WO2006051592A1 - 記憶装置及びアクセス制御システム及びアクセス制御方法 - Google Patents
記憶装置及びアクセス制御システム及びアクセス制御方法 Download PDFInfo
- Publication number
- WO2006051592A1 WO2006051592A1 PCT/JP2004/016735 JP2004016735W WO2006051592A1 WO 2006051592 A1 WO2006051592 A1 WO 2006051592A1 JP 2004016735 W JP2004016735 W JP 2004016735W WO 2006051592 A1 WO2006051592 A1 WO 2006051592A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- unit
- password
- data
- storage device
- storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates to a storage device, an access control system, and an access control method.
- Patent Document 1 Japanese Patent Laid-Open No. 11-3033
- Patent Document 2 JP 2002-281012 A
- the present invention temporarily grants access to data and programs to other people and other devices, prevents access to data and programs other than the data and programs that the user wants to permit, and accesses from other than those who give permission.
- the purpose is to prevent.
- a data storage unit for storing data
- a password generator for generating a first password
- a password storage unit for storing the first password generated by the password generation unit
- a password transmission unit for transmitting the first password stored in the password storage unit to the first electronic device
- a password receiving unit that also receives the second password of the second electronic device, the first password stored in the password storage unit and the second password received by the password receiving unit; And an access control unit that controls access from the second electronic device to the data stored in the data storage unit based on the collation result.
- the storage device further includes:
- a data reading unit configured to read the data stored in the data storage unit and transmit the data to the second electronic device by access from the second electronic device controlled by the access control unit; It is characterized by. [0011]
- the storage device further includes:
- a data writing unit is provided that receives new data from the second electronic device and writes it in the data storage unit by access from the second electronic device controlled by the access control unit.
- the data storage unit includes:
- the storage device further includes:
- a program execution unit that executes a program stored in the data storage unit by access from the second electronic device controlled by the access control unit is provided.
- the storage device further includes:
- the access from the second electronic device is controlled based on the result of the authentication unit authenticating the user.
- a private storage unit that accepts only access from a user authenticated by the authentication unit; and a public storage unit that accepts access from all users including the user who are authenticated by the authentication unit.
- the storage device further includes:
- An expiration date setting unit for setting an expiration date of the first password generated by the password generation unit
- An expiration date storage unit that stores the expiration date set by the expiration date setting unit, the access control unit,
- the current time acquired by the current time acquisition unit is compared with the expiration date stored in the expiration date storage unit, and based on the comparison result, the second electronic device is accessed. It is characterized by controlling.
- the password receiver The password receiver
- the data stored in the password storage unit is decrypted with the second secret key received by the password receiving unit, and collated with the data stored in the data storage unit.
- the access control system of the present invention includes:
- an access control system comprising a first electronic device, a second electronic device, and a storage device attached to the first electronic device and the second electronic device
- the storage device includes
- a data storage unit for storing data
- a password generator for generating a first password
- a password storage unit for storing the first password generated by the password generation unit
- a password transmission unit for transmitting the first password stored in the password storage unit to the first electronic device
- a password receiving unit that also receives the second password of the second electronic device, the first password stored in the password storage unit and the second password received by the password receiving unit; Based on the matching result, the data
- An access control unit that controls access from the second electronic device to the data held by the storage unit
- the first electronic device is:
- a first storage device mounting unit for receiving the first password transmitted by the password transmission unit
- a display unit for displaying the first password received by the first storage device mounting unit
- the second electronic device is
- a second storage device mounting unit that transmits the second password to the password receiving unit based on an input value input by the input unit is provided.
- the storage device further includes:
- the access from the second electronic device is controlled based on the result of the authentication unit authenticating the user.
- the data storage unit includes:
- a private storage unit that accepts only access from a user authenticated by the authentication unit; and a public storage unit that accepts access from all users including the user who are authenticated by the authentication unit.
- the first electronic device further includes:
- a first storage unit for storing the first password received by the first storage device mounting unit
- the first password stored in the first storage unit is displayed.
- the storage device further includes:
- the access control unit has an authentication unit that authenticates users,
- the access control unit has an authentication unit that authenticates users,
- the access control unit has an authentication unit that authenticates users,
- the access control unit has an authentication unit that authenticates users,
- the access control unit has an authentication unit that authenticates users,
- the access control unit has an authentication unit that authenticates users,
- the access control unit has an authentication unit that authenticates users,
- the access control unit has an authentication unit that authenticates users.
- the access from the second electronic device is controlled based on the result of the authentication unit authenticating the user.
- the data storage unit includes:
- a private storage unit that accepts only access from a user authenticated by the authentication unit; and a public storage unit that accepts access from all users including the user who are authenticated by the authentication unit.
- the first electronic device further includes:
- a first communication unit for transmitting the first password received by the first storage device mounting unit
- the second electronic device further includes:
- a second communication unit that receives the first password transmitted by the first communication unit, the second storage device mounting unit,
- the first password received by the second communication unit is transmitted to the password receiving unit.
- the storage device further includes:
- the access from the second electronic device is controlled based on the result of the authentication unit authenticating the user.
- the data storage unit includes:
- a private storage unit that accepts only access from a user authenticated by the authentication unit; and a public storage unit that accepts access from all users including the user who are authenticated by the authentication unit.
- the access control method of the present invention includes: In an access control method using a storage device attached to the first electronic device and the second electronic device,
- the storage device includes
- FIG. 1 is a block diagram showing a configuration of a storage device according to the present embodiment and a mobile phone to which the storage device is attached.
- the mobile phone A200 is an example of a first electronic device
- the mobile phone B300 is an example of a second electronic device.
- the storage device 100 is attached to the mobile phone A200 and the mobile phone B300.
- the storage unit 101 is an area for storing data
- the private storage unit 102 is an area in the storage unit 101 for storing data and programs accessible only by the owner of the storage device 100
- the public storage unit 103 is a storage area for storing data and programs that can be accessed by anyone in the storage unit 101.
- the authentication unit 108 identifies the owner for access to the private storage unit 102.
- the controller 104 controls the storage device 100, the input / output of the electronic device in which the storage device 100 is mounted, and the inside of the storage device 100.
- Temporary password generation unit 109 generates a password that is valid for a certain period of time (hereinafter referred to as a temporary password).
- Temporary data management unit 110 uses the temporary password generated by temporary password generation unit 109 to temporarily permit access from another person or another device to the data stored in private storage unit 102.
- the password transmission unit 105 transmits the temporary password generated by the temporary password generation unit 109 to the electronic device in which the storage device 100 is mounted.
- the password receiving unit 106 receives a temporary password from the electronic device in which the storage device 100 is installed. If the temporary password received by the password receiving unit 106 is correct, the data reading unit 107 reads the data stored in the storage unit 101 and transmits the data to the electronic device in which the storage device 100 is attached.
- password storage section 112 stores the temporary password generated by temporary password generation section 109.
- the expiration date setting unit 114 sets the expiration date of the temporary password when the temporary password is generated.
- the expiration date storage unit 113 stores the expiration date.
- the current time acquisition unit 115 acquires the current time.
- the access control unit 111 determines whether the temporary password has not expired or the temporary password is correct, and controls access to the data stored in the storage unit 101.
- the temporary password may be, for example, a 4-digit numerical power PIN or PIN! /.
- the private storage unit 102 is a storage area that can be accessed only when the user authentication by the authentication unit 108 is successful, when data in which a temporary password is set is stored in the private storage unit 102, When the data is accessed, authentication using the temporary password by the temporary data management unit 110 is performed in addition to user authentication by the authentication unit 108.
- the temporary data management unit 110 performs only temporary password authentication and access control on the data, and the authentication unit 108 You can omit user authentication.
- the public storage unit 103 is a storage area that can be accessed regardless of the presence or absence of user authentication by the authentication unit 108, when data in which a temporary password is set is stored in the public storage unit 103.
- the temporary data manager performs authentication and access control with the temporary password for the data.
- the mobile phone A200 is a terminal used by the user A with the storage device 100 attached.
- a storage device IZF (interface) 201 connects the storage device 100 and the mobile phone A200.
- the display unit 204 performs display on a screen such as an LCD (Liquid Crystal Display).
- the input unit 203 is, for example, a numeric key and accepts input from the user A.
- the storage unit 202 is an area for storing data, such as a nonvolatile memory.
- Cellular phone B300 is a terminal used by user B with storage device 100 attached.
- a storage device IZF (interface) 301 connects the storage device 100 and the mobile phone B300.
- a display unit 304 displays on a screen such as an LCD.
- the input unit 303 is a numeric key, for example, and accepts input from the user B force.
- the storage unit 302 is an area for storing data, such as a nonvolatile memory.
- the operation of the storage device 100 is divided into an operation for setting a temporary password and an operation for controlling access to data.
- the former is the operation of the storage device 100 when the user A attaches the storage device 100 to the mobile phone A200 and sets a temporary password
- the latter is the user A disconnects the storage device 100 from the mobile phone A200.
- This is an operation of the storage device 100 when the user B attaches the storage device 100 to the mobile phone B300 of the user B, inputs a temporary password, and acquires data.
- FIG. 2 is a sequence diagram showing data transmission / reception between the storage device 100 and the mobile phone A 200
- FIG. 3 is a flowchart showing a temporary word setting operation of the storage device 100.
- the storage device 100 is mounted on the storage device mounting IZF 201 of the mobile phone A200.
- the mobile phone A200 requests a list of data stored in the storage unit 101 of the storage device 100.
- the data list request to be transmitted is transmitted to the storage device 100 via the storage device mounting IZF201.
- the storage device 100 receives the data list request transmitted from the mobile phone A200 in the controller 104 (S101)
- the storage device 100 transmits a list of data stored in the storage unit 101 to the mobile phone A200 (S102).
- the user A sets data for which a temporary password is applied on the data selection screen displayed on the display unit 204 of the mobile phone A 200. Is specified.
- the mobile phone A200 obtains the identifier (data name, data, file name, directory name, etc.) of the specified data (hereinafter referred to as specified data) from the input unit 203 and sets a temporary password for the specified data.
- specified data data name, data, file name, directory name, etc.
- the controller 104 of the storage device 100 passes the received temporary password setting request to the temporary data management unit 110 (S103).
- the temporary data management unit 110 causes the temporary password generation unit 109 to generate a temporary password (S104), and sets a temporary password for the designated data (S105).
- the temporary data management unit 110 After setting the temporary password, the temporary data management unit 110 notifies the mobile phone A 200 of the temporary password from the password transmission unit 105 of the controller 104 (S106).
- the cellular phone A200 receives the temporary password from the storage device IZF201 and displays the received temporary password on the display unit 204.
- the mobile phone A 200 stores the temporary password in the storage unit 202 according to the setting of the user A, for example, and displays it on the display unit 204 later.
- User A stores the temporary password displayed on display unit 204 by some method (including taking notes).
- the temporary password generation unit 109 generates a temporary password by using a random number generation function with arguments such as values indicating data attributes such as the current time, data update time, and data size. Or a hash function, or a function that uses a random number as an input value and generates a character string or PIN that varies depending on the value of the random number.
- a hash function or a function that uses a random number as an input value and generates a character string or PIN that varies depending on the value of the random number.
- these methods are used in combination. You can do it.
- step S 105 will be described in detail.
- FIG. 4 is a flowchart showing details of the password setting operation performed by the storage device 100.
- Temporary data management unit 110 of storage device 100 checks whether the designated data designated by user A is stored in private storage unit 102 of storage unit 101 (S111).
- the temporary password generated by the temporary password generation unit 109 and the expiration date setting unit are set for the specified data.
- Set the validity period of the temporary password (S11 8).
- the authentication unit 108 transmits a user authentication request for requesting user authentication to the mobile phone A200 via the controller 104 (S112).
- the cellular phone A200 receives the user authentication request in the storage device wearing IZF201 and displays a screen for requesting user authentication on the display unit 204.
- the user A inputs the requested authentication information from the input unit 203, and this authentication information is transmitted from the storage device mounting IZF 201 to the storage device 100 as a user authentication response.
- the user authentication response is received by the authentication unit 108 via the controller 104 (S113).
- the authentication unit 108 performs user authentication based on the received information (S114). If the user authentication fails, the temporary data management unit 110 rejects the temporary password setting (S117). At this time, the storage device 100 may notify the mobile phone A200 that the temporary password setting is rejected, and the mobile phone A200 may display a message to that effect on the display unit 204. If the user authentication is successful in step S114, the designated data is copied to the public storage unit 103 (S115), and the temporary password generated by the temporary password generation unit 109 is copied to the copied data. Then, the validity period of the temporary password set by the validity period setting unit is set (S116).
- the designated data in the private storage unit 102 is not copied to the public storage unit 103, but the temporary password 51 and its valid period 53 are directly set for the designated data in the private storage unit 102. Also good.
- user authentication by the authentication unit 108 may be omitted, and access control may be performed by authentication using only a temporary password. Next, the data access control operation will be described.
- FIG. 5 is a sequence diagram showing data transmission / reception between the storage device 100 and the mobile phone B300
- FIG. 6 is a flowchart showing an access control operation to data in the storage device 100.
- user A removes storage device 100 from mobile phone A200, passes storage device 100 to user B, and notifies user B of a temporary password.
- User B may store the notified temporary password in storage unit 302 of mobile phone B300. Therefore, the following is an operation of the storage device 100 after the user B attaches the storage device 100 to the mobile phone B300.
- the mobile phone B300 transmits a data list request for requesting a list of data stored in the storage unit 101 of the storage device 100 to the storage device 100 via the storage device mounting IZF301.
- the storage device 100 receives the data list request transmitted from the mobile phone B300 in the controller 104 (S201)
- the storage device 100 transmits the data list stored in the storage unit 101 to the mobile phone B300 (S202).
- step S116 in FIG. 4 when the data for which the storage device 100 has set a temporary password in step S116 in FIG. 4 is stored in the public storage unit 103, a list of only the data stored in the public storage unit 103 is stored in step S202. May be sent.
- the storage device 100 regardless of whether the storage device 100 stores the data for which the temporary password is set, either in the private storage unit 102 or the public storage unit 103, it sends a list of only the data for which the temporary password is set. Also good.
- the user B From the data stored in the storage unit 101 of the storage device 100, the user B displays the data for which the temporary password is set on the data selection screen displayed on the display unit 304 of the mobile phone B300. specify.
- the mobile phone B300 obtains the identifier (data name, data ID, file name, directory name, etc.) of the specified data specified from the input unit 303, and sends an access request to the specified data via the storage device IZF301. To do.
- the controller 104 of the storage device 100 passes the received access request to the temporary data management unit 110 (S203).
- the access control unit 111 compares the current time acquired by the current time acquisition unit 115 with the expiration date stored in the expiration date storage unit 113, and designates the specified data. Check whether the temporary password set in is within the validity period (S20 Four). If the valid period has expired, access to the designated data is denied (S209). At this time, the storage device 100 may notify the mobile phone B300 that access to the designated data is denied, and the mobile phone B300 may display a message to that effect on the display unit 304. Further, the temporary password may be invalidated, the temporary password stored in the password storage unit 112 may be deleted, or the designated data itself may be deleted.
- the access control unit 111 transmits a temporary password request for requesting the temporary password to the mobile phone B300 via the controller 104 (S205). ).
- the mobile phone B300 receives the temporary password request at the storage device I ZF301 and displays a screen for requesting the temporary password on the display unit 304.
- the user B inputs the temporary password notified from the user A or the temporary password stored in the storage unit 302 from the input unit 303, and the temporary password is transmitted from the storage device mounting IZF 301 to the storage device 100.
- the temporary password is received by the password receiving unit 106 of the controller 104 (S206) and passed to the temporary data management unit 110.
- access control unit 111 compares the received temporary password with the temporary password stored in password storage unit 112 (S207). If the temporary passwords do not match, access to the specified data is denied (S209). At this time, the storage device 100 may notify the mobile phone B300 that access to the designated data is denied, and the mobile phone B300 may display a message to that effect on the display unit 304.
- the temporary password may be invalidated, the temporary password stored in the password storage unit 112 may be deleted, or the designated data itself may be deleted.
- step S207 the data reading unit 107 acquires the designated data from the storage unit 101 and transmits it to the mobile phone B300 (S208).
- the mobile phone B300 receives the designated data and displays it on the display unit 304 or stores it in the storage unit 302.
- temporary passwords are set for the entire private storage unit 102 and the entire storage unit 101 in the same manner. It is also possible to set. In addition, the data in the storage unit 101 If you have an aisle structure, you can also set a temporary password for the entire directory below a specific directory.
- a temporary password is set for the data in the private storage unit 102, it is copied to the public storage unit 103 in step S115 of FIG. 4, and a temporary password is set for the copied data.
- user authentication for the private storage unit 102 can be omitted.
- you want to perform access control with higher security for special data set a temporary password for the data in the private storage unit 102, and perform user authentication and temporary access to the private storage unit 102. It is also possible to use password authentication together.
- a secret key may be used as a temporary password!
- the temporary password generation unit 109 of the storage device 100 generates a secret key
- the temporary data management unit 110 encrypts the designated data with the secret key.
- the encrypted data is stored in the password storage unit 112.
- the nosword transmitter 105 transmits the secret key to the mobile phone A200.
- the password receiving unit 106 receives the secret key from the mobile phone B300.
- the access control unit 111 decrypts the data stored in the password storage unit 112 using this secret key. Check if you can do it. If the data decryption is successful, the data reading unit 107 transmits the designated data to the mobile phone B300.
- the secret key and the data obtained by encrypting the designated data with the secret key are stored in the password storage unit 112 or the storage unit 101, and a temporary password is stored for the secret key.
- a temporary password is stored for the secret key.
- the storage unit 101 does not store the designated data, only the data obtained by encrypting the designated data is stored, and as a result of collating the temporary password, access to the private key is permitted.
- the specified data can be decrypted and provided.
- a mobile phone has been described as an electronic device to which storage device 100 is attached.
- a mobile phone such as a PDA (Personal Digital Assistant) is used instead of the mobile phone.
- You can use home appliances such as terminals, PCs (Personal Computers), car navigation systems, and DVD (Digital Versatile Disc) players! /.
- the storage device 100 described in the present embodiment can be realized as, for example, an IC card, a memory card, or a USB (Universal Serial Bus) memory including a memory.
- the power of frequently lending and borrowing with another person is used in this case.
- the power of frequently lending and borrowing with another person is used in this case.
- by providing a temporary password only to those who want to exchange data it is possible to prevent access by other people.
- encryption can be performed with an encryption key, and the key can be protected with a temporary password to further increase the tolerance.
- the storage device 100 of the user A is attached to the mobile phone B300 of user B by transmitting only a list of data for which a temporary password is set to the mobile phone B300, the storage device 100 is mounted By setting a temporary password, only the data you want to pass can be shown to User B, and the existence of other data or programs can be made unknown.
- the A can easily notify the user B of the temporary password set in the storage device 100, and presents the temporary password to the other party when exchanging data with the storage device 100. It becomes easy.
- the user A himself / herself does not need to store or make a note of the temporary password set in the storage device 100, which is convenient. Increases sex.
- a temporary password or PIN is set for the data and program. It allows easy data access and data exchange.
- FIG. 7 is a block diagram showing a configuration of a storage device according to the present embodiment and a mobile phone to which the storage device is attached.
- the ability to set a temporary password for the data stored in the storage unit 101 is added to the storage device 100 with the program execution unit 118 implemented by a processor, memory, or the like.
- the program execution unit 118 implemented by a processor, memory, or the like.
- each unit other than the program execution unit 118 is the same as that in the first embodiment.
- the operation of the storage device 100 is the same as that of the first embodiment except that the program execution unit 118 executes the program when access to the program protected by the temporary password is permitted.
- the program stored in the storage device 100 is protected, and when a program is temporarily permitted to another person or another device, the temporary password is set. It can be issued and given permission.
- Embodiment 3 In the following, a mode in which user A who owns a storage device gives his / her storage device to user B and writes data therein will be described.
- FIG. 8 is a block diagram showing a configuration of the storage device according to the present embodiment and a mobile phone and a PC in which the storage device is mounted.
- the mobile phone 400 is an example of a first electronic device
- the PC 500 is an example of a second electronic device.
- the storage device 100 is attached to the mobile phone 400 and the PC 500.
- the storage unit 101 is a storage area for storing data and programs that can be accessed only by the owner of the storage device 100.
- Authentication unit 108 identifies the owner for access to storage unit 101.
- the controller 104 controls the storage device 100, the input / output of the electronic device in which the storage device 100 is mounted, and the inside of the storage device 100.
- the temporary password generation unit 109 generates a temporary password that is valid only for a certain period.
- the temporary data management unit 110 secures the data area 117 in the storage unit 101 and temporarily stores the temporary password generated by the temporary password generation unit 109 to permit access by others or other devices. Set for area 117 and perform temporary password authentication and access control.
- password transmission unit 105 transmits the temporary password generated by temporary password generation unit 109 to the electronic device in which storage device 100 is mounted.
- the password receiving unit 106 receives a temporary password from the electronic device in which the storage device 100 is installed. If the temporary password received by the password receiving unit 106 is correct, the data writing unit 116 writes the received data to the data area 117 secured in the storage unit 101 when the storage device 100 is installed.
- password storage unit 112 stores the temporary password generated by temporary password generation unit 109.
- the expiration date setting unit 114 sets the expiration date of the temporary password when the temporary password is generated.
- the expiration date storage unit 113 stores the expiration date.
- the current time acquisition unit 115 acquires the current time.
- the access control unit 111 determines whether the temporary password has not expired or the temporary password is correct, and controls access to the data area 117 of the storage unit 101.
- the cellular phone 400 is a terminal used by the user A with the storage device 100 attached.
- a storage device IZF (interface) 401 connects the storage device 100 and the mobile phone 400.
- a display unit 405 performs display on a screen such as an LCD.
- the input unit 404 is, for example, a numeric key and accepts input from the user A.
- the storage unit 403 is an area for storing data, such as a nonvolatile memory.
- the communication unit 402 communicates with the PC 500.
- PC 500 is a terminal used by user B with storage device 100 installed.
- storage device IZF (interface) 501 connects storage device 100 and PC500.
- the display unit 505 displays on a screen such as a CRT (Cathode Ray Tube).
- the input unit 504 is a keyboard or a mouse, for example, and accepts input from the user B force.
- the storage unit 503 is an area for storing data, such as a nonvolatile memory.
- Communication unit 502 communicates with mobile phone 400.
- the operation of the storage device 100 is to set a temporary password and control access to data area 117. It can be divided into actions to be performed.
- the former is the operation of storage device 100 when user A attaches storage device 100 to mobile phone 400 and sets a temporary password, and the latter is user A disconnects storage device 100 from mobile phone 400.
- This is the operation of the storage device 100 when the user B inserts the storage device 100 into the PC 500, inputs a temporary password, and stores data.
- FIG. 9 is a sequence diagram showing data transmission / reception between the storage device 100 and the mobile phone 400
- FIG. 10 is a flowchart showing a temporary password setting operation of the storage device 100.
- the storage device 100 is attached to the storage device attachment IZF 401 of the mobile phone 400.
- User A instructs the creation of a temporary area for user B to write data on the menu screen displayed on display unit 405 of mobile phone 400.
- the cellular phone 400 acquires a command for creating a temporary area from the input unit 404, and transmits a temporary area creation request via the storage device IZF 401.
- the controller 104 of the storage device 100 passes the received temporary area creation request to the temporary data management unit 110 (S301).
- the authentication unit 108 In order for the access control unit 111 of the temporary data management unit 110 to create a temporary area for data writing, the authentication unit 108 carries a user authentication request for user authentication via the controller 104. Send to phone 400 (S302).
- the cellular phone 400 receives the user authentication request in the storage device wearing IZF 401 and displays a screen for requesting user authentication on the display unit 405.
- the user A inputs the requested authentication information from the input unit 404, and this authentication information is transmitted from the storage device mounting IZF 401 to the storage device 100 as a user authentication response.
- the user authentication response is received by the authentication unit 108 via the controller 104 (S303).
- the authentication unit 108 performs user authentication based on the received information (S304). If the user authentication fails, the access control unit 111 of the temporary data management unit 110 denies access to the storage unit 101 (S308). At this time, the storage device 100 may notify the mobile phone 400 that access to the storage unit 101 is denied, and the mobile phone 400 may display a message to that effect on the display unit 405.
- the temporary data management unit 110 causes the temporary password generation unit 109 to generate a temporary password (S305), and the storage unit 101 is a temporary area for writing.
- the data area 117 is created, and the temporary password generated by the temporary password generation unit 109 and the validity period of the temporary password set by the expiration date setting unit 114 are set for the data area 117 (S306 ).
- the temporary data management unit 110 After setting the temporary password, notifies the mobile phone 400 of the temporary password from the password transmission unit 105 of the controller 104 (S307).
- the cellular phone 400 receives the temporary password from the storage device IZF 401 and stores the received temporary password in the storage unit 403.
- FIG. 11 is a sequence diagram showing data transmission / reception between the storage device 100 and the PC 500. Fig. 11 also shows the transmission and reception of temporary passwords between mobile phone 400 and PC 500.
- FIG. 12 is a flowchart showing an access control operation to the data area 117 of the storage device 100. At the time when this operation starts, the user A removes the storage device 100 from the mobile phone 400 and passes the storage device 100 to the user B. Therefore, user B Is the operation of the storage device 100 after the storage device 100 is mounted on the PC 500.
- User B uses the screen displayed on display unit 505 of PC500 to store the data stored in storage unit 503 of PC500 in data area 117 of storage device 100 in which a temporary password is set. Instruct.
- the PC 500 acquires the specified data identifier (data name, data ID, file name, directory name, etc.) from the input unit 504, and sends a data storage request to the data area 117 via the storage device IZ F501. To do.
- the controller 104 of the storage device 100 passes the received data storage request to the temporary data management unit 110 (S401).
- the access control unit 111 compares the current time acquired by the current time acquisition unit 115 with the expiration date stored in the expiration date storage unit 113, and stores it in the data area 117. It is checked whether the set temporary password is within the valid period (S402). If the valid period has expired, access to the data area 117 is denied (S407). At this time, the storage device 100 may notify the PC 500 that the access to the data area 117 is denied, and the PC 500 may display a message to that effect on the display unit 505. Also, invalidate the temporary password, delete the temporary password stored in the password storage unit 112, or release the data area 117.
- the access control unit 111 transmits a temporary password request for requesting the temporary password to the PC 500 via the controller 104 (S403).
- the PC 500 receives the temporary password request in the storage device IZF 501 and displays a screen for requesting the temporary password on the display unit 304.
- User A designates the temporary password stored in the storage unit 403 of the mobile phone 400 from the input unit 303 and transmits the temporary password from the communication unit 402 to the PC 500.
- the PC 500 transfers the temporary password from the storage device mounting IZF 501 to the storage device 100.
- the temporary password is received by the password receiving unit 106 of the controller 104 (S404) and passed to the temporary data management unit 110.
- the The access control unit 111 compares the received temporary password with the temporary password stored in the password storage unit 112 (S405). If the temporary passwords do not match, access to the data area 117 is denied (S407).
- the storage device 100 may notify the PC 500 that the access to the data area 117 is denied, and the PC 500 may display a message to that effect on the display unit 505. Further, the temporary password may be invalidated, the temporary password stored in the password storage unit 112 may be deleted, or the data area 117 may be released.
- step S405 the data received from the data writing unit 116 SPC500 is stored in the data area 117 (S406).
- data including data to be written to the data area 117 may be transmitted. Thereafter, for example, the verification of the temporary password is completed. You can send only the data!
- the access restriction on the entire storage unit 101 is released. Instead of creating a temporary area in your own storage device 100, setting a temporary password in that area, and passing the storage device to the other party, you can access other areas.
- the data can be stored in the storage device 100 while prohibiting the data, and the data and programs already stored in the storage device 100 can be easily protected.
- the temporary password set in storage device 100 is stored in the terminal, and data is transferred by passing storage device 100 to another person.
- this embodiment secures a temporary area for storing data when data is exchanged with other people or other devices! By setting a temporary password and PIN, access to the data area is easily permitted and data can be exchanged. [0109] Embodiment 4.
- FIG. 13 shows a storage device according to this embodiment, a mobile phone in which the storage device is mounted, and D
- the mobile phone 400 is an example of a first electronic device
- the DVD player 600 is an example of a second electronic device.
- the storage device 100 is attached to the mobile phone 400 and the DVD player 600.
- the storage unit 101 is an area for storing data, and the storage device 10
- the authentication unit 108 identifies the owner for access to the data area 117.
- the controller 104 controls the storage device 100 and the input / output of the electronic device in which the storage device 100 is mounted and the inside of the storage device 100.
- Temporary password generator 109 generates a password that is valid only for a certain period.
- the temporary data management unit 110 uses the temporary password generated by the temporary password generation unit 109 for the data to temporarily allow access to data stored in the data area 117 by others or other devices. Authentication and access control using a temporary password.
- password transmission unit 105 transmits the temporary password generated by temporary password generation unit 109 to the electronic device in which storage device 100 is mounted.
- the password receiving unit 106 receives a temporary password from the electronic device in which the storage device 100 is installed. If the temporary password received by the password receiving unit 106 is correct, the data reading unit 107 reads the data stored in the storage unit 101 and transmits the data to the electronic device in which the storage device 100 is attached.
- password storage section 112 stores the temporary password generated by temporary password generation section 109.
- the expiration date setting unit 114 sets the expiration date of the temporary password when the temporary password is generated.
- the expiration date storage unit 113 stores the expiration date.
- Current time acquisition unit 115 acquires the current time To do.
- the access control unit 111 determines whether the temporary password has expired or the temporary password is correct, and controls access to the data stored in the data area 117.
- the data area 117 is a storage area that can be accessed only when the user authentication by the authentication unit 108 is successful, if data in which a temporary password is set is stored in the data area 117, the data area 117 When the user is accessed, authentication using the temporary password by the temporary data management unit 110 is performed in addition to the user authentication by the authentication unit 108.
- Mobile phone 400 is a terminal used by a user with storage device 100 attached.
- the storage device IZF 401 connects the storage device 100 and the interior of the cellular phone 400.
- a display unit 405 performs display on a screen such as an LCD.
- the input unit 404 is, for example, a numeric key and accepts input from the user.
- the storage unit 403 is an area for storing data, such as a nonvolatile memory.
- the communication unit 402 communicates with the DVD player 600.
- a DVD player 600 is a DVD playback device used by a user with the storage device 100 mounted.
- a storage device mounting IZF (interface) 601 connects the storage device 100 and the DVD player 600 inside.
- a display unit 607 performs display on a liquid crystal screen or a television set connected to the DVD player 600.
- the input unit 606 is, for example, an operation button or a remote controller, and receives input from the user.
- the storage unit 605 is an area for storing data, such as a nonvolatile memory.
- a communication unit 604 communicates with the mobile phone 400.
- a DVD playback unit 603 plays a DVD.
- the license management unit 602 manages a license for playing back content stored on a DVD.
- the operation of the storage device 100 is divided into an operation for setting a temporary password and an operation for controlling access to the data area 117.
- the former is the operation of the storage device 100 when the user attaches the storage device 100 to the mobile phone 400 and sets a temporary password
- the latter is the operation of the storage device 100 by the user who removes the power from the mobile phone 400 and the DVD player. Attach to 600 and enter a temporary password This is the operation of the storage device 100 at the time of acquisition.
- FIG. 14 is a sequence diagram showing data transmission / reception between the storage device 100 and the mobile phone 400.
- FIG. 14 further shows that the mobile phone 400 sends a temporary password to the DVD player 600.
- FIG. 15 is a flowchart showing the temporary password setting operation of the storage device 100.
- storage device 100 is attached to storage device attachment IZF 401 of mobile phone 400.
- the user designates data area 117 as a target for applying a temporary password.
- the cellular phone 400 acquires the identifier (path name, directory ID, etc.) of the data area 117 in which the input unit 404 is also specified, and transmits a temporary password setting request via the storage device mounting IZF 401.
- the controller 104 of the storage device 100 passes the received temporary password setting request to the temporary data management unit 110 (S501).
- the authentication unit 108 transmits a user authentication request for requesting user authentication to the mobile phone 400 via the controller 104 ( S502).
- the cellular phone 400 receives the user authentication request in the storage device wearing IZF 401 and displays a screen for requesting user authentication on the display unit 405.
- the user inputs the requested authentication information from the input unit 404, and this authentication information is transmitted from the storage device mounting IZF 401 to the storage device 100 as a user authentication response.
- the user authentication response is received by the authentication unit 108 via the controller 104 (S503).
- the authentication unit 108 performs user authentication based on the received information (S504). If the user authentication fails, the access control unit 111 of the temporary data management unit 110 denies access to the data area 117 (S508). At this time, the storage device 100 may notify the mobile phone 400 that the access to the data area 117 is denied, and the mobile phone 400 may display a message to that effect on the display unit 405.
- the temporary data management unit 110 causes the temporary password generation unit 109 to generate a temporary password (S505) and temporarily stores the temporary data in the data area 117.
- the temporary password generated by the password generation unit 109 and the temporary password set by the expiration date setting unit 114 Set the effective period (S506).
- the temporary data management unit 110 After setting the temporary password, notifies the mobile phone 400 of the temporary password from the password transmission unit 105 of the controller 104 (S507).
- the cellular phone 400 receives the temporary password from the storage device IZF 401 and transmits the received temporary password to the DVD player 600 from the communication unit 402.
- the communication unit 604 of the DVD player 600 receives the temporary password and stores it in the storage unit 605.
- FIG. 16 is a sequence diagram showing data transmission / reception between the storage device 100 and the DVD player 600
- FIG. 17 is a flowchart showing an access control operation to the data area 117 of the storage device 100. The following is the operation of the storage device 100 after the user disconnects the storage device 100 from the mobile phone 400 and attaches it to the DVD player 600.
- the user sets a DVD including the content he / she wants to watch (hereinafter referred to as “designated content”) in the DVD player 600, and instructs the playback by the input unit 606.
- the license management unit 602 of the DVD player 600 obtains the identifier (content name, content ID, etc.) of the designated content, and accesses the license for the designated content in the data area 117 of the storage device 100 via the storage device IZF601. Send a request.
- the controller 104 of the storage device 100 passes the received access request to the temporary data management unit 110 (S601).
- the access control unit 111 compares the current time acquired by the current time acquisition unit 115 with the expiration date stored in the expiration date storage unit 113, and stores it in the data area 117. It is checked whether the set temporary password is within the valid period (S602). If the valid period has expired, access to the data area 117 is denied (S607). At this time, the storage device 100 may notify the DV D player 600 that the access to the data area 117 is denied, and the DVD player 600 may display a message to that effect on the display unit 607. In addition, the temporary password may be invalidated and the temporary password stored in the password storage unit 112 may be deleted.
- step S602 the access control unit 111 transmits a temporary password request for requesting the temporary password to the DVD player 600 via the controller 104 (S603).
- DVD player 600 is a storage device Mounting
- the IZF 601 receives a temporary password request and displays a screen for requesting a temporary password on the display unit 607.
- the temporary password is transmitted from the storage device mounting IZF 501 to the storage device 100.
- the temporary password is received by the password receiving unit 106 of the controller 104 (S604) and passed to the temporary data management unit 110.
- the access control unit 111 compares the received temporary password with the temporary password stored in the password storage unit 112 (S605). If the temporary passwords do not match, access to the data area 117 is denied (S607). At this time, the storage device 100 may notify the DVD player 600 that access to the data area 117 is denied, and the DVD player 600 may display a message to that effect on the display unit 607. Also, disable the temporary password and delete the temporary password stored in the password storage unit 112.
- step S605 if the temporary news words match, the data reading unit 107 acquires a license for the specified content from the data area 117 and transmits it to the DVD player 600 (S606).
- the DVD player 600 receives the license, and plays the specified content in the DVD playback unit 603 according to the received license.
- the DVD player 600 is used as a device for reproducing content.
- a music player instead of the DVD player 600, a car navigation device, a microwave oven, and the like are used. You can use household appliances that can be implemented.
- the same user is using the mobile phone 400 and the DVD player 600. Different users may be used as in the other embodiments.
- a temporary password is set for the entire data area 117, not the data stored in the data area 117, so that a plurality of licenses are assigned to the data area 117. Can be accessed from the DVD player 600 in the same way no matter what content is specified. Also, for example, if another content is executed while one content is being executed, Since it is possible to save the trouble of inputting a temporary password, convenience is improved.
- the temporary password can be passed to the DVD player 600 in advance, so that when the DV D player 600 is equipped with the storage device 100, It is possible to automatically authenticate with a temporary password, access the data area 117, and obtain a license. As a result, even when it is desired to access data in the storage device 100 using a home appliance that has a poor display screen or operation interface or is difficult to use, the user can save input and improve convenience. .
- a storage unit for storing data and programs
- a controller that controls input and output to and from the outside
- a temporary password generator for generating a temporary password
- a temporary data management unit that sets a temporary password generated by the temporary password generation unit for data and programs stored in the storage unit, and performs authentication and access control using the temporary password.
- a private storage that stores data and programs accessible only to the owner
- the storage device further includes:
- An authentication unit for identifying an owner for access to the private storage unit
- the temporary data management unit copies data and programs stored in the private storage unit to the private storage unit and the public storage unit, and performs authentication and access control using the temporary password. To do.
- the data and the program stored in the storage unit are encrypted and stored with the temporary password, and the authentication and the temporary password are performed. After the access control is performed, the data is decrypted with the temporary password.
- the data and program stored in the private storage unit are encrypted with the temporary password and stored in the public storage unit, and authentication and access using the temporary password are performed. After the control, the data is decrypted with the temporary password.
- the temporary data management unit encrypts and stores the data and program stored in the storage unit, stores the encryption key in the storage unit, and authenticates the encryption key with the temporary password. And performing access control.
- the data and program stored in the private storage unit are encrypted and stored in the public storage unit, the encryption key is copied to the public storage unit, and the encryption key is stored. The authentication and access control using the temporary password are performed.
- the temporary password generated by the temporary password generation unit is set for any one of the storage unit and the private storage unit, and authentication and access control are performed. .
- the storage device further includes:
- a temporary area can be created in the storage unit
- the temporary data management unit sets the temporary password generated by the password generation unit for the temporary area, and performs authentication and access control using the temporary password.
- the storage device further includes:
- a validity period is set for the temporary password, and the temporary password is within the validity period when authentication is performed using the temporary password. This is characterized by permitting access to data and programs within the validity period.
- the temporary data management unit determines that the temporary password has expired In this case, the temporary password is invalidated, and the data or the encryption key stored in the public storage unit in which the temporary password is set is erased.
- the controller After the temporary password is set for any of data, storage unit, private storage unit, and area by the temporary data management unit, the controller temporarily receives access to the storage device for the first time. It is characterized by the fact that it can be accessed only to the target for which a password is set.
- the storage device includes
- a storage unit for storing data and programs
- a controller that controls input and output to and from the outside
- a temporary password generator for generating a temporary password
- a temporary data management unit that sets a temporary password generated by the temporary password generation unit for data and programs stored in the storage unit, and performs authentication and access control using the temporary password;
- the terminal includes a display unit for performing display on a screen,
- the temporary password generated by the temporary password generation unit via the controller is displayed on a display unit on the terminal.
- a private storage that stores data and programs accessible only to the owner
- the storage device further includes:
- An authentication unit for identifying the owner for access to the private storage unit It is characterized by providing.
- the storage device includes
- a storage unit for storing data and programs
- a controller that controls input and output to and from the outside
- a temporary password generator for generating a temporary password
- a temporary data management unit that sets a temporary password generated by the temporary password generation unit for data and programs stored in the storage unit, and performs authentication and access control using the temporary password;
- the terminal includes a storage unit for storing a temporary password
- the temporary password generated by the temporary password generation unit via the controller is stored in a storage unit on the terminal.
- the storage unit of the storage device is
- a private storage that stores data and programs accessible only to the owner
- a public storage unit that stores data and programs accessible to anyone
- the storage device further includes:
- the storage device includes
- a storage unit for storing data and programs
- a controller that controls input and output to and from the outside
- a temporary password generator for generating a temporary password
- Temporary password generation unit for data and programs stored in the storage unit A temporary data management unit that sets the temporary password generated in step 1 and performs authentication and access control using the temporary password.
- the terminal includes a communication unit that communicates with other terminals,
- the temporary password generated by the temporary password generation unit is transmitted to the communication unit on the terminal via the controller, and is transmitted to another terminal by the communication unit.
- a private storage that stores data and programs accessible only to the owner
- the storage device further includes:
- the terminal further includes:
- the password is transmitted to the temporary data management unit of the storage device via the controller and authenticated by the password received by the temporary data management unit. And performing access control.
- the storage device includes
- a storage unit for storing data and programs
- a controller that controls input and output to and from the outside
- a temporary password generator for generating a temporary password
- a temporary data management unit that sets a temporary password generated by the temporary password generation unit for data and programs stored in the storage unit, and performs authentication and access control using the temporary password;
- Temporary password generator for data and programs stored in the storage
- the temporary data generated by the temporary data management unit performs authentication and access control using the temporary password, and the temporary password is set to the end of the previous dife via the controller.
- the storage device includes
- the temporary password generated by the temporary password generation unit is set for the entire storage device, and authentication and access control are performed.
- FIG. 1 is a block diagram showing a configuration of a storage device according to Embodiment 1 and an electronic device to which the storage device is attached.
- FIG. 2 is a sequence diagram showing data transmission / reception between the storage device and the first electronic device according to the first embodiment.
- FIG. 3 is a flowchart showing an operation performed by the storage device according to Embodiment 1 when setting a password.
- FIG. 4 is a flowchart showing details of a password setting operation performed by the storage device according to Embodiment 1.
- FIG. 5 is a sequence diagram showing data transmission / reception between the storage device and the second electronic device according to the first embodiment.
- FIG. 6 is a flowchart showing an operation performed by the storage device according to the first embodiment during access control.
- FIG. 7 is a block diagram showing a configuration of a storage device according to Embodiment 2 and an electronic device in which the storage device is mounted.
- FIG. 8 is a block diagram showing a configuration of a storage device according to Embodiment 3 and an electronic device in which the storage device is mounted.
- FIG. 10 is a flowchart showing an operation performed by the storage device according to the third embodiment when setting a password.
- FIG. 10 is a flowchart showing an operation performed by the storage device according to the third embodiment when setting a password.
- 11] A sequence diagram showing data transmission / reception between the storage device and the second electronic device according to the third embodiment.
- FIG. 12 is a flowchart showing an operation performed by the storage device according to Embodiment 3 during access control.
- FIG. 13 is a block diagram showing a configuration of a storage device according to Embodiment 4 and an electronic device in which the storage device is mounted.
- FIG. 17 is a flowchart showing an operation performed by the storage device according to Embodiment 4 during access control. Explanation of symbols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2004/016735 WO2006051592A1 (ja) | 2004-11-11 | 2004-11-11 | 記憶装置及びアクセス制御システム及びアクセス制御方法 |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2004/016735 WO2006051592A1 (ja) | 2004-11-11 | 2004-11-11 | 記憶装置及びアクセス制御システム及びアクセス制御方法 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2006051592A1 true WO2006051592A1 (ja) | 2006-05-18 |
Family
ID=36336278
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2004/016735 Ceased WO2006051592A1 (ja) | 2004-11-11 | 2004-11-11 | 記憶装置及びアクセス制御システム及びアクセス制御方法 |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2006051592A1 (ja) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2009058637A (ja) * | 2007-08-30 | 2009-03-19 | Panasonic Corp | 不揮発性記憶装置へのデータ書き込みシステムおよび不揮発性記憶装置 |
| WO2019174507A1 (zh) * | 2018-03-16 | 2019-09-19 | 东莞盛世科技电子实业有限公司 | 临时密码的使用控制方法及系统 |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2000010931A (ja) * | 1998-06-19 | 2000-01-14 | Oki Electric Ind Co Ltd | ログインシステム |
| JP2001051904A (ja) * | 1999-08-11 | 2001-02-23 | Hitachi Ltd | 不揮発性半導体メモリを用いた外部記憶装置 |
| JP2002073840A (ja) * | 2000-09-01 | 2002-03-12 | Nec Mobiling Ltd | ネットワークサーバ貸出システム |
| JP2002323932A (ja) * | 2001-04-25 | 2002-11-08 | Fujitsu Frontech Ltd | カード決済端末装置及びカード決済端末装置の電源投入方法 |
| JP2002334511A (ja) * | 2001-01-31 | 2002-11-22 | Sony Computer Entertainment Inc | コンピュータシステム及びその使用方法 |
| JP2002342169A (ja) * | 2001-05-11 | 2002-11-29 | Nec Software Kyushu Ltd | 電子データ保存領域提供システム及び電子データ保存領域提供方法 |
-
2004
- 2004-11-11 WO PCT/JP2004/016735 patent/WO2006051592A1/ja not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2000010931A (ja) * | 1998-06-19 | 2000-01-14 | Oki Electric Ind Co Ltd | ログインシステム |
| JP2001051904A (ja) * | 1999-08-11 | 2001-02-23 | Hitachi Ltd | 不揮発性半導体メモリを用いた外部記憶装置 |
| JP2002073840A (ja) * | 2000-09-01 | 2002-03-12 | Nec Mobiling Ltd | ネットワークサーバ貸出システム |
| JP2002334511A (ja) * | 2001-01-31 | 2002-11-22 | Sony Computer Entertainment Inc | コンピュータシステム及びその使用方法 |
| JP2002323932A (ja) * | 2001-04-25 | 2002-11-08 | Fujitsu Frontech Ltd | カード決済端末装置及びカード決済端末装置の電源投入方法 |
| JP2002342169A (ja) * | 2001-05-11 | 2002-11-29 | Nec Software Kyushu Ltd | 電子データ保存領域提供システム及び電子データ保存領域提供方法 |
Non-Patent Citations (1)
| Title |
|---|
| GARFINKEL S. ET AL: "UNIX & Internet security (Practical UNIX & INTERNET SECURITY.", KABUSHIKI KAISHA ORAIRI JAPAN., 31 December 1998 (1998-12-31), pages 248 - 268, XP003006184 * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2009058637A (ja) * | 2007-08-30 | 2009-03-19 | Panasonic Corp | 不揮発性記憶装置へのデータ書き込みシステムおよび不揮発性記憶装置 |
| WO2019174507A1 (zh) * | 2018-03-16 | 2019-09-19 | 东莞盛世科技电子实业有限公司 | 临时密码的使用控制方法及系统 |
| US11657128B2 (en) | 2018-03-16 | 2023-05-23 | Smart Electronic Industrial (Dong Guan) Co., Ltd. | Temporary password usage control method and system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4118092B2 (ja) | 記憶装置および情報処理装置 | |
| US8572392B2 (en) | Access authentication method, information processing unit, and computer product | |
| US7899187B2 (en) | Domain-based digital-rights management system with easy and secure device enrollment | |
| CN101682501B (zh) | 用于执行认证协议的方法和便携式存储设备 | |
| CN100403209C (zh) | 用于授权内容操作的方法与装置 | |
| JP5365512B2 (ja) | ソフトウェアicカードシステム、管理サーバ、端末、サービス提供サーバ、サービス提供方法及びプログラム | |
| WO2017197974A1 (zh) | 一种基于生物特征的安全认证方法、装置及电子设备 | |
| KR102837803B1 (ko) | 사용자에 대한 인증을 통해 유저 데이터에 대한 권한을 부여하는 시큐리티 프로세서 및 이를 포함하는 컴퓨팅 시스템 | |
| US10496806B2 (en) | Method for secure operation of a computing device | |
| TWI241106B (en) | Personal authentication device and system and method thereof | |
| CN103828293A (zh) | 用于用户认证的系统和方法 | |
| CN104798083A (zh) | 用于验证访问请求的方法和系统 | |
| WO2004027631A1 (ja) | 認証処理ハードウェア、認証処理システム、及び、利用管理ハードウェア | |
| KR100703805B1 (ko) | 원격 도메인의 디바이스에서 drm 컨텐츠를 로밍하여사용하는 방법 및 장치 | |
| JPH10336172A (ja) | 電子認証用公開鍵の管理方法 | |
| JP2005535026A (ja) | ネットワークを介したユニバーサルユーザーの情報登録の方法及びシステム | |
| KR20220026326A (ko) | Did 블록체인을 활용한 양자암호통신서비스 제공 방법 및 그 시스템 | |
| JP2018022501A (ja) | 複数のサービスシステムを制御するサーバシステム及び方法 | |
| JP2004213265A (ja) | 電子文書管理装置、文書作成者装置、文書閲覧者装置、電子文書管理方法及び電子文書管理システム | |
| CN106462689A (zh) | 安全系统、管理装置、许可装置、终端装置、安全方法以及程序 | |
| CN115618306B (zh) | 一种软件保护方法、装置、系统、cpu芯片及电子设备 | |
| WO2006051592A1 (ja) | 記憶装置及びアクセス制御システム及びアクセス制御方法 | |
| KR20170073843A (ko) | 보안실행환경 온라인본인확인 시스템 및 방법 | |
| EP1999604A1 (en) | Method and apparatus for roaming digital rights management content in device | |
| JP2002073859A (ja) | 電子チケットの管理機能を有する携帯認証装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 04822392 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: JP |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |