Nothing Special   »   [go: up one dir, main page]

US20010016895A1 - Removable memory device for portable terminal device - Google Patents

Removable memory device for portable terminal device Download PDF

Info

Publication number
US20010016895A1
US20010016895A1 US09/033,613 US3361398A US2001016895A1 US 20010016895 A1 US20010016895 A1 US 20010016895A1 US 3361398 A US3361398 A US 3361398A US 2001016895 A1 US2001016895 A1 US 2001016895A1
Authority
US
United States
Prior art keywords
portable terminal
terminal device
removable memory
memory device
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/033,613
Other versions
US6282612B1 (en
Inventor
Noriyasu Sakajiri
Keiichi Hayashi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Innovations Ltd Hong Kong
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Assigned to NEC CORPORATION reassignment NEC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HAYASHI, KEIICHI, SAKAJIRI, NORIYASU
Publication of US20010016895A1 publication Critical patent/US20010016895A1/en
Application granted granted Critical
Publication of US6282612B1 publication Critical patent/US6282612B1/en
Assigned to LENOVO INNOVATIONS LIMITED (HONG KONG) reassignment LENOVO INNOVATIONS LIMITED (HONG KONG) ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NEC CORPORATION
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/275Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips implemented by means of portable electronic directories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/14Details of telephonic subscriber devices including a card reading device

Definitions

  • the present invention relates to removable memory devices.
  • the present invention relates to a removable memory device for a portable terminal device that can be removably connected to such a portable terminal device as, e.g., a portable telephone and can store therein ID information, a telephone number list, and so on, etc., inherent in each portable terminal device.
  • Such a portable terminal device as a portable telephone comprises a memory device which stores therein, for example, such a telephone number list as abbreviated dialing numbers or such individual information as ID information inherent in each portable terminal device, entered by a user.
  • a user wants to exchange the portable terminal device with another due to user's upgrading to a newer device, it is desirable to enable copying of the individual information already stored in the portable terminal device used so far to a new portable terminal device and also to enable use of the new portable terminal device with the same individual information.
  • Japanese Patent Application Laid-Open Publication No. Hei-4-302245 Disclosed in Japanese Patent Application Laid-Open Publication No. Hei-4-302245 is a system wherein an information memory device for storing information necessary for operation of a radio telephone set, i.e., operation lock/unlock information, radio telephone participation information, or attached function restriction information, private information (i.e., individual information) such as a telephone number list, as explained in Japanese Patent Application Laid-Open Publication No. Hei-4-302245, is made in the form of an ID card or a chip and the information memory device is arranged to be removably connected to the radio telephone device.
  • an information memory device for storing information necessary for operation of a radio telephone set, i.e., operation lock/unlock information, radio telephone participation information, or attached function restriction information, private information (i.e., individual information) such as a telephone number list, as explained in Japanese Patent Application Laid-Open Publication No. Hei-4-302245, is made in the form of
  • the prior art radio telephone device has a problem that, since anyone can simply remove the information memory device therefrom, when another user removes the information memory device from other's radio telephone device and attaches the information memory device to his or her own radio telephone device, he or she can use it with use of the other's individual information.
  • an object of the present invention is to provide a removable memory device for a portable terminal device which, when a user wants to exchange an old portable terminal device with new one and to use the new portable terminal device with individual information used so far, can reliably shift the individual information, can shorten a time necessary for the information shift to a large extent and can prevent easy illegal use of the individual information of the portable terminal device by others.
  • the memory device has a controller for judging an input command from a personal computer connected to the portable terminal device when the memory device is disconnected from the portable terminal device and a memory manager for protecting the memory at the time of the removal.
  • the memory device has a controller for detecting a connection with the portable terminal and a memory manager having a function of erasing the memory.
  • the removable memory device in accordance with the present invention can be removed from the portable terminal device when a remove command (e.g., password) is entered.
  • a remove command e.g., password
  • the user when wanting to exchange the terminal device, the user can exchange the individual information in a short time and also can prevent the user or a third party from illegally removing the memory device from the terminal device.
  • FIG. 1 is a block diagram of a removable memory device in accordance with a first embodiment of the present invention.
  • FIG. 2 is a configuration for explaining the shifting operation of individual information of a portable terminal device using the removable memory device in accordance with the present invention.
  • FIG. 3 is a flowchart for explaining the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention.
  • FIG. 4 is a flowchart for explaining the operation of the removable memory device according to the first embodiment of the present invention when the removable memory device was illegally removed from the portable terminal device.
  • FIG. 5 is a block diagram of a removable memory device and a part of a portable terminal device in accordance with a second embodiment of the present invention.
  • FIG. 6 is a flowchart for explaining the operation of the removable memory device according to the second embodiment of the present invention when the removable memory device was illegally removed from the portable terminal device.
  • a first portable terminal device as a copy originator, is connected to such an intermediate controller as a personal computer to transfer the individual information already stored in the memory device of the first portable terminal device to the intermediate controller.
  • a second portable terminal device as a copy destinator, is connected to the intermediate controller to transfer to the second portable terminal device the individual information transferred from the first portable terminal device to the intermediate controller.
  • the second portable terminal device stores in its own memory device the individual information transferred from the intermediate controller, at which stage the copying operation of the individual information is completed.
  • the related method has had a problem that the individual information is first transferred from the first portable terminal device to the intermediate controller and then stored in the memory device of the second portable terminal device, so that there is a danger that erroneous transfer of the individual information or data destruction during transmission may take place and an increased amount of information involves a longer transfer time.
  • FIG. 1 is a block diagram of a removable memory device in accordance with a first embodiment of the present invention.
  • a removable memory device 1 is made up of a memory 5 for storing individual information therein, a memory manager 6 for protecting the memory when the removable memory device 1 is not connected to a portable terminal device and for allowing access thereto when the removable memory device is connected, a data input/output part 4 as a data sending/receiving port to/from a data input/output part 2 of the portable terminal device, and a controller 3 for detecting an interconnection with the portable terminal device through the data input/output part 4 and for controlling the memory manager 6 .
  • FIG. 2 is a configuration for explaining the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention
  • FIG. 3 is a flowchart for explaining the operation thereof. Explanation will be made herein as to the shifting operation of the individual information stored in portable terminal device A in FIG. 2 to a portable terminal device B, by referring to steps (F- 1 ) to (F- 16 ) in FIG. 3.
  • the portable terminal device A is put in its maintenance mode (step (F- 1 )).
  • the maintenance mode may either be automatically entered when the portable terminal device A is connected to the personal computer 10 , or the maintenance mode may be entered after a command to enter the maintenance mode is input via the personal computer 10 .
  • the personal computer 10 acts as an information input/output apparatus for inputting commands, etc., to the portable terminal device or for displaying thereon information received from the portable terminal device.
  • the portable terminal device In the maintenance mode of the portable terminal device, the portable terminal device can do transactions on various types of maintenances. In the maintenance mode, when it is not associated with the removable memory device, the portable terminal device shifts to various types of maintenance modes (steps (F- 2 ), (F- 16 )).
  • a maintenance operator selects a removable mode for the removable memory device 1 . More specifically, the operator enters a remove command into the portable terminal device A connected to the personal computer 10 (steps (F- 2 ) and (F- 3 )). This remove command is accepted by the controller 3 of the removable memory device 1 via the data input/output part 2 of the Portable terminal device A and the data input/output part 4 of the removable memory device 1 (refer to FIG. 1).
  • the controller 3 after accepting the remove command, requires a password from the maintenance operator.
  • the maintenance operator in response to the password request, enters the password (password for the removal) from the personal computer 10 (step (F- 4 )).
  • the controller 3 finds a password coincidence between the operator-entered password and a password stored in the removable memory device 1 (step (F- 5 ))
  • the controller 3 issues to the memory manager 6 a command to protect the memory 5 (step (F- 6 )).
  • the step (F- 5 ) when the maintenance operator removes the removable memory device 1 from the portable terminal device A without finding a password coincidence in the controller 3 , the contents stored in the memory 5 is erased and the memory 5 is initialized.
  • the removable memory device 1 may be removed from the portable terminal device A without erasing the contents stored in the memory 5 . In this case, as described later, when the portable terminal device B mounted the removable memory device 1 is connected to the personal computer 10 , the contents stored in the memory 5 .
  • the password stored in the removable memory device 1 is typically only changeable by a user with system privileges or the like, and cannot be changed by a normal user. This password may be stored in the removable memory device (either in the controller 3 or the memory 5 ) during manufacture of the removable memory device 1 , for example.
  • the memory manager 6 when receiving the instruction, protects the memory 5 and then issues a notification of completion of the memory protection to the controller 3 (step (F- 7 )).
  • the controller 3 when receiving the notification, informs the personal computer 10 that the portable terminal device A is removable from the personal computer 10 via the portable terminal device A (step (F- 8 )).
  • the personal computer 10 when receiving the removable notification, informs the maintenance operator to remove the portable terminal device A from the personal computer 10 and to remove the removable memory device 1 from the portable terminal device A.
  • the maintenance operator after receiving the removal notice by means of the personal computer 10 , removes the removable memory device 1 from the portable terminal device A (step (F- 9 )), mounts the removable memory device 1 into the portable terminal device B with protecting the contents stored in the memory 5 , connects the portable terminal device B to the personal computer 10 , selects a connection mode of the removable memory device 1 from the maintenance mode (F- 1 ), and then enters on the personal computer 10 a connect command to the portable terminal device B (steps (F- 2 ) and (F- 3 )).
  • step (F- 10 ) Even when the controller 3 receives this connect command, as in the remove command explained previously, the controller 3 demands the password of the maintenance operator (step (F- 10 )).
  • step (F- 11 ) the controller issues a memory release instruction to the memory manager 6 (step (F- 12 )).
  • step (F- 11 ) when the maintenance operator removes the removable memory device 1 from the portable terminal device A without finding a password coincidence in the controller 3 , the contents stored in the memory 5 is erased and the memory 5 is initialized.
  • This instruction causes the memory manager 6 to release the memory 5 and to inform the controller 3 of completion of the memory release (step (F- 13 )).
  • the controller 3 after receiving the notification, informs the personal computer 10 of completion of the connection of the removable memory device 1 via the portable terminal device B (step (F- 14 )).
  • the maintenance operator is permitted to separate the portable terminal device B from the personal computer 10 .
  • the operator can use the portable terminal device B (step (F- 15 )).
  • the controller 3 when confirming a connection of the portable terminal device through the data input/output part 4 (step (S- 1 )) and the memory protection is not carried out (step (S- 2 )) and the memory 5 is not newly mounted (step (S- 3 )) (that is, when incorrect removal is carried out), issues a memory erase instruction to the memory manager 6 .
  • the memory manager 6 when receiving the memory erase instruction, completes erasing of the contents stored in the memory 5 and then informs the controller 3 of completion of the memory erase.
  • the controller 3 after receiving the notification, newly utilizes the memory 5 (step (S- 4 )).
  • step (S- 2 ) when the memory protection is carried out, the contents stored in the memory 5 is not erased even if the maintenance operator removes the removable memory device 1 from the portable terminal device A.
  • step (S- 3 ) when the memory 5 is newly mounted, the memory 5 is initialized.
  • the present invention can be arranged so that the portable terminal device prohibits its operation using the individual information stored in the removable memory device 1 connected thereto.
  • the removable memory device in accordance with the present invention is arranged so that an operator is required to enter the remove command (password) after connected from the personal computer and at the time of connection, operator's input of the connect command (password) from the personal computer causes the memory to be released.
  • This enables the memory having the individual information already stored therein to be protected, so that illegal access can be prevented and shift of the individual information can be easily realized even at the time of exchange between portable terminal devices.
  • FIG. 5 A second embodiment of the invention is shown in FIG. 5.
  • the controller 3 ′ is provided in the portable terminal device A′, which is external to the remote memory device 1 ′.
  • FIG. 6 is a flowchart for explaining the operation according to the second embodiment.
  • the controller 3 ′ issues a command to the memory manager 6 to erase the contents stored in the memory 5 if the memory 5 is not protected.
  • the memory manager 6 informs the controller 3 ′ of completion of the memory erase (via the data input output part 4 of the removable memory device 1 ′ and the data input/output part 2 of the portable terminal device A′).
  • the controller 3 ′ after receiving the notification, newly utilizes the memory 5 (step S- 8 ).
  • the memory 5 is not immediately erased under command of a controller 3 external to the removable memory device 1 ′ after disconnection of a removable memory device 1 ′ from a portable terminal device A′, in which the removable memory device has a non-new, non-protected memory (as in the first embodiment), but instead the erasure is performed by a controller 3 ′ external to the removable memory device 1 ′ at a time when the removable memory device 1 ′ is reconnected to a portable terminal device A′ (having a controller 3 ′ housed therein).
  • the controller is housed in the personal computer 10 .
  • a maintenance operator enters commands, a password, and so on, from a personal computer 10 .
  • the maintenance operator may be able to enter them from a portable terminal device A.
  • the maintenance operator enters commands, a password, and so on, but a user of a portable terminal device A may be able to enter them.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

A removable memory device includes a memory for storing individual information therein, a memory manager for protecting the memory when the removable memory device is not connected to a portable terminal device and for allowing access thereto when the removable memory device is connected, a data input/output part as a data sending/receiving port to/from a data input/output part of the portable terminal device, and a controller for detecting an interconnection with the portable terminal device through the data input/output part and for controlling the memory manager. The removable memory device protects the individual information stored within it from being illegally used.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0001]
  • The present invention relates to removable memory devices. In particular, the present invention relates to a removable memory device for a portable terminal device that can be removably connected to such a portable terminal device as, e.g., a portable telephone and can store therein ID information, a telephone number list, and so on, etc., inherent in each portable terminal device. [0002]
  • 2. Description of the Related Art [0003]
  • Such a portable terminal device as a portable telephone comprises a memory device which stores therein, for example, such a telephone number list as abbreviated dialing numbers or such individual information as ID information inherent in each portable terminal device, entered by a user. When a user wants to exchange the portable terminal device with another due to user's upgrading to a newer device, it is desirable to enable copying of the individual information already stored in the portable terminal device used so far to a new portable terminal device and also to enable use of the new portable terminal device with the same individual information. [0004]
  • Disclosed in Japanese Patent Application Laid-Open Publication No. Hei-4-302245 is a system wherein an information memory device for storing information necessary for operation of a radio telephone set, i.e., operation lock/unlock information, radio telephone participation information, or attached function restriction information, private information (i.e., individual information) such as a telephone number list, as explained in Japanese Patent Application Laid-Open Publication No. Hei-4-302245, is made in the form of an ID card or a chip and the information memory device is arranged to be removably connected to the radio telephone device. [0005]
  • In that system, when it is desired to exchange the radio telephone device with a newer device, by just removing the information memory device from the old radio telephone device and then attaching it to the new radio telephone device, the user can use the new radio telephone device under the same environment (that is, the same individual information) as that of the old radio telephone device. [0006]
  • However, the prior art radio telephone device has a problem that, since anyone can simply remove the information memory device therefrom, when another user removes the information memory device from other's radio telephone device and attaches the information memory device to his or her own radio telephone device, he or she can use it with use of the other's individual information. [0007]
  • SUMMARY OF THE INVENTION
  • In view of the above, the present invention has been made, and an object of the present invention is to provide a removable memory device for a portable terminal device which, when a user wants to exchange an old portable terminal device with new one and to use the new portable terminal device with individual information used so far, can reliably shift the individual information, can shorten a time necessary for the information shift to a large extent and can prevent easy illegal use of the individual information of the portable terminal device by others. [0008]
  • With the removable memory device for the portable terminal device in accordance with the present invention, when a user wants to exchange an old terminal device with new one, the user is required to protect an individual information already stored in the memory device. [0009]
  • In more detail, the memory device has a controller for judging an input command from a personal computer connected to the portable terminal device when the memory device is disconnected from the portable terminal device and a memory manager for protecting the memory at the time of the removal. [0010]
  • When the removable memory device of the present invention is illegally removed from the portable terminal device, the individual information stored in the memory is erased. [0011]
  • More specifically, the memory device has a controller for detecting a connection with the portable terminal and a memory manager having a function of erasing the memory. [0012]
  • The removable memory device in accordance with the present invention can be removed from the portable terminal device when a remove command (e.g., password) is entered. [0013]
  • For this reason, when wanting to exchange the terminal device, the user can exchange the individual information in a short time and also can prevent the user or a third party from illegally removing the memory device from the terminal device. [0014]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The above-mentioned objects and advantages of the invention will become more apparent from the following detailed description when read in conjunction with the accompanying drawings, with like reference numerals indicating corresponding parts throughout, and wherein: [0015]
  • FIG. 1 is a block diagram of a removable memory device in accordance with a first embodiment of the present invention. [0016]
  • FIG. 2 is a configuration for explaining the shifting operation of individual information of a portable terminal device using the removable memory device in accordance with the present invention. [0017]
  • FIG. 3 is a flowchart for explaining the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention. [0018]
  • FIG. 4 is a flowchart for explaining the operation of the removable memory device according to the first embodiment of the present invention when the removable memory device was illegally removed from the portable terminal device. [0019]
  • FIG. 5 is a block diagram of a removable memory device and a part of a portable terminal device in accordance with a second embodiment of the present invention. [0020]
  • FIG. 6 is a flowchart for explaining the operation of the removable memory device according to the second embodiment of the present invention when the removable memory device was illegally removed from the portable terminal device. [0021]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The present invention will be explained in connection with the drawings. Embodiments of the present invention will then be explained in detail with reference to the drawings. First, a related system will be discussed. [0022]
  • Explanation will now be made as to how to copy the individual information to another portable terminal device in a related portable terminal device. [0023]
  • Initially, a first portable terminal device, as a copy originator, is connected to such an intermediate controller as a personal computer to transfer the individual information already stored in the memory device of the first portable terminal device to the intermediate controller. Next, after the first portable terminal device is removed from the intermediate controller, a second portable terminal device, as a copy destinator, is connected to the intermediate controller to transfer to the second portable terminal device the individual information transferred from the first portable terminal device to the intermediate controller. The second portable terminal device stores in its own memory device the individual information transferred from the intermediate controller, at which stage the copying operation of the individual information is completed. [0024]
  • However, the related method has had a problem that the individual information is first transferred from the first portable terminal device to the intermediate controller and then stored in the memory device of the second portable terminal device, so that there is a danger that erroneous transfer of the individual information or data destruction during transmission may take place and an increased amount of information involves a longer transfer time. [0025]
  • FIG. 1 is a block diagram of a removable memory device in accordance with a first embodiment of the present invention. [0026]
  • A [0027] removable memory device 1 is made up of a memory 5 for storing individual information therein, a memory manager 6 for protecting the memory when the removable memory device 1 is not connected to a portable terminal device and for allowing access thereto when the removable memory device is connected, a data input/output part 4 as a data sending/receiving port to/from a data input/output part 2 of the portable terminal device, and a controller 3 for detecting an interconnection with the portable terminal device through the data input/output part 4 and for controlling the memory manager 6.
  • Explanation will next be made as to the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention, by referring to FIGS. 2 and 3. FIG. 2 is a configuration for explaining the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention, and FIG. 3 is a flowchart for explaining the operation thereof. Explanation will be made herein as to the shifting operation of the individual information stored in portable terminal device A in FIG. 2 to a portable terminal device B, by referring to steps (F-[0028] 1) to (F-16) in FIG. 3.
  • First of all, by connecting the portable terminal device A to a [0029] personal computer 10, the portable terminal device A is put in its maintenance mode (step (F-1)). The maintenance mode may either be automatically entered when the portable terminal device A is connected to the personal computer 10, or the maintenance mode may be entered after a command to enter the maintenance mode is input via the personal computer 10.
  • In most systems, a command is required to enter the maintenance mode, but some systems allow for an automatically-entered maintenance when the portable terminal device A is connected to the [0030] personal computer 10.
  • The [0031] personal computer 10 acts as an information input/output apparatus for inputting commands, etc., to the portable terminal device or for displaying thereon information received from the portable terminal device. In the maintenance mode of the portable terminal device, the portable terminal device can do transactions on various types of maintenances. In the maintenance mode, when it is not associated with the removable memory device, the portable terminal device shifts to various types of maintenance modes (steps (F-2), (F-16)).
  • In this maintenance mode, next, a maintenance operator selects a removable mode for the [0032] removable memory device 1. More specifically, the operator enters a remove command into the portable terminal device A connected to the personal computer 10 (steps (F-2) and (F-3)). This remove command is accepted by the controller 3 of the removable memory device 1 via the data input/output part 2 of the Portable terminal device A and the data input/output part 4 of the removable memory device 1 (refer to FIG. 1).
  • The [0033] controller 3, after accepting the remove command, requires a password from the maintenance operator. The maintenance operator, in response to the password request, enters the password (password for the removal) from the personal computer 10 (step (F-4)). When the controller 3 finds a password coincidence between the operator-entered password and a password stored in the removable memory device 1 (step (F-5)), the controller 3 issues to the memory manager 6 a command to protect the memory 5 (step (F-6)). In the step (F-5), when the maintenance operator removes the removable memory device 1 from the portable terminal device A without finding a password coincidence in the controller 3, the contents stored in the memory 5 is erased and the memory 5 is initialized. The removable memory device 1 may be removed from the portable terminal device A without erasing the contents stored in the memory 5. In this case, as described later, when the portable terminal device B mounted the removable memory device 1 is connected to the personal computer 10, the contents stored in the memory 5. The password stored in the removable memory device 1 is typically only changeable by a user with system privileges or the like, and cannot be changed by a normal user. This password may be stored in the removable memory device (either in the controller 3 or the memory 5) during manufacture of the removable memory device 1, for example.
  • The [0034] memory manager 6, when receiving the instruction, protects the memory 5 and then issues a notification of completion of the memory protection to the controller 3 (step (F-7)). The controller 3, when receiving the notification, informs the personal computer 10 that the portable terminal device A is removable from the personal computer 10 via the portable terminal device A (step (F-8)). The personal computer 10, when receiving the removable notification, informs the maintenance operator to remove the portable terminal device A from the personal computer 10 and to remove the removable memory device 1 from the portable terminal device A.
  • The maintenance operator, after receiving the removal notice by means of the [0035] personal computer 10, removes the removable memory device 1 from the portable terminal device A (step (F-9)), mounts the removable memory device 1 into the portable terminal device B with protecting the contents stored in the memory 5, connects the portable terminal device B to the personal computer 10, selects a connection mode of the removable memory device 1 from the maintenance mode (F-1), and then enters on the personal computer 10 a connect command to the portable terminal device B (steps (F-2) and (F-3)).
  • Even when the [0036] controller 3 receives this connect command, as in the remove command explained previously, the controller 3 demands the password of the maintenance operator (step (F-10)). When the controller 3 finds a coincidence of the password entered by the maintenance operator (step (F-11)), the controller issues a memory release instruction to the memory manager 6 (step (F-12)). In the step (F-11), when the maintenance operator removes the removable memory device 1 from the portable terminal device A without finding a password coincidence in the controller 3, the contents stored in the memory 5 is erased and the memory 5 is initialized.
  • This instruction causes the [0037] memory manager 6 to release the memory 5 and to inform the controller 3 of completion of the memory release (step (F-13)). The controller 3, after receiving the notification, informs the personal computer 10 of completion of the connection of the removable memory device 1 via the portable terminal device B (step (F-14)). Thereafter, the maintenance operator is permitted to separate the portable terminal device B from the personal computer 10. After the portable terminal device B is separated from the personal computer 10, the operator can use the portable terminal device B (step (F-15)).
  • Explanation will then be made as to the operation of the [0038] removable memory device 1 according to the first embodiment when the operator removes the removable memory device 1 from the portable terminal device without following the above procedure, by referring to a flowchart of FIG. 4.
  • The [0039] controller 3, when confirming a connection of the portable terminal device through the data input/output part 4 (step (S-1)) and the memory protection is not carried out (step (S-2)) and the memory 5 is not newly mounted (step (S-3)) (that is, when incorrect removal is carried out), issues a memory erase instruction to the memory manager 6. The memory manager 6, when receiving the memory erase instruction, completes erasing of the contents stored in the memory 5 and then informs the controller 3 of completion of the memory erase. The controller 3, after receiving the notification, newly utilizes the memory 5 (step (S-4)).
  • In the step (S-[0040] 2), when the memory protection is carried out, the contents stored in the memory 5 is not erased even if the maintenance operator removes the removable memory device 1 from the portable terminal device A. In the step (S-3), when the memory 5 is newly mounted, the memory 5 is initialized.
  • When the operator connects the [0041] removable memory device 1 to the portable terminal device without following the aforementioned procedure, the present invention can be arranged so that the portable terminal device prohibits its operation using the individual information stored in the removable memory device 1 connected thereto.
  • As has been explained in the foregoing, the removable memory device in accordance with the present invention is arranged so that an operator is required to enter the remove command (password) after connected from the personal computer and at the time of connection, operator's input of the connect command (password) from the personal computer causes the memory to be released. This enables the memory having the individual information already stored therein to be protected, so that illegal access can be prevented and shift of the individual information can be easily realized even at the time of exchange between portable terminal devices. [0042]
  • A second embodiment of the invention is shown in FIG. 5. In that figure, the [0043] controller 3′ is provided in the portable terminal device A′, which is external to the remote memory device 1′. FIG. 6 is a flowchart for explaining the operation according to the second embodiment. In FIG. 6, when the removable memory device 1′ is disconnected from a portable terminal device A′ and then later reconnected to the same portable terminal device A′ or to another portable terminal device (step S-5), and the memory 5 is not protected (step S-6), and the memory 5 is not newly mounted (step S-7), the controller 3′ issues a command to the memory manager 6 to erase the contents stored in the memory 5 if the memory 5 is not protected. After a non-protected memory 5 has been erased, the memory manager 6 informs the controller 3′ of completion of the memory erase (via the data input output part 4 of the removable memory device 1′ and the data input/output part 2 of the portable terminal device A′). The controller 3′, after receiving the notification, newly utilizes the memory 5 (step S-8). Thus, in the second embodiment, the memory 5 is not immediately erased under command of a controller 3 external to the removable memory device 1′ after disconnection of a removable memory device 1′ from a portable terminal device A′, in which the removable memory device has a non-new, non-protected memory (as in the first embodiment), but instead the erasure is performed by a controller 3′ external to the removable memory device 1′ at a time when the removable memory device 1′ is reconnected to a portable terminal device A′ (having a controller 3′ housed therein). In an alternative embodiment, the controller is housed in the personal computer 10.
  • While embodiments have been described herein, modification of the described embodiments may become apparent to those of ordinary skill in the art, following the teachings of the invention, without departing from the scope of the invention as set forth in the appended claims. For example, other ways of disabling the removable memory device may be contemplated while remaining within the teachings of the invention, such as, for example, disabling the data input/[0044] output part 4 or the memory manager 6, and not erasing the memory 5. For the data input/output part, this would require a control signal (not shown in FIG. 1) from the controller 3 to the data input/output part 4, where that control signal would disable the data input/output part 4.
  • Further, in the embodiments of the invention, a maintenance operator enters commands, a password, and so on, from a [0045] personal computer 10. However, the maintenance operator may be able to enter them from a portable terminal device A.
  • Moreover, in the embodiments of this invention, the maintenance operator enters commands, a password, and so on, but a user of a portable terminal device A may be able to enter them. [0046]

Claims (17)

What is claimed is:
1. A removable memory device for a portable terminal device for storing individual information including operation of the portable terminal device therein to be removed from said portable terminal device, comprising:
an input port configured to receive a command for removing the removable memory device from the portable terminal device; and
a control unit configured to protect information within the removable memory device when a verification command is received by the input port.
2. A removable memory device for a portable terminal device as set forth in
claim 1
, wherein said verification command is entered based on a request output through an information input/output device connected to said portable terminal device, and wherein said verification command is received by said control unit through said information input/output device.
3. A removable memory device for a portable terminal device as set forth in
claim 2
, wherein said information input/output device is a personal computer.
4. A removable memory device for a portable terminal device as set forth in
claim 1
, wherein, when said removable memory device is illegally separated from said portable terminal device, the information stored within said removable memory device is erased.
5. A removable memory device for a portable terminal device as set forth in
claim 1
, wherein, when said removable memory device is illegally connected to said portable terminal device, said removable memory device prohibits operation of said portable terminal device using the information stored within said removable memory device.
6. A removable memory device for a portable terminal device as set forth in
claim 2
, wherein said control unit is housed in said information input/output device.
7. A removable memory device for a portable terminal device as set forth in
claim 1
, wherein said control unit is housed in said portable terminal device.
8. A removable memory device for a portable terminal device, the removable memory device configured to store individual information related to operation of the portable terminal device, the removable memory device comprising:
an input port configured to receive an operator command for removing the removable memory device from the portable terminal device, the operator command being entered through a computer communicatively connected to the portable terminal device; and
an erase unit configured to erase the information within the removable memory device when both a) and b) occur, where a) a particular password is not entered through the computer, and b) the removable memory device is removed from the portable terminal device.
9. A removable memory device for a portable terminal device as set forth in
claim 8
, wherein, when the particular password is entered through the computer, the removable memory device is allowed to be removed from the portable terminal device without erasing any of the information stored within the removable memory device.
10. A system for allowing for protecting information stored within a removable memory device that is connectable to a portable terminal device, the information relating to operation of the portable terminal device, the system comprising:
an input port configured to receive a command for removing the removable memory device from the portable terminal device; and
a control unit configured to Protect information within the removable memory device when a verification command is received by the input port.
11. A system as set forth in
claim 10
, wherein said control unit is housed in said removable memory device.
12. A system as set forth in
claim 10
, wherein said control unit is housed in said portable terminal device.
13. A system for transferring individual information stored in a removable memory device initially coupled to a first portable terminal device, to a second portable terminal device for which said removable memory device is to be later coupled, the system comprising:
a computer configured to place said first portable terminal device in a maintenance mode when said first portable terminal device is coupled to said computer,
said first portable terminal device including a data input/output part for receiving a remove command for said removable memory device when said first portable terminal device is coupled to said computer while in said maintenance mode,
a controller configured to accept the remove command and to output a request for a password to be entered via said computer,
wherein said controller compares the entered password to a stored password to determine whether there is a coincidence,
wherein, if there is a coincidence, said controller protects the information stored in said removable memory device and informs said computer that said removable memory device can be removed from said first portable terminal device, and
wherein, when said second portable terminal device is coupled to said computer and said removable memory device is coupled to said second portable terminal device and placed in a connection mode, said controller requests to enter the password via said computer in order to allow said second portable terminal device to access the information stored in said removable memory device without erasing the information.
14. A system as set forth in
claim 13
, wherein said controller is housed in said removable memory device.
15. A system as set forth in
claim 13
, wherein said controller is housed in both said first and second portable terminal devices.
16. A method for providing removal of a memory device for a portable terminal device configured to store individual information related to operation of the portable terminal device, the method comprising the steps of:
a) receiving an operator command for removing the removable memory device from the portable terminal device, the operator command be entered through a computer communicatively connected to the portable terminal device;
b) based on the received operator command, requesting entry of a particular password to be entered through the computer; and
c) erasing the information within the removable memory device when both i) and ii) occur, where i) the particular password is not entered through the computer in response to the request made in the step b), and ii) the removable memory device is removed from the portable terminal device.
17. A method for a portable terminal device as set forth in
claim 16
, wherein, when the particular password is entered through the computer in response to the request made in the step b), the removable memory device is allowed to be removed from the portable terminal device without erasing any of the information stored within the removable memory device.
US09/033,613 1997-03-04 1998-03-03 Removable memory device for portable terminal device Expired - Lifetime US6282612B1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP09048627A JP3120749B2 (en) 1997-03-04 1997-03-04 Removable storage device for portable terminal device
JP9-48627 1997-03-04
JP9-048627 1997-03-04

Publications (2)

Publication Number Publication Date
US20010016895A1 true US20010016895A1 (en) 2001-08-23
US6282612B1 US6282612B1 (en) 2001-08-28

Family

ID=12808640

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/033,613 Expired - Lifetime US6282612B1 (en) 1997-03-04 1998-03-03 Removable memory device for portable terminal device

Country Status (5)

Country Link
US (1) US6282612B1 (en)
JP (1) JP3120749B2 (en)
CN (1) CN1136505C (en)
AU (1) AU729507B2 (en)
GB (1) GB2325116B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116575A1 (en) * 2000-11-07 2002-08-22 Yuji Toyomura Carryable memory media, portable information terminal using the same and method for managing files therein
US20040030830A1 (en) * 2001-02-26 2004-02-12 Tokyo Electron Device Limited Storage medium control method, storage medium control device, and storage medium adaptor
EP1538855A2 (en) * 2003-12-01 2005-06-08 Sony Ericsson Mobile Communications Japan, Inc. Method of preventing access to a subscriber identity module in a mobile communication terminal
US20060004974A1 (en) * 2003-03-13 2006-01-05 Paul Lin Portable non-volatile memory device and method for preventing unauthorized access to data stored thereon
US20060087699A1 (en) * 2004-09-28 2006-04-27 Seiko Epson Corporation Image processing apparatus, control method of the same, and storage medium
US20070288756A1 (en) * 2006-05-18 2007-12-13 Fuji Xerox Co., Ltd. Data processing apparatus, data processing method, and computer readable medium
US20080086680A1 (en) * 2006-05-27 2008-04-10 Beckman Christopher V Techniques of document annotation according to subsequent citation
US20080092219A1 (en) * 2006-05-27 2008-04-17 Beckman Christopher V Data storage and access facilitating techniques
US20080215841A1 (en) * 2005-07-21 2008-09-04 Clevx, Llc Memory Lock System
US20100174922A1 (en) * 2009-01-07 2010-07-08 Johnson Simon B Encryption bridge system and method of operation thereof
US20100174913A1 (en) * 2009-01-03 2010-07-08 Johnson Simon B Multi-factor authentication system for encryption key storage and method of operation therefor
USRE45422E1 (en) 2006-05-27 2015-03-17 Loughton Technology, L.L.C. Organizational viewing techniques
CN105449449A (en) * 2014-08-26 2016-03-30 鸿富锦精密工业(深圳)有限公司 Electronic product
US9401254B2 (en) 2006-05-27 2016-07-26 Gula Consulting Limited Liability Company Electronic leakage reduction techniques

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3544297B2 (en) * 1998-04-08 2004-07-21 富士通株式会社 Access control method, storage device, and storage medium
JP3866892B2 (en) * 2000-02-15 2007-01-10 株式会社日立グローバルストレージテクノロジーズ Information processing device and its maintenance service system
US7493437B1 (en) 2000-07-06 2009-02-17 Mcm Portfolio Llc Flashtoaster for reading several types of flash memory cards with or without a PC
US6438638B1 (en) 2000-07-06 2002-08-20 Onspec Electronic, Inc. Flashtoaster for reading several types of flash-memory cards with or without a PC
US7252240B1 (en) 2000-07-06 2007-08-07 Onspec Electronics, Inc. Memory module which includes a form factor connector
US7295443B2 (en) 2000-07-06 2007-11-13 Onspec Electronic, Inc. Smartconnect universal flash media card adapters
US7278051B2 (en) 2000-07-06 2007-10-02 Onspec Electronic, Inc. Field-operable, stand-alone apparatus for media recovery and regeneration
JP2002149456A (en) * 2000-11-07 2002-05-24 Matsushita Electric Ind Co Ltd Portable storage medium, file management method in portable storage medium, and portable terminal
FR2818474B1 (en) * 2000-12-18 2003-02-21 Richard Toffolet METHOD FOR THE FIGHT AGAINST THEFT OF "NOMADIC" DEVICES, DEVICE AND CORRESPONDING INSTALLATION
EP1480395B1 (en) * 2001-03-19 2007-04-25 Sony Corporation Network system
EP1258807A3 (en) * 2001-05-14 2005-11-02 Matsushita Electric Industrial Co., Ltd. Illegal access monitoring device, ic card, and illegal access monitoring method
KR100711913B1 (en) * 2002-02-04 2007-04-27 엘지전자 주식회사 Method for securing data stored in hard discs of a computer system
EP1540448A2 (en) * 2002-04-08 2005-06-15 Socket Communications, Inc. Wireless enabled memory module
JP2003331241A (en) * 2002-05-09 2003-11-21 Fujitsu Ltd Memory device and method of controlling the same
US20110063835A1 (en) * 2002-09-23 2011-03-17 Nelson Rivas Led lighting apparatus
JP2005011151A (en) * 2003-06-20 2005-01-13 Renesas Technology Corp Memory card
DE10340861A1 (en) * 2003-09-04 2005-04-07 Infineon Technologies Ag A processor circuit and method for associating a logic chip with a memory chip
KR100605920B1 (en) * 2004-02-17 2006-08-02 삼성전자주식회사 Method for securing external memory in wireless terminal
US20060150247A1 (en) * 2004-12-30 2006-07-06 Andrew Gafken Protection of stored data
US8887295B2 (en) * 2005-06-27 2014-11-11 Safend Ltd. Method and system for enabling enterprises to use detachable memory devices that contain data and executable files in controlled and secure way
US7861934B1 (en) * 2006-05-05 2011-01-04 CompuSystems, Inc. Devices and method for recording sales leads
US20080040590A1 (en) * 2006-08-11 2008-02-14 Lea Hwang Lee Selective branch target buffer (btb) allocaiton
US20080040591A1 (en) * 2006-08-11 2008-02-14 Moyer William C Method for determining branch target buffer (btb) allocation for branch instructions
US20080195824A1 (en) * 2007-02-09 2008-08-14 Microsoft Corporation Context sensitive caching on removable storage
US8104920B2 (en) * 2008-06-01 2012-01-31 Jack Dubord Adjustable modular lighting system and method of using same
US9355238B2 (en) * 2010-05-26 2016-05-31 Ncr Corporation Secure authentication at a self-service terminal
JP5418460B2 (en) * 2010-10-04 2014-02-19 ブラザー工業株式会社 Communication control device and communication system
US20120246713A1 (en) * 2011-03-24 2012-09-27 Cheng-Hsiung Liao Method and apparatus for controlling access of a secure digital memory card
US10057400B1 (en) 2012-11-02 2018-08-21 Majen Tech, LLC Lock screen interface for a mobile device apparatus
US11431834B1 (en) 2013-01-10 2022-08-30 Majen Tech, LLC Screen interface for a mobile device apparatus
US10051103B1 (en) 2013-01-10 2018-08-14 Majen Tech, LLC Screen interface for a mobile device apparatus
EP2956825B1 (en) 2013-03-15 2020-06-24 Apple Inc. Facilitating transactions with a user account using a wireless device
US10726472B2 (en) 2014-03-31 2020-07-28 Monticello Enterprises LLC System and method for providing simplified in-store, product-based and rental payment processes
US11282131B2 (en) 2014-03-31 2022-03-22 Monticello Enterprises LLC User device enabling access to payment information in response to user input
US11080777B2 (en) 2014-03-31 2021-08-03 Monticello Enterprises LLC System and method for providing a social media shopping experience
US10511580B2 (en) 2014-03-31 2019-12-17 Monticello Enterprises LLC System and method for providing a social media shopping experience
US9400977B2 (en) 2014-05-29 2016-07-26 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US9299072B2 (en) 2014-05-29 2016-03-29 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
US11017384B2 (en) * 2014-05-29 2021-05-25 Apple Inc. Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4430728A (en) * 1981-12-29 1984-02-07 Marathon Oil Company Computer terminal security system
JPS6270096A (en) 1985-09-24 1987-03-31 カシオ計算機株式会社 Holder for integrated circuit card
JPS63191450A (en) 1987-02-04 1988-08-08 Hitachi Ltd Telephone system
JPH02305159A (en) * 1989-05-19 1990-12-18 Toshiba Corp Radio telephone set
JPH0331949A (en) 1989-06-29 1991-02-12 Hitachi Ltd Information processor
US5293610A (en) * 1989-08-04 1994-03-08 Motorola, Inc. Memory system having two-level security system for enhanced protection against unauthorized access
JPH04302245A (en) 1991-03-29 1992-10-26 Toshiba Corp Radio telephony system
EP0605618A4 (en) * 1991-09-23 1998-05-13 Microsystems Z Enhanced security system for computing devices.
SE470519B (en) 1992-11-09 1994-06-27 Ericsson Telefon Ab L M Device for providing services such as telephone communication data communication, etc comprising a terminal unit and an access unit
DE4496561T1 (en) * 1993-08-31 1995-09-21 Ericsson Ge Mobile Communicat Device for storing messages in a cellular mobile terminal
AU691604B2 (en) * 1994-04-07 1998-05-21 Nokia Telecommunications Oy A removable subscriber identification module for a mobile radio terminal and a call control method
US5675628A (en) * 1994-08-01 1997-10-07 Nokia Telecommunications Oy Method and apparatus for enabling roaming of subscriber among plural mobile radio systems, using mobile equipment accepting removable subscriber identity module
FR2732790B1 (en) * 1995-04-05 1997-05-09 Gemplus Card Int INFORMATION COLLECTION SYSTEM FOR CARD READERS
DE19621768B4 (en) * 1996-05-30 2004-03-25 Siemens Ag Telephone with a recording device for a telephone memory card and method for transferring data from a telephone memory card

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116575A1 (en) * 2000-11-07 2002-08-22 Yuji Toyomura Carryable memory media, portable information terminal using the same and method for managing files therein
US20040030830A1 (en) * 2001-02-26 2004-02-12 Tokyo Electron Device Limited Storage medium control method, storage medium control device, and storage medium adaptor
US20060004974A1 (en) * 2003-03-13 2006-01-05 Paul Lin Portable non-volatile memory device and method for preventing unauthorized access to data stored thereon
US7286852B2 (en) 2003-12-01 2007-10-23 Sony Ericsson Mobile Communications Japan, Inc. Subscriber identity module and method of preventing access thereto, and mobile communication terminal device
EP1538855A2 (en) * 2003-12-01 2005-06-08 Sony Ericsson Mobile Communications Japan, Inc. Method of preventing access to a subscriber identity module in a mobile communication terminal
US20050143059A1 (en) * 2003-12-01 2005-06-30 Sony Ericsson Mobile Communications Japan, Inc. Subscriber identity module and method of preventing access thereto, and mobile communication terminal device
EP1538855A3 (en) * 2003-12-01 2005-11-16 Sony Ericsson Mobile Communications Japan, Inc. Method of preventing access to a subscriber identity module in a mobile communication terminal
US20060087699A1 (en) * 2004-09-28 2006-04-27 Seiko Epson Corporation Image processing apparatus, control method of the same, and storage medium
US10025729B2 (en) 2005-07-21 2018-07-17 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
US10083130B2 (en) 2005-07-21 2018-09-25 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
US20080215841A1 (en) * 2005-07-21 2008-09-04 Clevx, Llc Memory Lock System
US9075571B2 (en) * 2005-07-21 2015-07-07 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
US10503665B2 (en) 2005-07-21 2019-12-10 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
US20070288756A1 (en) * 2006-05-18 2007-12-13 Fuji Xerox Co., Ltd. Data processing apparatus, data processing method, and computer readable medium
US8088172B2 (en) * 2006-05-18 2012-01-03 Fuji Xerox Co., Ltd. Data processing apparatus, data processing method, and computer readable medium
US20080092219A1 (en) * 2006-05-27 2008-04-17 Beckman Christopher V Data storage and access facilitating techniques
USRE45422E1 (en) 2006-05-27 2015-03-17 Loughton Technology, L.L.C. Organizational viewing techniques
US8914865B2 (en) * 2006-05-27 2014-12-16 Loughton Technology, L.L.C. Data storage and access facilitating techniques
US10777375B2 (en) 2006-05-27 2020-09-15 Gula Consulting Limited Liability Company Electronic leakage reduction techniques
US9401254B2 (en) 2006-05-27 2016-07-26 Gula Consulting Limited Liability Company Electronic leakage reduction techniques
US20080086680A1 (en) * 2006-05-27 2008-04-10 Beckman Christopher V Techniques of document annotation according to subsequent citation
US20100174913A1 (en) * 2009-01-03 2010-07-08 Johnson Simon B Multi-factor authentication system for encryption key storage and method of operation therefor
US20100174922A1 (en) * 2009-01-07 2010-07-08 Johnson Simon B Encryption bridge system and method of operation thereof
US9286493B2 (en) 2009-01-07 2016-03-15 Clevx, Llc Encryption bridge system and method of operation thereof
CN105449449A (en) * 2014-08-26 2016-03-30 鸿富锦精密工业(深圳)有限公司 Electronic product

Also Published As

Publication number Publication date
JP3120749B2 (en) 2000-12-25
JPH10247970A (en) 1998-09-14
CN1136505C (en) 2004-01-28
AU5644898A (en) 1998-09-10
GB2325116B (en) 1999-05-12
CN1202055A (en) 1998-12-16
GB2325116A (en) 1998-11-11
GB9804505D0 (en) 1998-04-29
AU729507B2 (en) 2001-02-01
US6282612B1 (en) 2001-08-28

Similar Documents

Publication Publication Date Title
US6282612B1 (en) Removable memory device for portable terminal device
US6041229A (en) Transferring information
JP3627986B2 (en) Telecommunications system
US4482802A (en) Transaction handling system
US7921305B2 (en) Portable information terminal and data protecting method
EP1071253A1 (en) Securing feature activation in a telecommunication system
US6957338B1 (en) Individual authentication system performing authentication in multiple steps
CN100426409C (en) Storage medium access control method
US20020165008A1 (en) Mobile telephone using subscriber card
US8000755B2 (en) Information-communication terminal device and automatic backup system including the same
KR100472404B1 (en) Game program supply system and program rewrite system
US6907529B1 (en) Document management system
EP1821564A2 (en) Method of mobile unit registration and method of IC card registration for mobile communications system, and mobile unit, IC card and IC card insertion type mobile unit implementing such methods
KR20000069102A (en) Information security method and apparatus
US6804730B1 (en) Access control device, access control method, recording medium, and computer data signal for controlling allowance of access to storage area using certification data
JP2001326719A (en) Device and method for communication
JPH1166008A (en) Game device utilizing ic card
JPH09259235A (en) Portable information storage medium, applicant information input device, portable information storage medium system, and data access method for portable information storage medium
US6934374B2 (en) System and method for data communication
CN100363857C (en) Safety access method of system bootrom
JP4649096B2 (en) Information processing system
JP4158229B2 (en) Wireless communication system
JP5475699B2 (en) Remote lock system and mobile communication terminal
EP0856819B1 (en) Communication system for carrying out pin related services on a chipcard, a chipcard suitable for such a communication system, and method for carrying out a pin related service on the chipcard
CN1894647B (en) Protecting system for data used by Java applications

Legal Events

Date Code Title Description
AS Assignment

Owner name: NEC CORPORATION, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAKAJIRI, NORIYASU;HAYASHI, KEIICHI;REEL/FRAME:009013/0119

Effective date: 19980223

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: LENOVO INNOVATIONS LIMITED (HONG KONG), HONG KONG

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEC CORPORATION;REEL/FRAME:033720/0767

Effective date: 20140618