+

WO1992009946A1 - Systeme de securite - Google Patents

Systeme de securite Download PDF

Info

Publication number
WO1992009946A1
WO1992009946A1 PCT/JP1991/001631 JP9101631W WO9209946A1 WO 1992009946 A1 WO1992009946 A1 WO 1992009946A1 JP 9101631 W JP9101631 W JP 9101631W WO 9209946 A1 WO9209946 A1 WO 9209946A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
user
security system
data
information
Prior art date
Application number
PCT/JP1991/001631
Other languages
English (en)
Japanese (ja)
Inventor
Makoto Morikawa
Junji Tsuchiya
Minoru Nishino
Original Assignee
Seiko Epson Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Seiko Epson Corporation filed Critical Seiko Epson Corporation
Publication of WO1992009946A1 publication Critical patent/WO1992009946A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password

Definitions

  • the present invention relates to a security system for an information processing device such as a personal computer (hereinafter, referred to as a “personal computer”).
  • a personal computer hereinafter, referred to as a “personal computer”.
  • a prompt appears on the display device requesting the input of the user ID and the password. If the user inputs the correct user ID and password in response to this request, the second-order data corresponding to the user ID is read. Then, the input password and the password data are compared, and if they match, a prompt for use permission appears on the display device, and the user can use the password. If the input password does not match this password, a message indicating that the password is incorrect is output to the display device. Then, a prompt for input of the user ID and the passcode appears on the display device, and the user starts the process again from the input of the user ID.
  • the security system of the information processing device described above has the following three problems.
  • the password is entered according to the length of the input string and the combination of characters.
  • the effort and security against illegal intruders will change. If the character string is long enough or if the combination of characters is complicated, the security against illegal intruders will be improved, but the user will have to enter the password extra time.
  • the character string is short or the combination of characters is extremely simple, there is a problem in that the risk of an illegal intruder increasing the ability to easily input a user's password is problematic.
  • the conventional information processing device could repeat the password entry any number of times on the platform where the wrong password was entered. In this case, there is a risk that a malicious third party who does not know the password may accidentally input the correct password by repeatedly inputting the appropriate password.
  • a first object of the present invention is to provide a security system that allows a user to easily input a password and at the same time has high security against an illegal intruder.
  • the second objective is to provide a security system that is highly secure against illegal intruders. It is a third object of the present invention to provide a security system for an information processing device from which confidential data of a hard disk device cannot be read.
  • a security system for an information processing apparatus comprises: a pass-word managing means in which pass-code is stored for each user; Time monitoring means for obtaining the information or Z and time information, and password data corresponding to the day of the week information or Z and time information obtained from the time monitoring means from the pass data of a specific user, and reading the password. It is composed of security control means for determining whether the user is permitted to use the data by comparing the data with a password input by the user.
  • the security control means divides a predetermined period set in advance into a usable time zone and a use prohibition time zone, and determines which time zone from the day of the week information or the time information obtained from the time monitoring means, In the available time period, the password data of a specific user is read from the password management means, and the passcode is compared with the password input by the user to determine whether the user is permitted to use the password.
  • the power supply of the system may be turned off during the off-hours.
  • the password management means may store a plurality of password data having different degrees of difficulty for each time zone for each user, and the security control means may divide a predetermined period set in advance into a plurality of time zones, and The time zone is determined from the day of the week information or time information obtained from the monitoring means, the passcode data corresponding to the time zone determined by the password management means is read, and the password data and the passcode inputted by the user are read. By comparing with the user, the user's permission to use may be determined.
  • a security system for an information processing apparatus comprises: a password management unit storing password data for each user; External storage means including a first area storing a plurality of files accessed based on the information, a second area storing the directory information, and a third area secured as a spare area.
  • the password data of a specific user is read out from the password management means, and when the password data matches the password input by the user, the user is permitted to use the password.
  • security control means for moving the directory information stored in the second area of the external storage means to the third area is formed.
  • the security system of the information processing apparatus comprises a detecting means for detecting an abnormal state due to an external factor, and a detecting means for detecting the abnormal state.
  • Prohibiting means for prohibiting reading of data stored in the auxiliary storage device, and invalidating means for invalidating data read prohibition processing by the prohibiting means by turning on a safety switch are provided.
  • the password data of the specific user corresponding to the day of the week information or the Z and time information is compared with the password input by the user, Whether the passwords match or not is determined, but the correct password changes depending on the day of the week information or the Z and time information, thereby improving the security of the information processing device.
  • a correct password is determined depending on whether the day information or time information obtained from the time monitoring means is within the usage time period or not. Since it changes, the security of the information processing device is improved. Furthermore, when the predetermined period is divided into a plurality of time zones and the difficulty level of the password is changed depending on the time zone, for example, the difficulty level of the information processing device can be changed by changing the difficulty level of the passcode according to the risk level. Sex is improved.
  • the security system of the information processing apparatus of the second invention when the passcode data of a specific user is read from the password management means, and the password is given by the input operation of the user, The password is compared with the read password data. If these data do not match, the directory information stored in the second area of the external storage means is moved to the third area by a command from the security control means. This transfer of directory information prevents access to all files stored in the first area of the external storage device.
  • FIG. 1 is a circuit diagram showing an embodiment of the first invention
  • FIG. 2 is a flowchart showing the operation of the embodiment of the first invention
  • FIG. 3 is a flowchart showing the operation of the embodiment of the first invention
  • FIG. 1 is a flowchart showing the operation of the embodiment of the invention
  • FIG. 5 is a circuit diagram showing an embodiment of the second invention
  • FIG. 6 is a flowchart showing the operation of the embodiment of the second invention
  • FIG. 7 is an embodiment of the second invention
  • FIG. 9 is a circuit diagram showing one embodiment of the third invention
  • FIG. 10 is a circuit diagram showing one embodiment of the third invention
  • FIG. 11 is a circuit diagram showing one embodiment of the third invention
  • FIG. 12 is a circuit diagram of a hard disk drive.
  • FIG. 1 is a circuit diagram of a security system for a personal computer according to the first embodiment.
  • the first embodiment includes security control means 10 for determining whether or not use of a personal computer is permitted, backup SRAM 20 as password management means in which password data is stored, and time monitoring means for outputting day of week information and time information. It comprises a real-time clock 30, VRAM 40 storing image data and the like, and input / output means 50.
  • the security control means 10 includes a CPU 11 for issuing a command to each storage device and the input / output means 50 and a ROM 12 for storing a bus-side control program.
  • the input / output means 50 includes a keyboard device 51 for inputting a password by a user, a keyboard interface 52, a display device 53 for displaying a password input prompt, and a display controller 54.
  • step 101 a command is issued from the security control means 10 to determine whether the real-time clock 30 is operating normally (step 102). If the real-time clock 30 is not operating normally, as an error process of the real-time clock 30, for example, an error message is displayed on the display device 53, and then the system power is turned off (step 103). .
  • a prompt to input a user ID is displayed on the display device 53 according to a command from the security control means 10.
  • the user inputs a user ID registered in advance, the day of the week information is read from the real-time clock 30 according to a command from the security control means 10 (step 104).
  • the backup SRAM 20 stores one week of different password data corresponding to each user ID. Then, based on the read day of the week information, the passcode data of the day of the week is read from the backup SRAM 20 (step 105). In this reading, first, a prompt for inputting a password is displayed on the display device 53 by an instruction of the security control means 10 (step 106). The user enters the password corresponding to today's day of the week from the different passwords for one week registered in advance. Then, it is checked whether this password matches the passcode data read out in step 105 (step 107). If not, the input state of the passcode in step 1 ⁇ 6 is checked. Return to processing. If they match, the user is determined to be a legitimate qualifier and the PC is ready for use (step 108)
  • a feature of the first embodiment is that a number of passcodes corresponding to the day of the week can be registered for one user ID. The following is an example of registering this specific password.
  • a different password is registered for each day of the week.
  • the user has to enter a different password every day.
  • a different password may be registered for each time zone of each day of the week. For example, if two hours are set during business hours and outside business hours, 14 types of passcodes are registered.
  • a password for the day of work and another password. That is, in the case of a holiday, the user must enter another password after entering the workday passcode.
  • step 201 when the system power is turned on (step 201), a command is issued from the security control means 1 ⁇ to determine whether the real time clock 30 is operating normally (step 202) ⁇ real time clock 3 If 0 is not operating normally, as the error processing of the real-time clock 30, for example, an error message is displayed on the display device 53, and then the system power is turned off (step 203). If the real-time clock 30 is operating normally, the time information is read from the real-time clock 30 by the command of the security control means 10 (step 2 ⁇ 4).
  • Step 2 0 5 the time information by the current time determine available time slot if (Step 2 0 5) beta available time zone out, A message to the effect that the personal computer cannot be used is displayed on the display device 53 (step 206), and the system power of the personal computer is turned off (step 2 ⁇ 7). If the time period is within the usable time zone, a prompt to input a user ID is displayed on the display device 53 according to a command from the security control means 10. When the user inputs a user ID registered in advance, password data corresponding to the user ID is read from the backup SRAM 20 (step 208).
  • a prompt for inputting a password is displayed on the display device 53 in accordance with a command from the security control means 10 (step 209).
  • the user enters the password it is checked whether the password matches the password read out in step 208 (step 210). If the password does not match, step 2 is executed. The process returns to the password input state of 09. If they match, the user is determined to be a valid qualifier, and the personal computer is ready for use (step 211).
  • a personal computer can be easily used by using a passcode with low difficulty during working hours, and by using a password with high difficulty during working hours (at night or on holidays), it is possible to use a personal computer. Illegal entry into a personal computer. More specifically, the processing is the same as that of the above-described embodiment up to step 304 in FIG.
  • the working hours are checked in step 305. If the working hours are not during working hours, step 309 is performed. If the working hours are out of working hours, step 306 is performed. Read data is read.
  • step 09 the password data of low difficulty level is read out, and it is checked whether the password matches the password entered by the user (step 310, step 311). Then, the password data having a high degree of difficulty is read, and it is checked whether or not the password data matches the password entered by the user (step 307, step 308). If they match, the user is determined to be a legitimate qualifier, and the personal computer can be used (step 312).
  • passwords having different degrees of difficulty are used between working hours and non-working hours.
  • Other examples include the following. First, an example is shown in which a character string is added after the pass during the working hours to create a pass during the non-work hours. In this example, the password during off-hours is a long character string, increasing the difficulty.
  • FIG. 5 is a circuit diagram of a personal computer security system according to the first embodiment of the second invention.
  • security control means 10 for deciding whether to use a personal computer, RAM 60 containing various application programs, and backup SRAM 20 serving as password management means storing password data are provided. And a VRAM 40 in which image data and the like are stored, an external storage means 70 in which a plurality of files are stored, and an input / output means 50.
  • the security control means 10 includes a CPU 11 for issuing a command to each storage device and the input / output means 50 and a ROM 12 for storing a control program.
  • the external storage means 70 includes a large-capacity hard disk drive 71 storing a plurality of files, a hard disk controller (HDC) 72, and a small-capacity floppy disk drive storing a plurality of files. 73 and a floppy disk controller (FDC) 74.
  • the input / output means 5 include a keyboard device 51 for the user to input a password, a keyboard interface 52 and a display device 53 for displaying a password input prompt, and a display controller 54. Is provided.
  • the password management means may use an EEPROM or a ROM instead of the backup SRAM.
  • a prompt to input a user ID is displayed on the display device 53 according to a command from the security control means 1 ⁇ .
  • the password data corresponding to the user ID is read from the backup SRAM 2 ⁇ (step 402).
  • a prompt for inputting a password is displayed on the display device 53 according to a command from the security control means 10.
  • Step 403 it is checked whether or not this password matches the password data read in Step 402 (Step 404). If they do not match, the directory information is saved from the directory area, which is the second area of the hard disk drive 71, to the reserve area (step 405). This reserve area is a third area of the hard disk device 71 reserved as a spare area. After saving the directory information, the directory area destruction flag is set to "1" (step 406).
  • the directory area destruction flag is, for example, a flag that is placed in the backup SRAM 20 and records the state of the directory information in the directory area. In other words, when the directory area destruction flag is set to "0", it indicates that directory information exists and the directory area is destroyed.
  • the destruction flag When the destruction flag is set to "1", it indicates that the directory information has been deleted.
  • the directory information in the directory area is deleted (step 407). O
  • the files stored in the first area of the hard disk drive 71 are accessed based on the directory information. Deletion of directory information makes access to the file impossible. By such processing, ⁇ ,.
  • the computer is error-activated when the hard disk device 71 cannot be used (step 408). Thereafter, the user can use the personal computer except for the file access of the hard disk device 71.
  • NO. If the speed and the password data match, check whether "0" is set in the directory area destruction flag (step 409). 0
  • the directory area destruction flag is set to "0".
  • Step 410 If it is not "0", the directory information saved in the reserved area is restored (Step 410), and the directory area destruction flag is cleared to "0" (Step 411). On the basis of the directory information restored in the above, files of the hard disk device 71 can be accessed thereafter. Then, the personal computer is started normally (step 4 12), and the user can use the personal computer including the hard disk drive 71.
  • a feature of the present embodiment is that a user who does not know the passcode can use the PC under certain restrictions.
  • the personal computer of this embodiment can access only the confidential data stored in the hard disk device 71 by a specific person.
  • other basic functions are devised so that anyone can use them.
  • the usage environment of a specific user and the usage environment of other users are provided on a single personal computer at different service levels. Such a function is desirable from the viewpoint of effective use of personal computers.
  • step 501 when the system power is turned on (step 501), a prompt for inputting a user ID is displayed on the display device 53 according to a command from the security control means 10.
  • a password corresponding to this user ID is read from the backup SRAM 20 (step 502).
  • the password input is set to iS according to the instruction of the security control means 10.
  • Prompt is displayed on the display device 53.
  • the user inputs a password registered in advance (step 503). 0, and checks whether the password matches the password read out in step 502 (step 504). If not, for example, a block game is started as a dummy program (step 505).
  • the execution time of this game program is counted (step 506), and when the release key is pressed from the keyboard 61 within a predetermined time to stop the game program (step 507), the step 50 Pass 3 is re-executed from the password input. If a legitimate user mistakenly performs an operation and enters a different passcode, he or she knows that the dummy program will be started, so the release key must be pressed within a predetermined time. Can be.
  • the release key is a specific key of the keyboard device 51 that is negotiated between users.
  • step 507 If this is the case when an illegal third party who is not the user enters a different password, a predetermined time elapses while hesitates to suddenly start this game program, and the disk drive All the files stored in 71 are erased (step 507). By this process, even if a third party subsequently enters the correct password and can use the personal computer, the file stored in the hard disk drive 71 cannot be accessed. If the password and the password data match in step 504, the system is normally started (step 509), and the subsequent users can use the personal computer.
  • the ability to erase all files stored in the disk drive 71 is not required. Unlike the first embodiment, the file is not erased, and the directory is deleted. Information can also be saved to the reserve to allow legitimate users to restart.
  • security measures are applied to the files stored in the hard disk device 71, but security measures can be similarly applied to the files stored in the floppy disk device 73. .
  • FIG. 8 is a circuit diagram of an embodiment of the present invention.
  • the hard disk controller (hereinafter referred to as HD) that operates according to the command of CPU 11 72), a built-in hard disk device 90, a gun contact cable 80 connecting the HDC 72 and the hard disk device 90, and a power supply device 120.
  • the gun contact cable 80 includes a cable 81 and a connector 82 connected to the HDC 72 side, and a cable 83 and a connector 84 connected to the hard disk device 90 side. A part of the cable 81 is provided with a loop wire 85.
  • the hard disk device 90 includes a control device 91, a detection terminal 93 connected to the control device 91 by a signal line 92, and a voltage of the detection terminal 93 converted to a high-level voltage which is a power supply voltage.
  • the operating unit 100 includes a magnetic disk 101 on which data is stored, a spindle motor 102 for rotating the magnetic disk 101, and a spindle motor drive circuit 10 for controlling the spindle motor 102.
  • a magnetic head 104 that moves on the magnetic disk 101 to write and read data, and a read head that gives a write or read command to the magnetic head 104.
  • Head circuit 105, a head moving motor 106 for moving the magnetic head 104 onto a desired magnetic disk 101, and a head moving motor drive circuit 10 for controlling this movement. 7 are provided.
  • the backup power supply device 11 ⁇ is provided with a built-in battery 1 1 1 and a switching device 1 1 2 for switching between the built-in battery 1 1 1 and the power supply device 1 20.
  • a cable 83 and a signal line 92 are connected to the detection terminal 93, respectively.
  • the detection terminal 93 and the ground terminal 95 are electrically connected via the loop wire 85. Therefore, a current flows between the detection terminal 93 and the ground terminal 95 due to the high-level voltage applied to the detection terminal 93, and the potential of the detection terminal 93 decreases. Due to the lowering of the potential at the detection terminal 93, a low-level signal is supplied to the controller 91 through the signal line 92.
  • step 91 the voltage signal supplied from the signal line 92 is detected to change from a single level to a high level, and all circuits stored in the magnetic disk 1 ⁇ 1 are stored in each circuit of the operating section 100. Give a command to erase the data.
  • the switching unit 1 12 of the backup power supply unit 110 Since the mode is switched to the battery 111, power is supplied to the operating part 100 from the internal battery 111, so that data can be reliably erased.
  • the signal line 86 extending from the detection terminal 93 is directly connected to the external terminal 130.
  • One end of a lock chain 13 1 is connected to the external terminal 130, and the other end of the lock chain 13 1 is tied to a leg of a desk 72 that is grounded.
  • the lock tune 13 1 is tied to the legs of the desk 13 2
  • the signal line 86 and the lock tune 1 3 1 are connected from the detection terminal 93 to which a high-level voltage is applied. And the current flows.
  • FIG. 11A is a cross-sectional view showing a state where the cover 102 is attached to the housing 151 of the personal computer and fixed with the screws 103. When the cover 102 is thus attached, the microswitch 141 fixed to the housing 151 holds the closed state.
  • the micro switch 14 1 when the cover 15 1 of the housing is fixed, the micro switch 14 1 is in the closed state, and the detection means 140 has a high level. A signal is provided. The detection means 140 supplies a low-level signal to the control device 91 in correspondence with this signal. Next, when the screw 1 ⁇ 3 is removed from the housing and the cover 15 1 is removed, the micro switch 14 1 is cut off. In this state, a low-level signal is supplied to the detection means 140. The detection means 140 supplies a high-level signal to the control device 91 in correspondence with this signal. The control unit 91 detects that the voltage signal changes from low level to high level, and erases all data stored in the magnetic disk 1 ⁇ 1 in each circuit of the operation unit 100. Command.
  • the safety key 14 2 can be switched between a locked state and an unlocked state by inserting and turning a dedicated key.
  • the lip state is a state in which data is erased when the cover 152 is removed from the housing 151 as described above.
  • the unlocked state is a state in which data is not erased even when the cover 15 2 is removed from the housing 15 1. Therefore, if the user needs to remove the cover 15 2 from the housing 15 1 due to repair, etc., put the safety key 1 4 2 in the unlocked state and then remove the cover 15 2 Is performed, the data stored on the magnetic disk 101 is not erased.
  • FIG. 12 shows a circuit diagram of a disk drive # 70 to which the data leakage prevention method is applied.
  • the difference from the hard disk device 90 from FIG. 8 to FIG. 1 ° is that a dedicated coil 17 1 is wound around the magnetic head 104, and this dedicated coil 17 1 is connected to the backup power supply 110. It is connected.
  • a large current flows through the dedicated coil 17 1 according to a command from the control device 91. This large current burns out the magnetic head 104, making subsequent data access impossible.
  • the password is different for each day of the week. Access can be blocked.
  • the information processing device security system of the second invention if a third party uses the information processing device by inputting an incorrect password, the file stored in the hard disk device cannot be accessed. Therefore, confidential information stored in the hard disk device can be reliably protected.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

Système de sécurité comprenant un moyen de gestion de mot de passe destiné à stocker des données de mot de passe pour chaque utilisateur, un moyen de contrôle de l'heure destiné à fournir des informations relatives à l'heure et au jour, ainsi qu'un moyen de contrôle de sécurité destiné à lire les données de mot de passe correspondant aux informations obtenues à partir du moyen de contrôle d'heure parmi celles d'un utilisateur donné, et à comparer les données de mot de passe avec celles introduites par l'utilisateur, ledit moyen de contrôle déterminant également si l'emploi par l'utilisateur est autorisé ou non.
PCT/JP1991/001631 1990-11-29 1991-11-25 Systeme de securite WO1992009946A1 (fr)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
JP2/331533 1990-11-29
JP33153490 1990-11-29
JP2/331534 1990-11-29
JP33153390 1990-11-29
JP2/335729 1990-11-30
JP33572990 1990-11-30

Publications (1)

Publication Number Publication Date
WO1992009946A1 true WO1992009946A1 (fr) 1992-06-11

Family

ID=27340493

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP1991/001631 WO1992009946A1 (fr) 1990-11-29 1991-11-25 Systeme de securite

Country Status (1)

Country Link
WO (1) WO1992009946A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0604147A2 (fr) * 1992-12-23 1994-06-29 Neopost Limited Machine d'affranchissement et procédé pour affranchir
US6925644B2 (en) 1996-10-11 2005-08-02 Sun Microsystems, Inc. Method, apparatus, and product for leasing of group membership in a distributed system
JP2006054581A (ja) * 2004-08-10 2006-02-23 Fujitsu Ltd キーロック制御方法、電子装置及びコンピュータプログラム
JP2006524861A (ja) * 2003-03-18 2006-11-02 エンスコンス データ テクノロジー デッド・オン・デマンドディスク技術
JP2010039823A (ja) * 2008-08-06 2010-02-18 Denso Wave Inc 情報端末装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS58109953A (ja) * 1981-12-23 1983-06-30 Fujitsu Ltd フロツピイデイスク・ボリユ−ムの機密保護処理方式
JPS60176157A (ja) * 1984-02-23 1985-09-10 Fujitsu Ltd タイムロツクによる機密保護方式
JPS63234340A (ja) * 1987-03-23 1988-09-29 Omron Tateisi Electronics Co デ−タ盗難防止機能を有する電子機器
JPS647331U (fr) * 1987-07-02 1989-01-17
JPH02116924A (ja) * 1988-10-27 1990-05-01 Hitachi Maxell Ltd データ秘密保護方式

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS58109953A (ja) * 1981-12-23 1983-06-30 Fujitsu Ltd フロツピイデイスク・ボリユ−ムの機密保護処理方式
JPS60176157A (ja) * 1984-02-23 1985-09-10 Fujitsu Ltd タイムロツクによる機密保護方式
JPS63234340A (ja) * 1987-03-23 1988-09-29 Omron Tateisi Electronics Co デ−タ盗難防止機能を有する電子機器
JPS647331U (fr) * 1987-07-02 1989-01-17
JPH02116924A (ja) * 1988-10-27 1990-05-01 Hitachi Maxell Ltd データ秘密保護方式

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0604147A2 (fr) * 1992-12-23 1994-06-29 Neopost Limited Machine d'affranchissement et procédé pour affranchir
EP0604147A3 (fr) * 1992-12-23 1994-12-28 Neopost Ltd Machine d'affranchissement et procédé pour affranchir.
US6925644B2 (en) 1996-10-11 2005-08-02 Sun Microsystems, Inc. Method, apparatus, and product for leasing of group membership in a distributed system
JP2006524861A (ja) * 2003-03-18 2006-11-02 エンスコンス データ テクノロジー デッド・オン・デマンドディスク技術
JP2006054581A (ja) * 2004-08-10 2006-02-23 Fujitsu Ltd キーロック制御方法、電子装置及びコンピュータプログラム
JP2010039823A (ja) * 2008-08-06 2010-02-18 Denso Wave Inc 情報端末装置

Similar Documents

Publication Publication Date Title
US9154499B2 (en) Offline data delete with false trigger protection
US6167519A (en) Secret information protection system
US7099110B2 (en) Dead on demand disk technology
US20080219122A1 (en) Dead on demand technology
US20100281546A1 (en) Data loss and theft protection method
JP5505010B2 (ja) 記憶媒体アダプタ及びデータアクセス不能化方法
US20020049881A1 (en) Information processing apparatus, information processing apparatus control method and storage medium
JPH0833914B2 (ja) スマートカードのロック方法
US8721738B1 (en) System and method for ensuring security of data stored on data storage devices
US5838793A (en) Controlling movement of owned parts
US8528105B1 (en) System and method for ensuring security of data stored on electronic computing devices
WO1992009946A1 (fr) Systeme de securite
CN111832084A (zh) 基板管理控制器的固件保护系统以及方法
JP2009301539A (ja) セキュリティシステム
JP2005293282A (ja) 情報処理装置、情報処理装置の起動方法および情報処理装置の起動プログラム
US20030041260A1 (en) Security protection system for identifying a user who uses an electronic device
JP2003208234A (ja) ソフトウェア記録部分離型情報処理装置及びソフトウェア管理方法
JP2015079525A (ja) 可搬型記憶媒体用アダプタ及びデータアクセス不能化方法
JPH06309214A (ja) データベースシステム
JP2003345657A (ja) 記録媒体の読み出し・書き込み方式及び消去方式及び該読み出し・書き込み方式及び消去方式を実現する記録媒体
JPH0391047A (ja) 情報処理システム
JP5662600B2 (ja) 可搬型記憶媒体用アダプタ及びデータアクセス不能化方法
JP4794618B2 (ja) 情報処理装置、情報処理装置制御方法及び記憶媒体
JP4256880B2 (ja) 情報処理装置、情報処理装置制御方法及び記憶媒体
KR100578116B1 (ko) 저장 장치에 저장된 데이터의 보안 기능을 구비한 컴퓨터 시스템 및 방법

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IT LU NL SE

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载