WO2009133695A1 - 電子機器装置の不正取り外し検知方法 - Google Patents
電子機器装置の不正取り外し検知方法 Download PDFInfo
- Publication number
- WO2009133695A1 WO2009133695A1 PCT/JP2009/001926 JP2009001926W WO2009133695A1 WO 2009133695 A1 WO2009133695 A1 WO 2009133695A1 JP 2009001926 W JP2009001926 W JP 2009001926W WO 2009133695 A1 WO2009133695 A1 WO 2009133695A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- memory
- confidential data
- electronic device
- ram
- detection means
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0751—Error or fault detection not based on redundancy
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0745—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in an input/output transactions management context
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0013—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers
- G06K7/0056—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers housing of the card connector
- G06K7/0069—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers housing of the card connector including means for detecting correct insertion of the card, e.g. end detection switches notifying that the card has been inserted completely and correctly
Definitions
- the present invention relates to an unauthorized removal detection method for detecting unauthorized removal of an electronic device that handles confidential data.
- confidential data for example, key data used for encryption processing
- a volatile memory backed up by a secondary power source
- the confidential data is read from the memory to the working memory, and various processes are executed. Since the confidential data is necessary for executing various processes, it is normally held so as not to disappear. However, when any abnormality such as unauthorized removal of the electronic device is detected, the power supply from the secondary power source and the main power source to the volatile memory is cut off, and the confidential data is erased.
- such an electronic device device such as a card reader is attached to a housing such as a user operation terminal operated by the user, for example, a gas station terminal.
- a maintenance worker who maintains and maintains an electronic device installed in the market may have to remove the electronic device from the casing of the user operation terminal. For this reason, a function for invalidating the removal detection is generally installed so that confidential data is not erased unnecessarily.
- the electronic device is attached again to the casing of the user operation terminal described above, and then the removal detection is validated.
- the maintenance switch described in Patent Document 1 described above may lack workability in maintenance and maintenance. Specifically, if the maintenance operator inadvertently activates the removal detection function when the electronic device is not properly installed in the casing of the user operation terminal as described above, The removal is detected and the confidential data is erased. The erasure of confidential data is one of fatal errors, and after that, the normal operation often cannot be continued. In such a state, due to security problems, it cannot be immediately restored on the spot. As a result, the electronic device must be returned to an environment where security is ensured, and workability is lacking.
- the present invention has been made in view of these points, and its purpose is to prevent confidential data from being erased due to a human error or the like of a maintenance worker, thereby improving workability in maintenance and maintenance.
- An object is to provide a method for detecting unauthorized removal of an electronic device.
- the present invention provides the following.
- An unauthorized removal detection method for an electronic device device that receives a command from a host device and executes processing according to the command, wherein the electronic device device stores electronic information including confidential data.
- Memory detection means for detecting unauthorized removal of the electronic device, power control means for cutting off power supply to the first memory based on a signal from the detection means, and the first memory
- a second memory that is separate and independent and does not erase stored data even when the power supply by the power control means is interrupted, and the confidential data stored in the first memory is stored in the second memory
- a first memory in which electronic information including confidential data is stored, a detection means for detecting unauthorized removal of the electronic device, a power control means for cutting off power supply to the first memory, Confidential data stored in the first memory with an electronic device having a second memory that is provided independently of the first memory and that does not erase stored data even when the power supply by the power control means is interrupted Since the detection means is activated after the data is copied to the second memory, it is assumed that the electronic device is not properly installed in the casing of the user operation terminal as described above. Even if the means is enabled, there is confidential data copied in the second memory, so that it can be used for quick recovery. Therefore, it is possible to prevent the confidential data from being erased due to a human error or the like of the maintenance worker, thereby improving workability such as maintenance / maintenance.
- the timing of “the confidential data stored in the first memory is copied (saved) to the second memory” is not particularly limited. For example, it may be immediately before the detection function of the detection means is activated (such as when a command for enabling the detection function of the detection means is received from the host device) or when the power of the electronic device is turned on. Also good. In the latter case, confidential data is copied in advance to the second memory.
- first memory and / or “second memory” is not limited.
- a volatile memory such as a RAM or a nonvolatile memory such as an EEPROM or FROM may be used. In the latter case, a separate program for actively erasing confidential data in the nonvolatile memory is required.
- the confidential data stored in the first memory is copied to the second memory when the electronic device receives a command for enabling the detection function of the detection means from the host device.
- the security of the removal detection function can be improved.
- confidential data is copied only after “when the electronic device receives a command for enabling the detection function of the detection means from the host device”, so that highly important confidential data can be Time to be distributed and stored in the second memory can be shortened, and as a result, security can be improved.
- the first memory and / or the second memory is a volatile memory, if the power supply from the main power source and the secondary power source is cut off, the confidential data is automatically deleted. Therefore, compared with the case where a non-volatile memory is employed as the first memory and / or the second memory, the time that the confidential data remains in the memory can be shortened, and the security can be improved.
- the detection means After the detection means is validated, it is determined whether or not the confidential data stored in the first memory remains normally, and as a result of the determination step, the confidential data is The detection means is invalidated if it does not remain normally, and the confidential data stored in the second memory is erased if the confidential data remains normal.
- a method for detecting unauthorized removal of electronic device devices A method for detecting unauthorized removal of electronic device devices.
- the detection means after the detection means is activated, it is determined whether or not the confidential data stored in the first memory remains normally, and as a result, if the confidential data does not remain normally, the detection is performed. If the means is invalidated and the confidential data remains normally, the confidential data stored in the second memory is erased, so that the electronic device is normally installed in the case of the user operation terminal. Even if the detection means is enabled in the state where the detection is not performed and the confidential data does not remain normally, the confidential data can be returned from the second memory to the first memory in the state where the detection means is disabled. Workability such as maintenance can be improved. Moreover, when the confidential data remains normally, the confidential data stored in the second memory is deleted, so that the time during which the confidential data is distributed and stored can be shortened, thereby improving security. be able to.
- An unauthorized removal detection method for an electronic device device wherein after the processing step is performed, a response related to the processing step is transmitted from the electronic device device to the host device.
- the response relating to the processing step is transmitted from the electronic apparatus device to the host device after either the above-described invalidation of the detection means or the deletion of the confidential data in the second memory is performed. Therefore, the host device can recognize whether or not the unauthorized removal detection function has been successfully activated, and can take a quick response thereafter (for example, the electronic device is not fully installed). Display it on a screen that can be visually recognized by maintenance workers, etc.) In addition, it can be performed not only by transmitting a response, but also by a warning by blinking an LED lamp or a buzzer.
- the detection means is validated in a state where confidential data is duplicated in a second memory independent of the first memory. Even if the detection means is activated when it is not properly installed in the casing of the user operation terminal, it is possible to perform quick recovery work and, in turn, improve workability such as maintenance and maintenance. .
- FIG. 1 is a block diagram showing an electrical configuration of a card reader 1 used in an unauthorized removal detection method according to an embodiment of the present invention.
- the card reader 1 is attached to a user operation terminal that is operated by a user, for example, a casing of a gas station, an ATM, or the like.
- the apparatus 2 is accommodated.
- the card reader 1 and the host device 2 are electrically connected by RS232C (of course, other connection modes may be used).
- the host device 2 may be arranged in another control device without being stored in the user operation terminal.
- the card reader 1 is adopted as an example of the “electronic device”, but the present invention is not limited to this, and all the data that needs to protect confidential data against unauthorized removal operations. Applicable to electronic equipment. Further, the present invention is not limited to simple unauthorized removal, and can also be applied to an apparatus having a function (an unauthorized operation detection function) for switching between enabling / disabling for maintenance / maintenance (also referred to as maintenance).
- the card reader 1 includes a CPU 10, a RAM 11, a RAM 12 built in the CPU 10, a power control IC 13, a backup power source (battery) (Back Up Battery) 14, a switching circuit 15, and a removal detection switch 16. Yes.
- Each component is electrically connected by at least a bus indicated by a solid line (or a solid arrow) in the drawing.
- the RAM 12 is built in the CPU 10, but the present invention is not limited to this.
- the CPU 10 controls the entire card reader 1. That is, an initialization program and a basic program are called from a ROM or the like (not shown in FIG. 1), and these are executed to control the entire card reader 1. In addition, it receives a command from the host device 2 and executes various processes (such as an application program) according to the command. For example, the switching circuit 15 is validated by Hi output, or the switching circuit 15 is invalidated by Lo output. Further, the CPU 10 reads data stored in the RAM 11 and RAM 12 and writes data to these.
- the RAM 11 and the RAM 12 built in the CPU 10 are an example of a volatile memory, and provide a work area for the CPU 10 to execute a program. Work data necessary for various operations is stored in the work area. Details of the difference between the two will be described later.
- the power supply control IC 13 supplies power from the main power supply (Main ⁇ Power Supply) 3 and the secondary power supply 14 to the RAM 11. Normally, the power from the main power supply 3 is supplied to the RAM 11, but the power from the secondary power supply 14 is supplied to the RAM 11 when the power is turned off.
- the power supply control IC 13 functions as an example of “power supply control means” that cuts off power supply (power supply) to the RAM 11 based on the output signal of the switching circuit 15.
- the switching circuit 15 and the removal detection switch 16 function as an example of “detection means” that detects unauthorized removal of the card reader 1.
- the switching circuit 15 has a relay with a latch, and the switching is controlled by the CPU 10.
- the switching circuit 15 retractal detection function
- the relay and the removal detection switch 16 are connected in series, but when the switching circuit 15 is disabled, the relay and The removal detection switch 16 is not connected in series. That is, in the former case, a closed loop is formed through the removal detection switch 16, and in the latter case, a closed loop is formed without going through the removal detection switch 16.
- the switching circuit 15 When the switching circuit 15 is activated by the CPU 10, when the (mechanical) removal detection switch 16 such as a lever or button is changed from the closed state to the open state, the conductive state is switched to the non-conductive state. As a result, a signal indicating that switching from the conductive state to the non-conductive state is sent from the switching circuit 15 to the power supply control IC 13 (for example, the non-zero current becomes zero or the circuit resistance value is infinite. ) The power supply control IC 13 cuts off the power supply to the RAM 11 based on such a signal.
- the switching circuit 15 and the removal detection switch 16 are considered as “detection means”, but other electric elements may be added.
- the removal detection switch 16 may be an optical switch such as a photo sensor or a magnetic switch such as a magnetic sensor.
- the EEPROM electrically erasable programmable read-only memory
- flash memory or the like, which stores confidential data, an execution program, electronic information such as an error detection code (CRC, check SUM, BCC). Good.
- the RAM 11 is a specific example of “first memory” in which electronic information including confidential data is stored.
- the RAM 12 is independent from the RAM 11.
- This is a specific example of the “second memory” in which stored data is not erased even when the power supply by the power control IC 13 is interrupted. That is, the RAM 11 is a memory from which stored data is erased by detection of removal when the switching circuit 15 is enabled, and the RAM 12 is a memory from which stored data is not erased by detection of removal (the switching circuit 15 and the RAM 11). Is not directly connected memory).
- the switching circuit 15 is activated. This will be described in detail below with reference to FIG.
- FIG. 2 is a flowchart showing the flow of the unauthorized removal detection method according to the embodiment of the present invention.
- the host device for example, HOST computer
- the card reader 1 receives a command from the host device 2, Processing is executed according to the command. Then, the processing result is notified to the host device 2.
- the host device 2 transmits a removal detection function enabling command to the card reader 1 (step S1).
- the CPU 10 of the card reader 1 receives this, the confidential data stored in the area (RAM 11 which is a volatile memory) erased by the unauthorized removal detection is received as another area (not erased even by unauthorized removal).
- the data is saved (replicated) in the RAM 12 which is a volatile memory (step S2).
- step S3 the removal detection function is validated. More specifically, the CPU 10 of the card reader 1 activates the switching circuit 15 by changing its output or the like (the relay of the switching circuit 15 is removed and switched to a state constituting a closed loop through detection).
- step S5 After waiting for a certain time (for example, 2 ms) (step S4), data check of the RAM 11 is performed (step S5). Specifically, the CPU 10 of the card reader 1 calculates a CRC (Cyclic Redundancy Check) in the RAM 11 after a predetermined time has elapsed. Then, the CPU 10 determines whether or not the confidential data stored in the RAM 11 remains normally (step S6). If the confidential data remains normally (when the card reader 1 is normally attached to the casing of the user operation terminal operated by the user) (step S6: YES), then It is determined whether the prescribed number of checks (data check in step S5) has been completed (step S7).
- CRC Cyclic Redundancy Check
- step S7 When the prescribed number of checks is completed (step S7: YES), the confidential data stored in the RAM 12 is unnecessary and is deleted (step S8). Then, the CPU 10 transmits a response indicating that the removal detection function is successfully activated to the higher-level device 2 (step S9). If the prescribed number of checks has not been completed (step S7: NO), the processes of steps S4 to S7 are repeated.
- step S7 in FIG. 2 the “specified number of times” is checked, but for example, “specified time” may be checked.
- the specified time is a time determined on the assumption that confidential data is immediately erased by executing the removal detection enabling process in a state where the attachment is incomplete.
- a specified time may be set to specify that the removal detection is enabled when the attachment is incomplete.
- step S6 if the confidential data does not remain normally (when the card reader 1 is not normally attached to the casing of the user operation terminal) (step S6: NO), the switching circuit 15 is invalidated by the instruction of the CPU 10 (Step S10). Then, the CPU 10 copies confidential data (saved data) stored in the RAM 12 to the RAM 11 (step S11), and then erases the confidential data stored in the RAM 12 (step S12). Finally, the CPU 10 transmits a response indicating that the removal detection function has failed to be activated to the higher-level device 2 (step S13). Thus, the unauthorized removal detection method according to the present embodiment is completed. After the processing of step S13 is performed, the host device 2 urges the maintenance worker to retry the verification of the attachment confirmation / removal detection function of the card reader 1, and again, the series of steps shown in FIG. Processing may be performed.
- the confidential data stored in the RAM 11 is copied to the RAM 12 (see step S2 in FIG. 2).
- step S3 in FIG. 2 even if the card reader 1 is incompletely attached and the removal detection function is enabled (step S3 in FIG. 2), a fatal error that causes loss of confidential data does not occur (step in FIG. 2). (See S11 etc.). Therefore, it is possible to prevent the situation where the card reader 1 has to be returned to an environment in which security is ensured (time and economical inefficiency), and thus improve the time and economic efficiency in maintenance / maintenance or production. (Improvement of workability) can be achieved.
- the timing at which the confidential data stored in the RAM 11 is copied to the RAM 12 is determined when the card reader 1 receives a command for enabling the detection function of the switching circuit 15 from the host device 2 (FIG. 2).
- Step S1 the time during which confidential data is distributed and stored can be shortened, and as a result, security can be improved.
- a volatile memory RAM 11, 12 that automatically deletes confidential data when the power supply from the main power supply and the secondary power supply is cut off is used. Can be increased.
- the host device 2 can quickly take the subsequent response by transmitting a response related to the result of step S6 to the host device 2.
- the method for detecting unauthorized removal of an electronic device according to the present invention is useful for enhancing the workability of maintenance and maintenance of devices.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Quality & Reliability (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
10 CPU
11 RAM(第一メモリとして)
12 RAM(第二メモリとして)
13 電源制御IC
14 二次電源
15 切替回路
16 取り外し検知スイッチ
図1は、本発明の実施の形態に係る不正取り外し検知方法で使用するカードリーダ1の電気的構成を示すブロック図である。本実施形態では、カードリーダ1は、利用者が操作する利用者操作端末機、例えば、ガソリンスタンドのターミナルやATM等の筐体に取り付けられており、この筐体内には、カードリーダ1と上位装置2とが収納されている。さらに、本実施形態では、カードリーダ1と上位装置2とは、RS232Cによって電気的に接続されている(もちろん他の接続態様であってもよい)。なお、上位装置2は利用者操作端末機内に収納せずに、別の制御装置内に配置されていてもよい。また、本実施形態では、「電子機器装置」の一例としてカードリーダ1を採用しているが、本発明はこれに限られず、不正な取り外し操作に対して機密データを保護する必要がある全ての電子機器装置に適用可能である。また、単純な不正取り外しに限らず、保守・整備等(メンテナンス等ともいう)のために有効化/無効化を切り替える機能(不正操作検知機能)を有する装置についても適用可能である。
なお、本実施形態では、RAM12はCPU10内蔵となっているが、これに限定されるものではない。
図2は、本発明の実施の形態に係る不正取り外し検知方法の流れを示すフローチャートである。なお、図1を用いて説明したように、前提として、上位装置(例えばHOSTコンピュータ)2とカードリーダ1は電気的に接続され、カードリーダ1は、上位装置2からのコマンドを受信して、そのコマンドに従い処理を実行する。そして、その処理結果を上位装置2に通知する。
以上説明したように、本実施形態に係る不正取り外し検知方法では、RAM11に格納されている機密データがRAM12に複製されるようにしているので(図2のステップS2参照)、整備作業者のミスにより、カードリーダ1を取り付け不完全な状態で取り外し検知機能を有効にしてしまったとしても(図2のステップS3)、機密データを消失するような致命的なエラーにはならない(図2のステップS11等参照)。したがって、セキュリティが確保された環境までカードリーダ1を戻さねばならない事態(時間的・経済的に非効率な事態)を防ぐことができ、ひいては保守・整備或いは生産における時間的・経済的な効率向上(作業性の向上)を図ることができる。
Claims (5)
- 上位装置からのコマンドを受信して、当該コマンドに従って処理を実行する電子機器装置の不正取り外し検知方法であって、前記電子機器装置は、機密データを含む電子情報が格納される第一メモリと、当該電子機器装置の不正な取り外しを検知する検知手段と、前記検知手段からの信号に基づいて、前記第一メモリへの電源供給を遮断する電源制御手段と、前記第一メモリとは別個独立であって、前記電源制御手段による電源供給の遮断があっても格納データが消去されない第二メモリと、を有し、前記第一メモリに格納されている前記機密データが前記第二メモリに複製された後、前記検知手段が有効化されることを特徴とする電子機器装置の不正取り外し検知方法。
- 前記電子機器装置が前記上位装置から前記検知手段の検知機能を有効化するコマンドを受信した際に、前記第一メモリに格納されている前記機密データが前記第二メモリに複製されることを特徴とする請求項1記載の電子機器装置の不正取り外し検知方法。
- 前記第一メモリ及び/又は前記第二メモリは、揮発性メモリであることを特徴とする請求項1又は2記載の電子機器装置の不正取り外し検知方法。
- 前記検知手段が有効化された後、前記第一メモリに格納された前記機密データが正常に残っているか否かが判断される判断ステップと、
前記判断ステップの結果、前記機密データが正常に残っていなければ、前記検知手段が無効化され、前記機密データが正常に残っていれば、前記第二メモリに格納された前記機密データが消去される処理ステップと、を含むことを特徴とする請求項1から3のいずれか記載の電子機器装置の不正取り外し検知方法。 - 前記処理ステップが行われた後、前記電子機器装置から前記上位装置に対し、前記処理ステップに関するレスポンスが送信されることを特徴とする請求項4記載の電子機器装置の不正取り外し検知方法。
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN200980115922.4A CN102016868B (zh) | 2008-04-30 | 2009-04-28 | 电子设备装置的不正当拆卸检测方法 |
| US12/989,980 US8397103B2 (en) | 2008-04-30 | 2009-04-28 | Method for detecting the improper removal of electronic equipment |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2008-118023 | 2008-04-30 | ||
| JP2008118023A JP5412644B2 (ja) | 2008-04-30 | 2008-04-30 | 電子機器装置の不正取り外し検知方法 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2009133695A1 true WO2009133695A1 (ja) | 2009-11-05 |
Family
ID=41254919
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2009/001926 Ceased WO2009133695A1 (ja) | 2008-04-30 | 2009-04-28 | 電子機器装置の不正取り外し検知方法 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US8397103B2 (ja) |
| JP (1) | JP5412644B2 (ja) |
| CN (1) | CN102016868B (ja) |
| WO (1) | WO2009133695A1 (ja) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2009266143A (ja) * | 2008-04-30 | 2009-11-12 | Nidec Sankyo Corp | 電子機器装置の不正取り外し検知方法 |
| CN102143607A (zh) * | 2010-02-03 | 2011-08-03 | 深圳富泰宏精密工业有限公司 | 通讯装置数据管控系统及方法 |
| JP2012243275A (ja) * | 2011-05-24 | 2012-12-10 | Toshiba Tec Corp | 決済装置およびプログラム |
| CN105427401A (zh) * | 2015-11-05 | 2016-03-23 | 山东超越数控电子有限公司 | 一种记录电子设备拆卸信息的装置及方法 |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10475024B1 (en) | 2012-10-15 | 2019-11-12 | Square, Inc. | Secure smart card transactions |
| US9760740B1 (en) | 2014-06-23 | 2017-09-12 | Square, Inc. | Terminal case with integrated dual reader stack |
| US9870491B1 (en) * | 2014-08-01 | 2018-01-16 | Square, Inc. | Multiple battery management |
| US10753982B2 (en) | 2014-12-09 | 2020-08-25 | Square, Inc. | Monitoring battery health of a battery used in a device |
| JP6455236B2 (ja) * | 2015-03-04 | 2019-01-23 | 日本電気株式会社 | 電子装置 |
| US9471236B1 (en) * | 2015-03-24 | 2016-10-18 | International Business Machines Corporation | Security for memory module data |
| JP2017163280A (ja) * | 2016-03-08 | 2017-09-14 | キヤノン株式会社 | 情報処理装置及び情報処理装置における暗号化ユニットの搭載判別方法、及びプログラム |
| CN110823277B (zh) * | 2018-08-07 | 2021-12-17 | 中惠创智(深圳)无线供电技术有限公司 | 一种设备防拆装置及具有防拆功能的设备 |
| US12400040B2 (en) * | 2018-08-29 | 2025-08-26 | Varex Imaging Corporation | Detection of unauthorized components |
| EP4657300A1 (en) * | 2024-05-30 | 2025-12-03 | Safran Data Systems GmbH | Device and method for time programmable measurement of overhead power off system |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH10111836A (ja) * | 1996-10-04 | 1998-04-28 | Anritsu Corp | 電子機器の扉開閉検知装置 |
| JP2005043973A (ja) * | 2003-07-23 | 2005-02-17 | Canon Electronics Inc | 電子機器、その制御方法、及びその制御プログラム |
| JP2005148969A (ja) * | 2003-11-13 | 2005-06-09 | Mitsubishi Electric Corp | 入退室管理システム |
| JP2006178640A (ja) * | 2004-12-21 | 2006-07-06 | Nidec Sankyo Corp | 電子機器装置 |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| ATE412945T1 (de) * | 1995-02-13 | 2008-11-15 | Intertrust Tech Corp | Systeme und verfahren für ein sicheres übertragungsmanagement und elektronischerrechtsschutz |
| US6920581B2 (en) * | 2002-01-02 | 2005-07-19 | Intel Corporation | Method and apparatus for functional redundancy check mode recovery |
| JP2004295724A (ja) * | 2003-03-28 | 2004-10-21 | Renesas Technology Corp | 半導体処理装置 |
| JP4476143B2 (ja) * | 2005-03-18 | 2010-06-09 | 富士通株式会社 | ブレード型コンピュータ、ブレード管理装置、ブレード管理プログラム、及び制御プログラム |
| CN2824160Y (zh) * | 2005-09-07 | 2006-10-04 | 深圳市沃土实业有限公司 | 一种税控机具 |
| US20070136523A1 (en) * | 2005-12-08 | 2007-06-14 | Bonella Randy M | Advanced dynamic disk memory module special operations |
| US7877563B2 (en) * | 2006-12-07 | 2011-01-25 | International Business Machines Corporation | Programmable memory device security |
| JP4933946B2 (ja) * | 2007-04-18 | 2012-05-16 | 株式会社日立製作所 | 外部記憶装置及び情報漏洩防止方法 |
| US7818523B2 (en) * | 2008-01-10 | 2010-10-19 | Unity Semiconductor Corporation | Securing data in memory device |
| JP5412644B2 (ja) * | 2008-04-30 | 2014-02-12 | 日本電産サンキョー株式会社 | 電子機器装置の不正取り外し検知方法 |
| US7987309B2 (en) * | 2009-02-26 | 2011-07-26 | Broadcom Corporation | Dockable handheld computing device with graphical user interface and methods for use therewith |
-
2008
- 2008-04-30 JP JP2008118023A patent/JP5412644B2/ja not_active Expired - Fee Related
-
2009
- 2009-04-28 US US12/989,980 patent/US8397103B2/en not_active Expired - Fee Related
- 2009-04-28 WO PCT/JP2009/001926 patent/WO2009133695A1/ja not_active Ceased
- 2009-04-28 CN CN200980115922.4A patent/CN102016868B/zh not_active Expired - Fee Related
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH10111836A (ja) * | 1996-10-04 | 1998-04-28 | Anritsu Corp | 電子機器の扉開閉検知装置 |
| JP2005043973A (ja) * | 2003-07-23 | 2005-02-17 | Canon Electronics Inc | 電子機器、その制御方法、及びその制御プログラム |
| JP2005148969A (ja) * | 2003-11-13 | 2005-06-09 | Mitsubishi Electric Corp | 入退室管理システム |
| JP2006178640A (ja) * | 2004-12-21 | 2006-07-06 | Nidec Sankyo Corp | 電子機器装置 |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2009266143A (ja) * | 2008-04-30 | 2009-11-12 | Nidec Sankyo Corp | 電子機器装置の不正取り外し検知方法 |
| CN102143607A (zh) * | 2010-02-03 | 2011-08-03 | 深圳富泰宏精密工业有限公司 | 通讯装置数据管控系统及方法 |
| JP2012243275A (ja) * | 2011-05-24 | 2012-12-10 | Toshiba Tec Corp | 決済装置およびプログラム |
| CN105427401A (zh) * | 2015-11-05 | 2016-03-23 | 山东超越数控电子有限公司 | 一种记录电子设备拆卸信息的装置及方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102016868B (zh) | 2014-03-12 |
| JP5412644B2 (ja) | 2014-02-12 |
| CN102016868A (zh) | 2011-04-13 |
| US20110107132A1 (en) | 2011-05-05 |
| JP2009266143A (ja) | 2009-11-12 |
| US8397103B2 (en) | 2013-03-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5412644B2 (ja) | 電子機器装置の不正取り外し検知方法 | |
| JP5421679B2 (ja) | 不正行為を検知する検知方法 | |
| US8280579B2 (en) | Memory management apparatus | |
| CN108983709B (zh) | 制造装置监视系统和制造装置 | |
| EP1826641B1 (en) | Safety controller providing rapid recovery of safety program data | |
| JP2007507016A (ja) | シリアルインターフェイスを介したフラッシュプログラミングによる電子制御装置のソフトウェアアップデート方法およびこれに対応する状態自動装置 | |
| CN100590599C (zh) | 一种flash的写操作处理方法、系统及设备 | |
| US20080282046A1 (en) | Part information restoration method, part information management method and electronic apparatus | |
| CN110668271A (zh) | 一种电梯控制系统及方法 | |
| JP4675980B2 (ja) | 不正行為防止方法 | |
| EP1185932B1 (en) | Method and apparatus for automatically reintegrating a module into a computer system | |
| JP2005056422A (ja) | 電子機器に対するプログラム書き込みの制御方法および制御システム | |
| KR100940039B1 (ko) | Plc 제어 시스템 및 그 자가 진단 방법 | |
| KR101572854B1 (ko) | 사이버 보안 기능이 강화된 피엘씨 장치 | |
| JP2006099616A (ja) | 携帯可能電子装置及び携帯可能電子装置の制御方法 | |
| JP2008123106A (ja) | マイクロコンピュータ及びマイクロコンピュータのデバッグ方法 | |
| KR20090023787A (ko) | 플래시 메모리 소거핀을 이용한 플래시 메모리 소거 방법및 시스템 | |
| US20200257603A1 (en) | Electronic element, system comprising such an electronic element and method for monitoring a processor | |
| JP2005078582A (ja) | 遠隔監視装置 | |
| JP3480881B2 (ja) | 遠隔監視装置 | |
| JPS6339013A (ja) | 電子計算機 | |
| JP2004054583A (ja) | セキュリティ装置およびセキュリティ装置の動作復帰方法 | |
| JP4394486B2 (ja) | 保守作業ミス防止プログラムおよび保守作業ミス防止方法 | |
| JP4036761B2 (ja) | 火災感知器のデータ設定装置 | |
| JP2547411B2 (ja) | 端末装置のセキュリティ保護方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 200980115922.4 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09738632 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 12989980 Country of ref document: US |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 09738632 Country of ref document: EP Kind code of ref document: A1 |