US20010016895A1 - Removable memory device for portable terminal device - Google Patents
Removable memory device for portable terminal device Download PDFInfo
- Publication number
- US20010016895A1 US20010016895A1 US09/033,613 US3361398A US2001016895A1 US 20010016895 A1 US20010016895 A1 US 20010016895A1 US 3361398 A US3361398 A US 3361398A US 2001016895 A1 US2001016895 A1 US 2001016895A1
- Authority
- US
- United States
- Prior art keywords
- portable terminal
- terminal device
- removable memory
- memory device
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/275—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips implemented by means of portable electronic directories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/14—Details of telephonic subscriber devices including a card reading device
Definitions
- the present invention relates to removable memory devices.
- the present invention relates to a removable memory device for a portable terminal device that can be removably connected to such a portable terminal device as, e.g., a portable telephone and can store therein ID information, a telephone number list, and so on, etc., inherent in each portable terminal device.
- Such a portable terminal device as a portable telephone comprises a memory device which stores therein, for example, such a telephone number list as abbreviated dialing numbers or such individual information as ID information inherent in each portable terminal device, entered by a user.
- a user wants to exchange the portable terminal device with another due to user's upgrading to a newer device, it is desirable to enable copying of the individual information already stored in the portable terminal device used so far to a new portable terminal device and also to enable use of the new portable terminal device with the same individual information.
- Japanese Patent Application Laid-Open Publication No. Hei-4-302245 Disclosed in Japanese Patent Application Laid-Open Publication No. Hei-4-302245 is a system wherein an information memory device for storing information necessary for operation of a radio telephone set, i.e., operation lock/unlock information, radio telephone participation information, or attached function restriction information, private information (i.e., individual information) such as a telephone number list, as explained in Japanese Patent Application Laid-Open Publication No. Hei-4-302245, is made in the form of an ID card or a chip and the information memory device is arranged to be removably connected to the radio telephone device.
- an information memory device for storing information necessary for operation of a radio telephone set, i.e., operation lock/unlock information, radio telephone participation information, or attached function restriction information, private information (i.e., individual information) such as a telephone number list, as explained in Japanese Patent Application Laid-Open Publication No. Hei-4-302245, is made in the form of
- the prior art radio telephone device has a problem that, since anyone can simply remove the information memory device therefrom, when another user removes the information memory device from other's radio telephone device and attaches the information memory device to his or her own radio telephone device, he or she can use it with use of the other's individual information.
- an object of the present invention is to provide a removable memory device for a portable terminal device which, when a user wants to exchange an old portable terminal device with new one and to use the new portable terminal device with individual information used so far, can reliably shift the individual information, can shorten a time necessary for the information shift to a large extent and can prevent easy illegal use of the individual information of the portable terminal device by others.
- the memory device has a controller for judging an input command from a personal computer connected to the portable terminal device when the memory device is disconnected from the portable terminal device and a memory manager for protecting the memory at the time of the removal.
- the memory device has a controller for detecting a connection with the portable terminal and a memory manager having a function of erasing the memory.
- the removable memory device in accordance with the present invention can be removed from the portable terminal device when a remove command (e.g., password) is entered.
- a remove command e.g., password
- the user when wanting to exchange the terminal device, the user can exchange the individual information in a short time and also can prevent the user or a third party from illegally removing the memory device from the terminal device.
- FIG. 1 is a block diagram of a removable memory device in accordance with a first embodiment of the present invention.
- FIG. 2 is a configuration for explaining the shifting operation of individual information of a portable terminal device using the removable memory device in accordance with the present invention.
- FIG. 3 is a flowchart for explaining the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention.
- FIG. 4 is a flowchart for explaining the operation of the removable memory device according to the first embodiment of the present invention when the removable memory device was illegally removed from the portable terminal device.
- FIG. 5 is a block diagram of a removable memory device and a part of a portable terminal device in accordance with a second embodiment of the present invention.
- FIG. 6 is a flowchart for explaining the operation of the removable memory device according to the second embodiment of the present invention when the removable memory device was illegally removed from the portable terminal device.
- a first portable terminal device as a copy originator, is connected to such an intermediate controller as a personal computer to transfer the individual information already stored in the memory device of the first portable terminal device to the intermediate controller.
- a second portable terminal device as a copy destinator, is connected to the intermediate controller to transfer to the second portable terminal device the individual information transferred from the first portable terminal device to the intermediate controller.
- the second portable terminal device stores in its own memory device the individual information transferred from the intermediate controller, at which stage the copying operation of the individual information is completed.
- the related method has had a problem that the individual information is first transferred from the first portable terminal device to the intermediate controller and then stored in the memory device of the second portable terminal device, so that there is a danger that erroneous transfer of the individual information or data destruction during transmission may take place and an increased amount of information involves a longer transfer time.
- FIG. 1 is a block diagram of a removable memory device in accordance with a first embodiment of the present invention.
- a removable memory device 1 is made up of a memory 5 for storing individual information therein, a memory manager 6 for protecting the memory when the removable memory device 1 is not connected to a portable terminal device and for allowing access thereto when the removable memory device is connected, a data input/output part 4 as a data sending/receiving port to/from a data input/output part 2 of the portable terminal device, and a controller 3 for detecting an interconnection with the portable terminal device through the data input/output part 4 and for controlling the memory manager 6 .
- FIG. 2 is a configuration for explaining the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention
- FIG. 3 is a flowchart for explaining the operation thereof. Explanation will be made herein as to the shifting operation of the individual information stored in portable terminal device A in FIG. 2 to a portable terminal device B, by referring to steps (F- 1 ) to (F- 16 ) in FIG. 3.
- the portable terminal device A is put in its maintenance mode (step (F- 1 )).
- the maintenance mode may either be automatically entered when the portable terminal device A is connected to the personal computer 10 , or the maintenance mode may be entered after a command to enter the maintenance mode is input via the personal computer 10 .
- the personal computer 10 acts as an information input/output apparatus for inputting commands, etc., to the portable terminal device or for displaying thereon information received from the portable terminal device.
- the portable terminal device In the maintenance mode of the portable terminal device, the portable terminal device can do transactions on various types of maintenances. In the maintenance mode, when it is not associated with the removable memory device, the portable terminal device shifts to various types of maintenance modes (steps (F- 2 ), (F- 16 )).
- a maintenance operator selects a removable mode for the removable memory device 1 . More specifically, the operator enters a remove command into the portable terminal device A connected to the personal computer 10 (steps (F- 2 ) and (F- 3 )). This remove command is accepted by the controller 3 of the removable memory device 1 via the data input/output part 2 of the Portable terminal device A and the data input/output part 4 of the removable memory device 1 (refer to FIG. 1).
- the controller 3 after accepting the remove command, requires a password from the maintenance operator.
- the maintenance operator in response to the password request, enters the password (password for the removal) from the personal computer 10 (step (F- 4 )).
- the controller 3 finds a password coincidence between the operator-entered password and a password stored in the removable memory device 1 (step (F- 5 ))
- the controller 3 issues to the memory manager 6 a command to protect the memory 5 (step (F- 6 )).
- the step (F- 5 ) when the maintenance operator removes the removable memory device 1 from the portable terminal device A without finding a password coincidence in the controller 3 , the contents stored in the memory 5 is erased and the memory 5 is initialized.
- the removable memory device 1 may be removed from the portable terminal device A without erasing the contents stored in the memory 5 . In this case, as described later, when the portable terminal device B mounted the removable memory device 1 is connected to the personal computer 10 , the contents stored in the memory 5 .
- the password stored in the removable memory device 1 is typically only changeable by a user with system privileges or the like, and cannot be changed by a normal user. This password may be stored in the removable memory device (either in the controller 3 or the memory 5 ) during manufacture of the removable memory device 1 , for example.
- the memory manager 6 when receiving the instruction, protects the memory 5 and then issues a notification of completion of the memory protection to the controller 3 (step (F- 7 )).
- the controller 3 when receiving the notification, informs the personal computer 10 that the portable terminal device A is removable from the personal computer 10 via the portable terminal device A (step (F- 8 )).
- the personal computer 10 when receiving the removable notification, informs the maintenance operator to remove the portable terminal device A from the personal computer 10 and to remove the removable memory device 1 from the portable terminal device A.
- the maintenance operator after receiving the removal notice by means of the personal computer 10 , removes the removable memory device 1 from the portable terminal device A (step (F- 9 )), mounts the removable memory device 1 into the portable terminal device B with protecting the contents stored in the memory 5 , connects the portable terminal device B to the personal computer 10 , selects a connection mode of the removable memory device 1 from the maintenance mode (F- 1 ), and then enters on the personal computer 10 a connect command to the portable terminal device B (steps (F- 2 ) and (F- 3 )).
- step (F- 10 ) Even when the controller 3 receives this connect command, as in the remove command explained previously, the controller 3 demands the password of the maintenance operator (step (F- 10 )).
- step (F- 11 ) the controller issues a memory release instruction to the memory manager 6 (step (F- 12 )).
- step (F- 11 ) when the maintenance operator removes the removable memory device 1 from the portable terminal device A without finding a password coincidence in the controller 3 , the contents stored in the memory 5 is erased and the memory 5 is initialized.
- This instruction causes the memory manager 6 to release the memory 5 and to inform the controller 3 of completion of the memory release (step (F- 13 )).
- the controller 3 after receiving the notification, informs the personal computer 10 of completion of the connection of the removable memory device 1 via the portable terminal device B (step (F- 14 )).
- the maintenance operator is permitted to separate the portable terminal device B from the personal computer 10 .
- the operator can use the portable terminal device B (step (F- 15 )).
- the controller 3 when confirming a connection of the portable terminal device through the data input/output part 4 (step (S- 1 )) and the memory protection is not carried out (step (S- 2 )) and the memory 5 is not newly mounted (step (S- 3 )) (that is, when incorrect removal is carried out), issues a memory erase instruction to the memory manager 6 .
- the memory manager 6 when receiving the memory erase instruction, completes erasing of the contents stored in the memory 5 and then informs the controller 3 of completion of the memory erase.
- the controller 3 after receiving the notification, newly utilizes the memory 5 (step (S- 4 )).
- step (S- 2 ) when the memory protection is carried out, the contents stored in the memory 5 is not erased even if the maintenance operator removes the removable memory device 1 from the portable terminal device A.
- step (S- 3 ) when the memory 5 is newly mounted, the memory 5 is initialized.
- the present invention can be arranged so that the portable terminal device prohibits its operation using the individual information stored in the removable memory device 1 connected thereto.
- the removable memory device in accordance with the present invention is arranged so that an operator is required to enter the remove command (password) after connected from the personal computer and at the time of connection, operator's input of the connect command (password) from the personal computer causes the memory to be released.
- This enables the memory having the individual information already stored therein to be protected, so that illegal access can be prevented and shift of the individual information can be easily realized even at the time of exchange between portable terminal devices.
- FIG. 5 A second embodiment of the invention is shown in FIG. 5.
- the controller 3 ′ is provided in the portable terminal device A′, which is external to the remote memory device 1 ′.
- FIG. 6 is a flowchart for explaining the operation according to the second embodiment.
- the controller 3 ′ issues a command to the memory manager 6 to erase the contents stored in the memory 5 if the memory 5 is not protected.
- the memory manager 6 informs the controller 3 ′ of completion of the memory erase (via the data input output part 4 of the removable memory device 1 ′ and the data input/output part 2 of the portable terminal device A′).
- the controller 3 ′ after receiving the notification, newly utilizes the memory 5 (step S- 8 ).
- the memory 5 is not immediately erased under command of a controller 3 external to the removable memory device 1 ′ after disconnection of a removable memory device 1 ′ from a portable terminal device A′, in which the removable memory device has a non-new, non-protected memory (as in the first embodiment), but instead the erasure is performed by a controller 3 ′ external to the removable memory device 1 ′ at a time when the removable memory device 1 ′ is reconnected to a portable terminal device A′ (having a controller 3 ′ housed therein).
- the controller is housed in the personal computer 10 .
- a maintenance operator enters commands, a password, and so on, from a personal computer 10 .
- the maintenance operator may be able to enter them from a portable terminal device A.
- the maintenance operator enters commands, a password, and so on, but a user of a portable terminal device A may be able to enter them.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Description
- 1. Field of the Invention
- The present invention relates to removable memory devices. In particular, the present invention relates to a removable memory device for a portable terminal device that can be removably connected to such a portable terminal device as, e.g., a portable telephone and can store therein ID information, a telephone number list, and so on, etc., inherent in each portable terminal device.
- 2. Description of the Related Art
- Such a portable terminal device as a portable telephone comprises a memory device which stores therein, for example, such a telephone number list as abbreviated dialing numbers or such individual information as ID information inherent in each portable terminal device, entered by a user. When a user wants to exchange the portable terminal device with another due to user's upgrading to a newer device, it is desirable to enable copying of the individual information already stored in the portable terminal device used so far to a new portable terminal device and also to enable use of the new portable terminal device with the same individual information.
- Disclosed in Japanese Patent Application Laid-Open Publication No. Hei-4-302245 is a system wherein an information memory device for storing information necessary for operation of a radio telephone set, i.e., operation lock/unlock information, radio telephone participation information, or attached function restriction information, private information (i.e., individual information) such as a telephone number list, as explained in Japanese Patent Application Laid-Open Publication No. Hei-4-302245, is made in the form of an ID card or a chip and the information memory device is arranged to be removably connected to the radio telephone device.
- In that system, when it is desired to exchange the radio telephone device with a newer device, by just removing the information memory device from the old radio telephone device and then attaching it to the new radio telephone device, the user can use the new radio telephone device under the same environment (that is, the same individual information) as that of the old radio telephone device.
- However, the prior art radio telephone device has a problem that, since anyone can simply remove the information memory device therefrom, when another user removes the information memory device from other's radio telephone device and attaches the information memory device to his or her own radio telephone device, he or she can use it with use of the other's individual information.
- In view of the above, the present invention has been made, and an object of the present invention is to provide a removable memory device for a portable terminal device which, when a user wants to exchange an old portable terminal device with new one and to use the new portable terminal device with individual information used so far, can reliably shift the individual information, can shorten a time necessary for the information shift to a large extent and can prevent easy illegal use of the individual information of the portable terminal device by others.
- With the removable memory device for the portable terminal device in accordance with the present invention, when a user wants to exchange an old terminal device with new one, the user is required to protect an individual information already stored in the memory device.
- In more detail, the memory device has a controller for judging an input command from a personal computer connected to the portable terminal device when the memory device is disconnected from the portable terminal device and a memory manager for protecting the memory at the time of the removal.
- When the removable memory device of the present invention is illegally removed from the portable terminal device, the individual information stored in the memory is erased.
- More specifically, the memory device has a controller for detecting a connection with the portable terminal and a memory manager having a function of erasing the memory.
- The removable memory device in accordance with the present invention can be removed from the portable terminal device when a remove command (e.g., password) is entered.
- For this reason, when wanting to exchange the terminal device, the user can exchange the individual information in a short time and also can prevent the user or a third party from illegally removing the memory device from the terminal device.
- The above-mentioned objects and advantages of the invention will become more apparent from the following detailed description when read in conjunction with the accompanying drawings, with like reference numerals indicating corresponding parts throughout, and wherein:
- FIG. 1 is a block diagram of a removable memory device in accordance with a first embodiment of the present invention.
- FIG. 2 is a configuration for explaining the shifting operation of individual information of a portable terminal device using the removable memory device in accordance with the present invention.
- FIG. 3 is a flowchart for explaining the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention.
- FIG. 4 is a flowchart for explaining the operation of the removable memory device according to the first embodiment of the present invention when the removable memory device was illegally removed from the portable terminal device.
- FIG. 5 is a block diagram of a removable memory device and a part of a portable terminal device in accordance with a second embodiment of the present invention.
- FIG. 6 is a flowchart for explaining the operation of the removable memory device according to the second embodiment of the present invention when the removable memory device was illegally removed from the portable terminal device.
- The present invention will be explained in connection with the drawings. Embodiments of the present invention will then be explained in detail with reference to the drawings. First, a related system will be discussed.
- Explanation will now be made as to how to copy the individual information to another portable terminal device in a related portable terminal device.
- Initially, a first portable terminal device, as a copy originator, is connected to such an intermediate controller as a personal computer to transfer the individual information already stored in the memory device of the first portable terminal device to the intermediate controller. Next, after the first portable terminal device is removed from the intermediate controller, a second portable terminal device, as a copy destinator, is connected to the intermediate controller to transfer to the second portable terminal device the individual information transferred from the first portable terminal device to the intermediate controller. The second portable terminal device stores in its own memory device the individual information transferred from the intermediate controller, at which stage the copying operation of the individual information is completed.
- However, the related method has had a problem that the individual information is first transferred from the first portable terminal device to the intermediate controller and then stored in the memory device of the second portable terminal device, so that there is a danger that erroneous transfer of the individual information or data destruction during transmission may take place and an increased amount of information involves a longer transfer time.
- FIG. 1 is a block diagram of a removable memory device in accordance with a first embodiment of the present invention.
- A
removable memory device 1 is made up of amemory 5 for storing individual information therein, amemory manager 6 for protecting the memory when theremovable memory device 1 is not connected to a portable terminal device and for allowing access thereto when the removable memory device is connected, a data input/output part 4 as a data sending/receiving port to/from a data input/output part 2 of the portable terminal device, and acontroller 3 for detecting an interconnection with the portable terminal device through the data input/output part 4 and for controlling thememory manager 6. - Explanation will next be made as to the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention, by referring to FIGS. 2 and 3. FIG. 2 is a configuration for explaining the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention, and FIG. 3 is a flowchart for explaining the operation thereof. Explanation will be made herein as to the shifting operation of the individual information stored in portable terminal device A in FIG. 2 to a portable terminal device B, by referring to steps (F-1) to (F-16) in FIG. 3.
- First of all, by connecting the portable terminal device A to a
personal computer 10, the portable terminal device A is put in its maintenance mode (step (F-1)). The maintenance mode may either be automatically entered when the portable terminal device A is connected to thepersonal computer 10, or the maintenance mode may be entered after a command to enter the maintenance mode is input via thepersonal computer 10. - In most systems, a command is required to enter the maintenance mode, but some systems allow for an automatically-entered maintenance when the portable terminal device A is connected to the
personal computer 10. - The
personal computer 10 acts as an information input/output apparatus for inputting commands, etc., to the portable terminal device or for displaying thereon information received from the portable terminal device. In the maintenance mode of the portable terminal device, the portable terminal device can do transactions on various types of maintenances. In the maintenance mode, when it is not associated with the removable memory device, the portable terminal device shifts to various types of maintenance modes (steps (F-2), (F-16)). - In this maintenance mode, next, a maintenance operator selects a removable mode for the
removable memory device 1. More specifically, the operator enters a remove command into the portable terminal device A connected to the personal computer 10 (steps (F-2) and (F-3)). This remove command is accepted by thecontroller 3 of theremovable memory device 1 via the data input/output part 2 of the Portable terminal device A and the data input/output part 4 of the removable memory device 1 (refer to FIG. 1). - The
controller 3, after accepting the remove command, requires a password from the maintenance operator. The maintenance operator, in response to the password request, enters the password (password for the removal) from the personal computer 10 (step (F-4)). When thecontroller 3 finds a password coincidence between the operator-entered password and a password stored in the removable memory device 1 (step (F-5)), thecontroller 3 issues to the memory manager 6 a command to protect the memory 5 (step (F-6)). In the step (F-5), when the maintenance operator removes theremovable memory device 1 from the portable terminal device A without finding a password coincidence in thecontroller 3, the contents stored in thememory 5 is erased and thememory 5 is initialized. Theremovable memory device 1 may be removed from the portable terminal device A without erasing the contents stored in thememory 5. In this case, as described later, when the portable terminal device B mounted theremovable memory device 1 is connected to thepersonal computer 10, the contents stored in thememory 5. The password stored in theremovable memory device 1 is typically only changeable by a user with system privileges or the like, and cannot be changed by a normal user. This password may be stored in the removable memory device (either in thecontroller 3 or the memory 5) during manufacture of theremovable memory device 1, for example. - The
memory manager 6, when receiving the instruction, protects thememory 5 and then issues a notification of completion of the memory protection to the controller 3 (step (F-7)). Thecontroller 3, when receiving the notification, informs thepersonal computer 10 that the portable terminal device A is removable from thepersonal computer 10 via the portable terminal device A (step (F-8)). Thepersonal computer 10, when receiving the removable notification, informs the maintenance operator to remove the portable terminal device A from thepersonal computer 10 and to remove theremovable memory device 1 from the portable terminal device A. - The maintenance operator, after receiving the removal notice by means of the
personal computer 10, removes theremovable memory device 1 from the portable terminal device A (step (F-9)), mounts theremovable memory device 1 into the portable terminal device B with protecting the contents stored in thememory 5, connects the portable terminal device B to thepersonal computer 10, selects a connection mode of theremovable memory device 1 from the maintenance mode (F-1), and then enters on the personal computer 10 a connect command to the portable terminal device B (steps (F-2) and (F-3)). - Even when the
controller 3 receives this connect command, as in the remove command explained previously, thecontroller 3 demands the password of the maintenance operator (step (F-10)). When thecontroller 3 finds a coincidence of the password entered by the maintenance operator (step (F-11)), the controller issues a memory release instruction to the memory manager 6 (step (F-12)). In the step (F-11), when the maintenance operator removes theremovable memory device 1 from the portable terminal device A without finding a password coincidence in thecontroller 3, the contents stored in thememory 5 is erased and thememory 5 is initialized. - This instruction causes the
memory manager 6 to release thememory 5 and to inform thecontroller 3 of completion of the memory release (step (F-13)). Thecontroller 3, after receiving the notification, informs thepersonal computer 10 of completion of the connection of theremovable memory device 1 via the portable terminal device B (step (F-14)). Thereafter, the maintenance operator is permitted to separate the portable terminal device B from thepersonal computer 10. After the portable terminal device B is separated from thepersonal computer 10, the operator can use the portable terminal device B (step (F-15)). - Explanation will then be made as to the operation of the
removable memory device 1 according to the first embodiment when the operator removes theremovable memory device 1 from the portable terminal device without following the above procedure, by referring to a flowchart of FIG. 4. - The
controller 3, when confirming a connection of the portable terminal device through the data input/output part 4 (step (S-1)) and the memory protection is not carried out (step (S-2)) and thememory 5 is not newly mounted (step (S-3)) (that is, when incorrect removal is carried out), issues a memory erase instruction to thememory manager 6. Thememory manager 6, when receiving the memory erase instruction, completes erasing of the contents stored in thememory 5 and then informs thecontroller 3 of completion of the memory erase. Thecontroller 3, after receiving the notification, newly utilizes the memory 5 (step (S-4)). - In the step (S-2), when the memory protection is carried out, the contents stored in the
memory 5 is not erased even if the maintenance operator removes theremovable memory device 1 from the portable terminal device A. In the step (S-3), when thememory 5 is newly mounted, thememory 5 is initialized. - When the operator connects the
removable memory device 1 to the portable terminal device without following the aforementioned procedure, the present invention can be arranged so that the portable terminal device prohibits its operation using the individual information stored in theremovable memory device 1 connected thereto. - As has been explained in the foregoing, the removable memory device in accordance with the present invention is arranged so that an operator is required to enter the remove command (password) after connected from the personal computer and at the time of connection, operator's input of the connect command (password) from the personal computer causes the memory to be released. This enables the memory having the individual information already stored therein to be protected, so that illegal access can be prevented and shift of the individual information can be easily realized even at the time of exchange between portable terminal devices.
- A second embodiment of the invention is shown in FIG. 5. In that figure, the
controller 3′ is provided in the portable terminal device A′, which is external to theremote memory device 1′. FIG. 6 is a flowchart for explaining the operation according to the second embodiment. In FIG. 6, when theremovable memory device 1′ is disconnected from a portable terminal device A′ and then later reconnected to the same portable terminal device A′ or to another portable terminal device (step S-5), and thememory 5 is not protected (step S-6), and thememory 5 is not newly mounted (step S-7), thecontroller 3′ issues a command to thememory manager 6 to erase the contents stored in thememory 5 if thememory 5 is not protected. After anon-protected memory 5 has been erased, thememory manager 6 informs thecontroller 3′ of completion of the memory erase (via the datainput output part 4 of theremovable memory device 1′ and the data input/output part 2 of the portable terminal device A′). Thecontroller 3′, after receiving the notification, newly utilizes the memory 5 (step S-8). Thus, in the second embodiment, thememory 5 is not immediately erased under command of acontroller 3 external to theremovable memory device 1′ after disconnection of aremovable memory device 1′ from a portable terminal device A′, in which the removable memory device has a non-new, non-protected memory (as in the first embodiment), but instead the erasure is performed by acontroller 3′ external to theremovable memory device 1′ at a time when theremovable memory device 1′ is reconnected to a portable terminal device A′ (having acontroller 3′ housed therein). In an alternative embodiment, the controller is housed in thepersonal computer 10. - While embodiments have been described herein, modification of the described embodiments may become apparent to those of ordinary skill in the art, following the teachings of the invention, without departing from the scope of the invention as set forth in the appended claims. For example, other ways of disabling the removable memory device may be contemplated while remaining within the teachings of the invention, such as, for example, disabling the data input/
output part 4 or thememory manager 6, and not erasing thememory 5. For the data input/output part, this would require a control signal (not shown in FIG. 1) from thecontroller 3 to the data input/output part 4, where that control signal would disable the data input/output part 4. - Further, in the embodiments of the invention, a maintenance operator enters commands, a password, and so on, from a
personal computer 10. However, the maintenance operator may be able to enter them from a portable terminal device A. - Moreover, in the embodiments of this invention, the maintenance operator enters commands, a password, and so on, but a user of a portable terminal device A may be able to enter them.
Claims (17)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP09048627A JP3120749B2 (en) | 1997-03-04 | 1997-03-04 | Removable storage device for portable terminal device |
JP9-48627 | 1997-03-04 | ||
JP9-048627 | 1997-03-04 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20010016895A1 true US20010016895A1 (en) | 2001-08-23 |
US6282612B1 US6282612B1 (en) | 2001-08-28 |
Family
ID=12808640
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/033,613 Expired - Lifetime US6282612B1 (en) | 1997-03-04 | 1998-03-03 | Removable memory device for portable terminal device |
Country Status (5)
Country | Link |
---|---|
US (1) | US6282612B1 (en) |
JP (1) | JP3120749B2 (en) |
CN (1) | CN1136505C (en) |
AU (1) | AU729507B2 (en) |
GB (1) | GB2325116B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020116575A1 (en) * | 2000-11-07 | 2002-08-22 | Yuji Toyomura | Carryable memory media, portable information terminal using the same and method for managing files therein |
US20040030830A1 (en) * | 2001-02-26 | 2004-02-12 | Tokyo Electron Device Limited | Storage medium control method, storage medium control device, and storage medium adaptor |
EP1538855A2 (en) * | 2003-12-01 | 2005-06-08 | Sony Ericsson Mobile Communications Japan, Inc. | Method of preventing access to a subscriber identity module in a mobile communication terminal |
US20060004974A1 (en) * | 2003-03-13 | 2006-01-05 | Paul Lin | Portable non-volatile memory device and method for preventing unauthorized access to data stored thereon |
US20060087699A1 (en) * | 2004-09-28 | 2006-04-27 | Seiko Epson Corporation | Image processing apparatus, control method of the same, and storage medium |
US20070288756A1 (en) * | 2006-05-18 | 2007-12-13 | Fuji Xerox Co., Ltd. | Data processing apparatus, data processing method, and computer readable medium |
US20080086680A1 (en) * | 2006-05-27 | 2008-04-10 | Beckman Christopher V | Techniques of document annotation according to subsequent citation |
US20080092219A1 (en) * | 2006-05-27 | 2008-04-17 | Beckman Christopher V | Data storage and access facilitating techniques |
US20080215841A1 (en) * | 2005-07-21 | 2008-09-04 | Clevx, Llc | Memory Lock System |
US20100174922A1 (en) * | 2009-01-07 | 2010-07-08 | Johnson Simon B | Encryption bridge system and method of operation thereof |
US20100174913A1 (en) * | 2009-01-03 | 2010-07-08 | Johnson Simon B | Multi-factor authentication system for encryption key storage and method of operation therefor |
USRE45422E1 (en) | 2006-05-27 | 2015-03-17 | Loughton Technology, L.L.C. | Organizational viewing techniques |
CN105449449A (en) * | 2014-08-26 | 2016-03-30 | 鸿富锦精密工业(深圳)有限公司 | Electronic product |
US9401254B2 (en) | 2006-05-27 | 2016-07-26 | Gula Consulting Limited Liability Company | Electronic leakage reduction techniques |
Families Citing this family (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3544297B2 (en) * | 1998-04-08 | 2004-07-21 | 富士通株式会社 | Access control method, storage device, and storage medium |
JP3866892B2 (en) * | 2000-02-15 | 2007-01-10 | 株式会社日立グローバルストレージテクノロジーズ | Information processing device and its maintenance service system |
US7493437B1 (en) | 2000-07-06 | 2009-02-17 | Mcm Portfolio Llc | Flashtoaster for reading several types of flash memory cards with or without a PC |
US6438638B1 (en) | 2000-07-06 | 2002-08-20 | Onspec Electronic, Inc. | Flashtoaster for reading several types of flash-memory cards with or without a PC |
US7252240B1 (en) | 2000-07-06 | 2007-08-07 | Onspec Electronics, Inc. | Memory module which includes a form factor connector |
US7295443B2 (en) | 2000-07-06 | 2007-11-13 | Onspec Electronic, Inc. | Smartconnect universal flash media card adapters |
US7278051B2 (en) | 2000-07-06 | 2007-10-02 | Onspec Electronic, Inc. | Field-operable, stand-alone apparatus for media recovery and regeneration |
JP2002149456A (en) * | 2000-11-07 | 2002-05-24 | Matsushita Electric Ind Co Ltd | Portable storage medium, file management method in portable storage medium, and portable terminal |
FR2818474B1 (en) * | 2000-12-18 | 2003-02-21 | Richard Toffolet | METHOD FOR THE FIGHT AGAINST THEFT OF "NOMADIC" DEVICES, DEVICE AND CORRESPONDING INSTALLATION |
EP1480395B1 (en) * | 2001-03-19 | 2007-04-25 | Sony Corporation | Network system |
EP1258807A3 (en) * | 2001-05-14 | 2005-11-02 | Matsushita Electric Industrial Co., Ltd. | Illegal access monitoring device, ic card, and illegal access monitoring method |
KR100711913B1 (en) * | 2002-02-04 | 2007-04-27 | 엘지전자 주식회사 | Method for securing data stored in hard discs of a computer system |
EP1540448A2 (en) * | 2002-04-08 | 2005-06-15 | Socket Communications, Inc. | Wireless enabled memory module |
JP2003331241A (en) * | 2002-05-09 | 2003-11-21 | Fujitsu Ltd | Memory device and method of controlling the same |
US20110063835A1 (en) * | 2002-09-23 | 2011-03-17 | Nelson Rivas | Led lighting apparatus |
JP2005011151A (en) * | 2003-06-20 | 2005-01-13 | Renesas Technology Corp | Memory card |
DE10340861A1 (en) * | 2003-09-04 | 2005-04-07 | Infineon Technologies Ag | A processor circuit and method for associating a logic chip with a memory chip |
KR100605920B1 (en) * | 2004-02-17 | 2006-08-02 | 삼성전자주식회사 | Method for securing external memory in wireless terminal |
US20060150247A1 (en) * | 2004-12-30 | 2006-07-06 | Andrew Gafken | Protection of stored data |
US8887295B2 (en) * | 2005-06-27 | 2014-11-11 | Safend Ltd. | Method and system for enabling enterprises to use detachable memory devices that contain data and executable files in controlled and secure way |
US7861934B1 (en) * | 2006-05-05 | 2011-01-04 | CompuSystems, Inc. | Devices and method for recording sales leads |
US20080040590A1 (en) * | 2006-08-11 | 2008-02-14 | Lea Hwang Lee | Selective branch target buffer (btb) allocaiton |
US20080040591A1 (en) * | 2006-08-11 | 2008-02-14 | Moyer William C | Method for determining branch target buffer (btb) allocation for branch instructions |
US20080195824A1 (en) * | 2007-02-09 | 2008-08-14 | Microsoft Corporation | Context sensitive caching on removable storage |
US8104920B2 (en) * | 2008-06-01 | 2012-01-31 | Jack Dubord | Adjustable modular lighting system and method of using same |
US9355238B2 (en) * | 2010-05-26 | 2016-05-31 | Ncr Corporation | Secure authentication at a self-service terminal |
JP5418460B2 (en) * | 2010-10-04 | 2014-02-19 | ブラザー工業株式会社 | Communication control device and communication system |
US20120246713A1 (en) * | 2011-03-24 | 2012-09-27 | Cheng-Hsiung Liao | Method and apparatus for controlling access of a secure digital memory card |
US10057400B1 (en) | 2012-11-02 | 2018-08-21 | Majen Tech, LLC | Lock screen interface for a mobile device apparatus |
US11431834B1 (en) | 2013-01-10 | 2022-08-30 | Majen Tech, LLC | Screen interface for a mobile device apparatus |
US10051103B1 (en) | 2013-01-10 | 2018-08-14 | Majen Tech, LLC | Screen interface for a mobile device apparatus |
EP2956825B1 (en) | 2013-03-15 | 2020-06-24 | Apple Inc. | Facilitating transactions with a user account using a wireless device |
US10726472B2 (en) | 2014-03-31 | 2020-07-28 | Monticello Enterprises LLC | System and method for providing simplified in-store, product-based and rental payment processes |
US11282131B2 (en) | 2014-03-31 | 2022-03-22 | Monticello Enterprises LLC | User device enabling access to payment information in response to user input |
US11080777B2 (en) | 2014-03-31 | 2021-08-03 | Monticello Enterprises LLC | System and method for providing a social media shopping experience |
US10511580B2 (en) | 2014-03-31 | 2019-12-17 | Monticello Enterprises LLC | System and method for providing a social media shopping experience |
US9400977B2 (en) | 2014-05-29 | 2016-07-26 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US9299072B2 (en) | 2014-05-29 | 2016-03-29 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
US11017384B2 (en) * | 2014-05-29 | 2021-05-25 | Apple Inc. | Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4430728A (en) * | 1981-12-29 | 1984-02-07 | Marathon Oil Company | Computer terminal security system |
JPS6270096A (en) | 1985-09-24 | 1987-03-31 | カシオ計算機株式会社 | Holder for integrated circuit card |
JPS63191450A (en) | 1987-02-04 | 1988-08-08 | Hitachi Ltd | Telephone system |
JPH02305159A (en) * | 1989-05-19 | 1990-12-18 | Toshiba Corp | Radio telephone set |
JPH0331949A (en) | 1989-06-29 | 1991-02-12 | Hitachi Ltd | Information processor |
US5293610A (en) * | 1989-08-04 | 1994-03-08 | Motorola, Inc. | Memory system having two-level security system for enhanced protection against unauthorized access |
JPH04302245A (en) | 1991-03-29 | 1992-10-26 | Toshiba Corp | Radio telephony system |
EP0605618A4 (en) * | 1991-09-23 | 1998-05-13 | Microsystems Z | Enhanced security system for computing devices. |
SE470519B (en) | 1992-11-09 | 1994-06-27 | Ericsson Telefon Ab L M | Device for providing services such as telephone communication data communication, etc comprising a terminal unit and an access unit |
DE4496561T1 (en) * | 1993-08-31 | 1995-09-21 | Ericsson Ge Mobile Communicat | Device for storing messages in a cellular mobile terminal |
AU691604B2 (en) * | 1994-04-07 | 1998-05-21 | Nokia Telecommunications Oy | A removable subscriber identification module for a mobile radio terminal and a call control method |
US5675628A (en) * | 1994-08-01 | 1997-10-07 | Nokia Telecommunications Oy | Method and apparatus for enabling roaming of subscriber among plural mobile radio systems, using mobile equipment accepting removable subscriber identity module |
FR2732790B1 (en) * | 1995-04-05 | 1997-05-09 | Gemplus Card Int | INFORMATION COLLECTION SYSTEM FOR CARD READERS |
DE19621768B4 (en) * | 1996-05-30 | 2004-03-25 | Siemens Ag | Telephone with a recording device for a telephone memory card and method for transferring data from a telephone memory card |
-
1997
- 1997-03-04 JP JP09048627A patent/JP3120749B2/en not_active Expired - Fee Related
-
1998
- 1998-03-03 GB GB9804505A patent/GB2325116B/en not_active Expired - Fee Related
- 1998-03-03 AU AU56448/98A patent/AU729507B2/en not_active Ceased
- 1998-03-03 US US09/033,613 patent/US6282612B1/en not_active Expired - Lifetime
- 1998-03-04 CN CNB981073875A patent/CN1136505C/en not_active Expired - Fee Related
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020116575A1 (en) * | 2000-11-07 | 2002-08-22 | Yuji Toyomura | Carryable memory media, portable information terminal using the same and method for managing files therein |
US20040030830A1 (en) * | 2001-02-26 | 2004-02-12 | Tokyo Electron Device Limited | Storage medium control method, storage medium control device, and storage medium adaptor |
US20060004974A1 (en) * | 2003-03-13 | 2006-01-05 | Paul Lin | Portable non-volatile memory device and method for preventing unauthorized access to data stored thereon |
US7286852B2 (en) | 2003-12-01 | 2007-10-23 | Sony Ericsson Mobile Communications Japan, Inc. | Subscriber identity module and method of preventing access thereto, and mobile communication terminal device |
EP1538855A2 (en) * | 2003-12-01 | 2005-06-08 | Sony Ericsson Mobile Communications Japan, Inc. | Method of preventing access to a subscriber identity module in a mobile communication terminal |
US20050143059A1 (en) * | 2003-12-01 | 2005-06-30 | Sony Ericsson Mobile Communications Japan, Inc. | Subscriber identity module and method of preventing access thereto, and mobile communication terminal device |
EP1538855A3 (en) * | 2003-12-01 | 2005-11-16 | Sony Ericsson Mobile Communications Japan, Inc. | Method of preventing access to a subscriber identity module in a mobile communication terminal |
US20060087699A1 (en) * | 2004-09-28 | 2006-04-27 | Seiko Epson Corporation | Image processing apparatus, control method of the same, and storage medium |
US10025729B2 (en) | 2005-07-21 | 2018-07-17 | Clevx, Llc | Memory lock system with manipulatable input device and method of operation thereof |
US10083130B2 (en) | 2005-07-21 | 2018-09-25 | Clevx, Llc | Memory lock system with manipulatable input device and method of operation thereof |
US20080215841A1 (en) * | 2005-07-21 | 2008-09-04 | Clevx, Llc | Memory Lock System |
US9075571B2 (en) * | 2005-07-21 | 2015-07-07 | Clevx, Llc | Memory lock system with manipulatable input device and method of operation thereof |
US10503665B2 (en) | 2005-07-21 | 2019-12-10 | Clevx, Llc | Memory lock system with manipulatable input device and method of operation thereof |
US20070288756A1 (en) * | 2006-05-18 | 2007-12-13 | Fuji Xerox Co., Ltd. | Data processing apparatus, data processing method, and computer readable medium |
US8088172B2 (en) * | 2006-05-18 | 2012-01-03 | Fuji Xerox Co., Ltd. | Data processing apparatus, data processing method, and computer readable medium |
US20080092219A1 (en) * | 2006-05-27 | 2008-04-17 | Beckman Christopher V | Data storage and access facilitating techniques |
USRE45422E1 (en) | 2006-05-27 | 2015-03-17 | Loughton Technology, L.L.C. | Organizational viewing techniques |
US8914865B2 (en) * | 2006-05-27 | 2014-12-16 | Loughton Technology, L.L.C. | Data storage and access facilitating techniques |
US10777375B2 (en) | 2006-05-27 | 2020-09-15 | Gula Consulting Limited Liability Company | Electronic leakage reduction techniques |
US9401254B2 (en) | 2006-05-27 | 2016-07-26 | Gula Consulting Limited Liability Company | Electronic leakage reduction techniques |
US20080086680A1 (en) * | 2006-05-27 | 2008-04-10 | Beckman Christopher V | Techniques of document annotation according to subsequent citation |
US20100174913A1 (en) * | 2009-01-03 | 2010-07-08 | Johnson Simon B | Multi-factor authentication system for encryption key storage and method of operation therefor |
US20100174922A1 (en) * | 2009-01-07 | 2010-07-08 | Johnson Simon B | Encryption bridge system and method of operation thereof |
US9286493B2 (en) | 2009-01-07 | 2016-03-15 | Clevx, Llc | Encryption bridge system and method of operation thereof |
CN105449449A (en) * | 2014-08-26 | 2016-03-30 | 鸿富锦精密工业(深圳)有限公司 | Electronic product |
Also Published As
Publication number | Publication date |
---|---|
JP3120749B2 (en) | 2000-12-25 |
JPH10247970A (en) | 1998-09-14 |
CN1136505C (en) | 2004-01-28 |
AU5644898A (en) | 1998-09-10 |
GB2325116B (en) | 1999-05-12 |
CN1202055A (en) | 1998-12-16 |
GB2325116A (en) | 1998-11-11 |
GB9804505D0 (en) | 1998-04-29 |
AU729507B2 (en) | 2001-02-01 |
US6282612B1 (en) | 2001-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6282612B1 (en) | Removable memory device for portable terminal device | |
US6041229A (en) | Transferring information | |
JP3627986B2 (en) | Telecommunications system | |
US4482802A (en) | Transaction handling system | |
US7921305B2 (en) | Portable information terminal and data protecting method | |
EP1071253A1 (en) | Securing feature activation in a telecommunication system | |
US6957338B1 (en) | Individual authentication system performing authentication in multiple steps | |
CN100426409C (en) | Storage medium access control method | |
US20020165008A1 (en) | Mobile telephone using subscriber card | |
US8000755B2 (en) | Information-communication terminal device and automatic backup system including the same | |
KR100472404B1 (en) | Game program supply system and program rewrite system | |
US6907529B1 (en) | Document management system | |
EP1821564A2 (en) | Method of mobile unit registration and method of IC card registration for mobile communications system, and mobile unit, IC card and IC card insertion type mobile unit implementing such methods | |
KR20000069102A (en) | Information security method and apparatus | |
US6804730B1 (en) | Access control device, access control method, recording medium, and computer data signal for controlling allowance of access to storage area using certification data | |
JP2001326719A (en) | Device and method for communication | |
JPH1166008A (en) | Game device utilizing ic card | |
JPH09259235A (en) | Portable information storage medium, applicant information input device, portable information storage medium system, and data access method for portable information storage medium | |
US6934374B2 (en) | System and method for data communication | |
CN100363857C (en) | Safety access method of system bootrom | |
JP4649096B2 (en) | Information processing system | |
JP4158229B2 (en) | Wireless communication system | |
JP5475699B2 (en) | Remote lock system and mobile communication terminal | |
EP0856819B1 (en) | Communication system for carrying out pin related services on a chipcard, a chipcard suitable for such a communication system, and method for carrying out a pin related service on the chipcard | |
CN1894647B (en) | Protecting system for data used by Java applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NEC CORPORATION, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAKAJIRI, NORIYASU;HAYASHI, KEIICHI;REEL/FRAME:009013/0119 Effective date: 19980223 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FPAY | Fee payment |
Year of fee payment: 12 |
|
AS | Assignment |
Owner name: LENOVO INNOVATIONS LIMITED (HONG KONG), HONG KONG Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEC CORPORATION;REEL/FRAME:033720/0767 Effective date: 20140618 |