Johnson | System and method for sudden proximal user interface |
US9626446B2 (en) | 2012-03-07 | 2017-04-18 | Snap Trends, Inc. | Methods and systems of advertising based on aggregated information of social networks within geographical locations via a network |
US8843515B2 (en) | 2012-03-07 | 2014-09-23 | Snap Trends, Inc. | Methods and systems of aggregating information of social networks based on geographical locations via a network |
US9477991B2 (en) | 2013-08-27 | 2016-10-25 | Snap Trends, Inc. | Methods and systems of aggregating information of geographic context regions of social networks based on geographical locations via a network |
US9894489B2 (en) | 2013-09-30 | 2018-02-13 | William J. Johnson | System and method for situational proximity observation alerting privileged recipients |
US10194293B2 (en) | 2013-09-30 | 2019-01-29 | William J. Johnson | System and method for vital signs alerting privileged recipients |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100743924B1 (en) | Security setting system | |
RU2313916C2 (en) | Method for acoustic two-factor authentication | |
JPH01194628A (en) | Secrecy protecting system | |
US20020187808A1 (en) | Method and arrangement for encrypting data transfer at an interface in mobile equipment in radio network, and mobile equipment in radio network | |
CN106789047A (en) | A kind of block chain identification system | |
US20050120248A1 (en) | Internet protocol telephony security architecture | |
EP0858186A3 (en) | Method for secure communication in a telecommunication system | |
CN110278084B (en) | eID establishing method, related device and system | |
JPH10215488A (en) | Host access method in mobile radio system | |
GB2408129A (en) | User authentication via short range communication from a portable device (eg a mobile phone) | |
CN106657045B (en) | Multi-network integrated security and authentication method and system | |
CN114362946B (en) | Key agreement method and system | |
JPH1139082A (en) | Keyboard device having security function and method therefor | |
JP4941918B2 (en) | Electronic authentication system | |
CN115527292A (en) | Mobile phone terminal remote vehicle unlocking method of security chip and security chip device | |
EP1320975B1 (en) | Internet protocol telephony security architecture | |
CN111263360A (en) | Wireless encryption device and method for protecting variable mechanical authentication password by adopting public key | |
CN115171245B (en) | Door lock security authentication method and system based on HCE | |
CN110717177A (en) | Method for safely unlocking computer in real time by using mobile terminal | |
CN211630397U (en) | Wireless encryption device adopting public key to protect variable mechanical authentication password | |
CN110932843B (en) | Data communication encryption method for embedded system | |
JP2000224162A (en) | Client authentication method using irreversible function | |
WO2016165429A1 (en) | Service processing method and apparatus, and terminal | |
CN114282254A (en) | Encryption and decryption method and device, and electronic equipment | |
CN114531225A (en) | End-to-end communication encryption method, device, storage medium and terminal equipment |