Nothing Special   »   [go: up one dir, main page]

JP2004164093A - Security system for computer - Google Patents

Security system for computer Download PDF

Info

Publication number
JP2004164093A
JP2004164093A JP2002326943A JP2002326943A JP2004164093A JP 2004164093 A JP2004164093 A JP 2004164093A JP 2002326943 A JP2002326943 A JP 2002326943A JP 2002326943 A JP2002326943 A JP 2002326943A JP 2004164093 A JP2004164093 A JP 2004164093A
Authority
JP
Japan
Prior art keywords
computer
satisfied
unit
security system
telephone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2002326943A
Other languages
Japanese (ja)
Inventor
Wataru Sato
渉 佐藤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TERA KK
Original Assignee
TERA KK
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TERA KK filed Critical TERA KK
Priority to JP2002326943A priority Critical patent/JP2004164093A/en
Priority to AU2003301925A priority patent/AU2003301925A1/en
Priority to PCT/JP2003/014308 priority patent/WO2004044714A1/en
Publication of JP2004164093A publication Critical patent/JP2004164093A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

<P>PROBLEM TO BE SOLVED: To provide a security system which can create a usable or unusable state of a computer, which is being used, by meas of a easier method. <P>SOLUTION: Data showing a numerical value peculiarly given to a cellular phone machine KT connected to the computer, which is provided with an input unit 1, a storage unit 2, a processing unit 3 and an output unit 4, is stored in the storage unit 2. When the cellular phone machine KT is connected to the computer, the arithmetic unit 3b of the above processing unit determines whether the peculiar numerical value data are satisfied with the peculiar numerical value data of the storage unit 2 under a logical product condition. When the above condition is satisfied, the control unit 3a of the processing unit 3 enables the input unit 4 or output unit to keep it in an operative state. When the cellular phone machine KT is disconnected and the logical product condition is not satisfied, at least the input unit 1 or output unit 4 is switched to an inoperative state. <P>COPYRIGHT: (C)2004,JPO

Description

【0001】
【発明の属する技術分野】
本発明はオフィス等で使用されるパーソナルコンピュータ等のコンピュータ(以下、単にパソコンという)のセキュリティシステムに関する。
【0002】
【従来の技術】
昨今のオフィス等においては一人に少なくとも一台のパソコンを使用することが当り前の状況になり、パソコン抜きでオフィス等におけるあらゆる業務の逐行は考えられないほどになっている。
【0003】
オフィス等において各人が夫々に一台以上のパソコンを使用する環境では、例えば昼食時などの外出時に自分のパソコンからその使用者(所有者)が離れてしまうと、当該パソコンの使用者ではない第三者であっても、例えばそのパソコン画面に表示されている内容を閲覧可能であることは勿論、記憶装置に格納されているファイル等のデータを勝手に引出して閲覧したり、書込みをしたり、或は、プリントアウトすることなどが可能となる。
【0004】
従来、上記のような事態を防ぐには、パソコンからその使用者が離れるとき、パソコンを停止して外出するなどしているが、パソコンから離れる度に当該パソコンを停止したり、戻る度に立上げることは煩しいのみならず、思わぬ動作トラブルの原因にもなり易い。
【0005】
また、単にパソコンを停止しているだけでは、第三者が勝手にそのパソコンを立ち上げることができるので、勝手にファイルの内容を読まれたり、コピーされてしまうおそれがり、しかも、その根跡は残らないため、パソコン内に格納されている様々な情報の機密保持の面でも至って心もとないのが現状である。
【0006】
上記のような点に鑑み、所定手順を踏む、例えばパスワードを入力しなければ、パソコンの立上げはできてもそれ以上の操作を出来ないようにしたパソコン用の専用ソフトも提供されているが、このソフトでは、本人であってもパソコン立上げの度、パスワードの入力操作を不可欠とするため、余り合理的とはいえない面がある。また、パソコンの起動に指紋や専用キーを利用するようにしたものもあるが、指紋を利用する場合には、パソコンのハード構成に指紋読取機構などの付属機能を不可欠とするため、それがパソコン価格を押上げ、一方、専用キーの場合には紛失のおそれが多いため、キーを失った場合の対応に問題が残っているなど、実用上の難点が多い。
【0007】
【発明が解決しようとする課題】
本発明は以上のようなパソコンのセキュリティ状況に鑑み、もっと手軽な手法により、使用しているパソコンの使用可,使用不可の状況を創成することができるセキュリティシステムを提供することを、その課題とする。
【0008】
【課題を解決するための手段】
上記課題を解決することを目的としてなされた本発明パソコンセキュリティ方式の構成は、入力装置,記憶装置,処理装置,出力装置を有するコンピュータの記憶装置に、そのコンピュータに接続される携帯電話機に付与された固有数値を示すデータを記憶させておき、前記電話機が前記コンピュータに接続されたとき、その固有数値データが前記記憶装置の固有数値データと論理積条件で満たされるか否かを前記処理装置の演算装置で判別させ、前記条件が満たされるときには前記処理装置の制御装置が前記入力装置又は出力装置を動作状態に保持させ、前記電話機の接続が切れて前記論理積条件が満たされないとき、少なくとも前記入力装置又は出力装置を不作動状態に切換えることを特徴とするものである。
【0009】
上記の制御装置は、携帯電話機が接続されるとその電話機からその固有数値データを演算装置に取込ませ、予め記憶装置に設定されている同一の固有数値データと前記取込みデータが適宜インターバルで論理積条件を満足しているか否かを演算装置で演算処理させ、前記条件を満足しているときは動作状態の保持指令を出力すると共に、前記電話機の接続が切れて前記条件が満たされないときは不動作状態への切換指令を出力するように形成されている。
【0010】
【発明の実施の形態】
次に本発明の実施の形態例について、図を参照して説明する。図1は本発明セキュリティシステムを導入したパソコンの構成例を模式的に示したブロック図、図2は本発明セキュリティシステムの要部のブロック図、図3は本発明セキュリティシステムの動作例のフロー図である。
【0011】
図1はパソコンを含むコンピュータの基本構成を模式的に示したもので、1はキーボードやディスクリーダやプレーヤ等により外部からデータやコマンドを入力するための入力装置、2は、ハードディスク等の主記憶装置2aとメモリ等の補助記憶装置2bを具備した記憶装置で、入力したデータやプログラムが格納される。また、記憶装置2は、命令語を取出したり、演算するデータを取出し、演算結果を記憶する機能をもっている。3はCPUなどを主体に形成された制御装置3aと演算装置3bを主体に構成される処理装置で、制御装置3aはコンピュータ全体を制御し、演算装置3bは必要な演算を実行する。4は液晶画面,プリンタ,スピーカなどにより形成される出力装置である。図1において、実線はデータの流れを示し、波線は制御信号の流れを表わしている。
【0012】
上記のコンピュータにおいて、本発明ではCOMポートやUSBポートなどの接続口Pに、携帯電話機KTにおける外部接続端子Kaに接続された接続ケーブルCaを接続することにより、その電話機に固有の数値データとして付与されている固有数値、或は、その電話機の電話番号を示す数値(以下、前記数値を「固有データ」という)を、記憶装置2に取込ませる。前記電話機の固有データは無線により記憶装置に取込ませてもよい。
【0013】
一方、制御装置3aは、先に記憶装置2に取込まれた固有データと、いま実際に前記携帯電話機KTを接続ケーブルCaによりこのコンピュータに接続したとき、当該コンピュータにいま取込まれる固有データとを、演算装置3bにおいて、任意に設定できるインターバル、例えば5秒のサンプリング周期で、常時、両方の固有データがあるか否かを演算させ、双方の固有データが揃っていれば、少なくとも入力装置1、又は/及び、出力装置4を動作可能状態に保持させる制御信号を、当該入力装置1と出力装置4に供給する。なお、サンプリング周期は、勿論5秒以外であってもよい。
【0014】
他方、携帯電話機KTとコンピュータの上記接続が解かれる、即ち、接続ケーブルCaから前記電話機KTが抜去され、そのままであったり、異なる電話機が接続されると、演算装置3bでは固有データの論理積条件が満たされないことになる。この場合、制御装置3aは前記入力装置1と出力装置4に、その動作可能状態を解く制御信号を出力して、当該入力装置1と出力装置4を、動作しない状態に切換える。
【0015】
上記動作は、図3のフローチャート図に示す順序で進む。ステップS1で固有データ(携帯電話機KTに固有の番号を示す数値)が当該電話機KTからパソコンに取込まれ、記憶装置2に記憶される。ステップS2では、前記電話機KTがケーブルCaに接続されていて、そこから固有データがパソコンに供給されるか否かが判別され、接続されず固有データがパソコンに入力されないと、ステップS3のパソコン終了を含む「パソコンロック」モードになる。
【0016】
前記電話機KTがケーブルCaを介してパソコンに接続されていると、その電話機KTから固有コードがパソコンに供給されるから次のステップS4に進む。ステップS4では、先にパソコン内に設定された前記電話機KTの固有データが、ケーブルCaを通して入力されて来るその電話機KTの固有データと一致するか否かが判別され、不一致であれば直ちにステップS3のパソコン終了を含む「パソコンロック」モードに進むが、一致している場合には、パソコンの立上げ状態を維持するステップS5に進んでからステップS4に戻り、これを設定したサンプリング周期で繰返す。
【0017】
以上の結果、上記コンピュータは携帯電話機KTがケーブルCa等でそのコンピュータ接続されている限り、通常のコンピュータと同様に自由にそのコンピュータを操作し、駆動させることができるが、携帯電話機KTがコンピュータから切り離されると、少なくとも入力装置1及び/又は出力装置4の動作可能状態が作動不能の状態に切換えられるから、前記携帯電話機KTを保持している本人以外の第三者がこのコンピュータを起動させたり、操作することはできなくなる。仮に、別の携帯電話機KTを空いている前記コードCaに接続しても、コンピュータ内に設定されている固有データと電話機KTからの固有データが一致しないので、コンピュータが作動可能になることはない。
【0018】
つまり、本発明セキュリティシステムにおける携帯電話機KTは、それが持っている固有データを、パスワードやキーワードなどをキーとするコンピュータのロック手段と同様のロック手段を構成することになるのである。
【0019】
従って、昼食時等の外出時や出張時など、本人が自分のコンピュータから離れるとき、当該本人の携帯電話機KTを、当該コンピュータとの接続を解くだけで、そのコンピュータを動作不可能状態に設定できるので、そのコンピュータに格納されている様々なデータを安全裡に保守することが可能になる。
【0020】
【発明の効果】
本発明は以上の通りであるから、至って簡便な手法で自分のコンピュータのセキュリティを強固に保持することが可能になり、有用性はきわめて高い。
【図面の簡単な説明】
【図1】本発明セキュリティシステムを導入したパソコンの構成例を模式的に示したブロック図
【図2】本発明セキュリティシステムの要部のブロック図
【図3】本発明セキュリティシステムの動作例のフロー図
【符号の説明】
1 入力装置
2 記憶装置
2a 主記憶装置
2b 補助記憶装置
3 処理装置
3a 制御装置
3b 演算装置
4 出力装置
KT 携帯電話機
Ca 接続ケーブル
[0001]
TECHNICAL FIELD OF THE INVENTION
The present invention relates to a security system for a computer (hereinafter, simply referred to as a personal computer) such as a personal computer used in an office or the like.
[0002]
[Prior art]
In offices and the like these days, it has become commonplace to use at least one personal computer per person, and it is impossible to imagine all business operations in an office or the like without a personal computer.
[0003]
In an environment where each person uses one or more personal computers in an office or the like, if the user (owner) leaves his / her personal computer when going out, for example, at lunch, the user is not the user of the personal computer. Even a third party can, for example, view the contents displayed on the personal computer screen, as well as view and write data such as files stored in the storage device without permission. Or print out.
[0004]
Conventionally, in order to prevent the above situation, when the user leaves the personal computer, the computer is stopped and the user goes out.However, every time the user leaves the personal computer, the personal computer must be stopped or returned. Raising is not only troublesome, but also tends to cause unexpected operation troubles.
[0005]
Also, simply shutting down the personal computer will allow a third party to start up the personal computer without permission, so there is a risk that the contents of the file will be read or copied without permission. At present, there is no concern about maintaining the confidentiality of various information stored in personal computers.
[0006]
In view of the above points, dedicated software for personal computers has been provided which takes a predetermined procedure, for example, if the user does not enter a password, the computer can be started up but no further operation can be performed. However, with this software, even if the person himself / herself has to enter a password every time the personal computer is started up, there is a face that is not very reasonable. Some computers use a fingerprint or a dedicated key to start up a personal computer.However, if a fingerprint is used, it is essential that the hardware features of the personal computer include accessory functions such as a fingerprint reading mechanism. On the other hand, there are many practical difficulties, such as raising the price and using a dedicated key, which is likely to be lost.
[0007]
[Problems to be solved by the invention]
An object of the present invention is to provide a security system capable of creating a usable / unusable situation of a personal computer in use by a simpler method in view of the security situation of a personal computer as described above. I do.
[0008]
[Means for Solving the Problems]
The configuration of the personal computer security system of the present invention, which has been made to solve the above problems, is provided to a storage device of a computer having an input device, a storage device, a processing device, and an output device, and to a mobile phone connected to the computer. Data indicating the unique numerical value stored in the storage device, and when the telephone is connected to the computer, it is determined whether or not the unique numeric data is satisfied with the unique numeric data of the storage device by an AND condition. When the condition is satisfied, the control device of the processing device causes the input device or the output device to be kept in an operating state, and when the connection of the telephone is disconnected and the logical product condition is not satisfied, at least the The input device or the output device is switched to an inoperative state.
[0009]
When the mobile phone is connected, the control device causes the arithmetic device to fetch the unique numeric data from the phone, and the same unique numeric data set in the storage device in advance and the fetched data are logically changed at appropriate intervals. The arithmetic unit performs arithmetic processing on whether or not the product condition is satisfied.If the condition is satisfied, an operation state holding instruction is output.If the condition is not satisfied due to disconnection of the telephone, It is configured to output a command to switch to a non-operation state.
[0010]
BEST MODE FOR CARRYING OUT THE INVENTION
Next, an embodiment of the present invention will be described with reference to the drawings. FIG. 1 is a block diagram schematically showing a configuration example of a personal computer in which the security system of the present invention is introduced, FIG. 2 is a block diagram of a main part of the security system of the present invention, and FIG. 3 is a flowchart of an operation example of the security system of the present invention. It is.
[0011]
FIG. 1 schematically shows a basic configuration of a computer including a personal computer. 1 is an input device for inputting data and commands from the outside by a keyboard, a disk reader, a player or the like, and 2 is a main memory such as a hard disk. A storage device including the device 2a and an auxiliary storage device 2b such as a memory stores input data and programs. Further, the storage device 2 has a function of taking out a command word, taking out data to be operated on, and storing an operation result. Reference numeral 3 denotes a processing device mainly composed of a control device 3a mainly composed of a CPU and the like and an arithmetic device 3b. The control device 3a controls the entire computer, and the arithmetic device 3b executes necessary calculations. Reference numeral 4 denotes an output device formed by a liquid crystal screen, a printer, a speaker, and the like. In FIG. 1, a solid line indicates a flow of data, and a dashed line indicates a flow of a control signal.
[0012]
In the above-mentioned computer, in the present invention, by connecting a connection cable Ca connected to an external connection terminal Ka of the mobile phone KT to a connection port P such as a COM port or a USB port, it is given as numerical data unique to the phone. The stored unique number, or a numerical value indicating the telephone number of the telephone (hereinafter referred to as “unique data”) is stored in the storage device 2. The unique data of the telephone may be stored in a storage device by wireless.
[0013]
On the other hand, the control device 3a stores the unique data that has been previously taken into the storage device 2 and the unique data that is currently taken into the computer when the portable telephone KT is actually connected to the computer via the connection cable Ca. Is always calculated in the arithmetic device 3b at an interval that can be arbitrarily set, for example, at a sampling period of 5 seconds, to determine whether or not there is both unique data. And / or a control signal for keeping the output device 4 operable is supplied to the input device 1 and the output device 4. The sampling cycle may be other than 5 seconds.
[0014]
On the other hand, if the connection between the mobile phone KT and the computer is released, that is, if the phone KT is disconnected from the connection cable Ca and is left as it is or a different phone is connected, the arithmetic unit 3b sets the logical product condition of the unique data. Will not be satisfied. In this case, the control device 3a outputs a control signal for releasing the operable state to the input device 1 and the output device 4, and switches the input device 1 and the output device 4 to a non-operable state.
[0015]
The above operation proceeds in the order shown in the flowchart of FIG. In step S 1, unique data (a numerical value indicating a number unique to the mobile phone KT) is taken from the phone KT to a personal computer and stored in the storage device 2. In step S2, it is determined whether or not the telephone KT is connected to the cable Ca, and whether or not the unique data is supplied to the personal computer from the cable Ca. It becomes "PC lock" mode including.
[0016]
If the telephone KT is connected to the personal computer via the cable Ca, the unique code is supplied from the telephone KT to the personal computer, so that the process proceeds to the next step S4. In step S4, it is determined whether or not the unique data of the telephone set KT previously set in the personal computer matches the unique data of the telephone set KT inputted through the cable Ca. The process proceeds to the "PC lock" mode including the termination of the PC. If they match, the process proceeds to step S5 for maintaining the start-up state of the PC, then returns to step S4, and repeats this at the set sampling period.
[0017]
As a result, as long as the mobile phone KT is connected to the computer by the cable Ca or the like, the computer can operate and drive the computer freely like a normal computer. When disconnected, at least the operable state of the input device 1 and / or the output device 4 is switched to the inoperable state, so that a third party other than the person holding the mobile phone KT may start the computer. , Can not be operated. Even if another portable telephone KT is connected to the vacant code Ca, since the unique data set in the computer and the unique data from the telephone KT do not match, the computer cannot be operated. .
[0018]
In other words, the mobile phone KT in the security system of the present invention constitutes a lock unit similar to a lock unit of a computer using the unique data of the mobile phone KT as a key using a password, a keyword, or the like.
[0019]
Therefore, when the person leaves his or her computer, such as when going out for lunch or when traveling, he / she can set his / her mobile phone KT to an inoperable state only by disconnecting the connection with the computer. Therefore, various data stored in the computer can be maintained safely.
[0020]
【The invention's effect】
Since the present invention is as described above, it is possible to firmly maintain the security of its own computer by a very simple method, and its usefulness is extremely high.
[Brief description of the drawings]
FIG. 1 is a block diagram schematically showing a configuration example of a personal computer in which the security system of the present invention is introduced. FIG. 2 is a block diagram of a main part of the security system of the present invention. FIG. 3 is a flowchart of an operation example of the security system of the present invention. Figure [Explanation of symbols]
Reference Signs List 1 input device 2 storage device 2a main storage device 2b auxiliary storage device 3 processing device 3a control device 3b arithmetic device 4 output device KT mobile phone Ca connection cable

Claims (2)

入力装置,記憶装置,処理装置,出力装置を有するコンピュータの記憶装置に、そのコンピュータに接続される携帯電話機に付与された固有数値を示すデータを記憶させておき、前記電話機が前記コンピュータに接続されたとき、その固有数値データが前記記憶装置の固有数値データと論理積条件で満たされるか否かを前記処理装置の演算装置で判別させ、前記条件が満たされるときには前記処理装置の制御装置が前記入力装置又は出力装置を動作状態に保持させ、前記電話機の接続が切れて前記論理積条件が満たされないとき、少なくとも前記入力装置又は出力装置を不作動状態に切換えることを特徴とするコンピュータのセキュリティシステム。A storage device of a computer having an input device, a storage device, a processing device, and an output device stores data indicating a unique numerical value assigned to a mobile phone connected to the computer, and the phone is connected to the computer. When the unique numerical data is satisfied by the logical product condition with the unique numerical data of the storage device, the arithmetic unit of the processing device determines whether or not the control device of the processing device determines that the condition is satisfied. A computer security system wherein an input device or an output device is held in an operating state, and at least the input device or the output device is switched to an inactive state when the connection of the telephone is disconnected and the AND condition is not satisfied. . 制御装置は、携帯電話機が接続されるとその電話機からその固有数値データを演算装置に取込ませ、予め記憶装置に設定されている同一の固有数値データと前記取込みデータが適宜インターバルで論理積条件を満足しているか否かを演算装置で演算処理させ、前記条件を満足しているときは動作状態の保持指令を出力すると共に、前記電話機の接続が切れて前記条件が満たされないときは不動作状態への切換指令を出力するように形成した請求項1のコンピュータのセキュリティシステム。When the portable telephone is connected, the control device causes the telephone to capture the unique numerical data into the arithmetic unit, and the same unique numerical data set in advance in the storage device and the captured data are logically ANDed at appropriate intervals. The arithmetic device performs an arithmetic process to determine whether or not the above condition is satisfied.If the above condition is satisfied, an operation state holding command is output, and if the above condition is not satisfied due to disconnection of the telephone, no operation is performed. 2. The computer security system according to claim 1, wherein the computer security system is configured to output a command to switch to a state.
JP2002326943A 2002-11-11 2002-11-11 Security system for computer Pending JP2004164093A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2002326943A JP2004164093A (en) 2002-11-11 2002-11-11 Security system for computer
AU2003301925A AU2003301925A1 (en) 2002-11-11 2003-11-11 Computer security system
PCT/JP2003/014308 WO2004044714A1 (en) 2002-11-11 2003-11-11 Computer security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2002326943A JP2004164093A (en) 2002-11-11 2002-11-11 Security system for computer

Publications (1)

Publication Number Publication Date
JP2004164093A true JP2004164093A (en) 2004-06-10

Family

ID=32310508

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2002326943A Pending JP2004164093A (en) 2002-11-11 2002-11-11 Security system for computer

Country Status (3)

Country Link
JP (1) JP2004164093A (en)
AU (1) AU2003301925A1 (en)
WO (1) WO2004044714A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006285965A (en) * 2005-03-31 2006-10-19 Microsoft Corp Method and system for unlocking computer device
JP2007087193A (en) * 2005-09-22 2007-04-05 Kddi Corp Security protection program, security system, and recording medium
JP2008219469A (en) * 2007-03-05 2008-09-18 Mitsubishi Electric Corp System for preventing secret leakage
WO2009131130A1 (en) * 2008-04-23 2009-10-29 日本電気株式会社 Information processing system, information processing device, mobile communication device, and method for managing user information used for them

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0594225A (en) * 1991-09-30 1993-04-16 Toshiba Corp Personal computer incorporated with security function
JP2001084049A (en) * 1999-09-09 2001-03-30 Canon Inc Computer and security method for computer
JP2001223691A (en) * 2000-02-04 2001-08-17 Sony Corp Information processing system, information processing unit and its method, program storage medium and transmitter
JP2002135372A (en) * 2000-10-20 2002-05-10 Okazaki Toru Personal computer in cooperation with mobile phone
JP3467248B2 (en) * 2000-11-17 2003-11-17 エヌイーシーシステムテクノロジー株式会社 Computer automatic recognition system using IC card

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006285965A (en) * 2005-03-31 2006-10-19 Microsoft Corp Method and system for unlocking computer device
JP2007087193A (en) * 2005-09-22 2007-04-05 Kddi Corp Security protection program, security system, and recording medium
JP2008219469A (en) * 2007-03-05 2008-09-18 Mitsubishi Electric Corp System for preventing secret leakage
WO2009131130A1 (en) * 2008-04-23 2009-10-29 日本電気株式会社 Information processing system, information processing device, mobile communication device, and method for managing user information used for them
JP5423668B2 (en) * 2008-04-23 2014-02-19 日本電気株式会社 Information processing system, information processing apparatus, portable communication device, and user information management method used therefor

Also Published As

Publication number Publication date
WO2004044714A1 (en) 2004-05-27
AU2003301925A1 (en) 2004-06-03

Similar Documents

Publication Publication Date Title
KR100310093B1 (en) Security method of personal computer using password
US7210045B2 (en) Storing encrypted and/or compressed system context information when entering a low-power state
US4951249A (en) Method and apparatus for controlled access to a computer system
US20070136593A1 (en) Secure information storage apparatus
US8302209B2 (en) Data processing methods and devices for reading from and writing to external storage devices
US20060107317A1 (en) Selective protection of files on portable memory devices
US20070180268A1 (en) Method for creating an encrypted back-up file and method for restoring data from a back-up file in a pocket PC
WO2005098569A1 (en) Information processor and method for ensuring security thereof
JP2004164093A (en) Security system for computer
JP2002183076A (en) Information processor and method for starting the same
JPH09305249A (en) Information processor and method for mounting electronic equipment on the information processor
JPH08328683A (en) Computer system and method for displaying its message
JP3128582U (en) Computer security equipment
JP2002006978A (en) Personal computer and its operating method
JP2010211406A (en) Removable memory unit
KR100578116B1 (en) computer system with preservation of stored data in storage device and method thereof
JP2003202933A (en) Portable information processor and equipment control method in portable information processor
JP2004302716A (en) User authentication method
JPH10228423A (en) Electronic device
JP2711419B2 (en) Computer startup method
CN115801948A (en) Operation method and device
JP2001265507A (en) Portable terminal and its operating method
JPH05333773A (en) Data security system
JP2000339054A (en) Information processor, its use permitting method and storage medium
JPH05257559A (en) Information processor

Legal Events

Date Code Title Description
A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20060530

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20060731

A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 20060829