CN1825291A - Data management apparatus, data management method - Google Patents

Data management apparatus, data management method Download PDF

Info

Publication number
CN1825291A
CN1825291A CN 200610007793 CN200610007793A CN1825291A CN 1825291 A CN1825291 A CN 1825291A CN 200610007793 CN200610007793 CN 200610007793 CN 200610007793 A CN200610007793 A CN 200610007793A CN 1825291 A CN1825291 A CN 1825291A
Authority
CN
China
Prior art keywords
mentioned
key
data
transition key
transition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200610007793
Other languages
Chinese (zh)
Other versions
CN100424660C (en
Inventor
金泽景善
奥田真也
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kyocera Document Solutions Inc
Original Assignee
Kyocera Mita Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kyocera Mita Corp filed Critical Kyocera Mita Corp
Publication of CN1825291A publication Critical patent/CN1825291A/en
Application granted granted Critical
Publication of CN100424660C publication Critical patent/CN100424660C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A data management apparatus and method. The data management apparatus includes: a removable storage device; a nonvolatile memory which saves a first conversion key; a first encrypting device which converts a datum to be saved in the storage device into an encrypted datum by the first conversion key; a first writing device which writes the encrypted datum into the storage device; a first reading device which reads the encrypted data; a first decrypting device having a second conversion key which decrypts the encrypted datum by the second conversion key; a second encrypting device having a third conversion key which encrypts the second conversion key by the third conversion key, and converts the second conversion key into a fourth conversion key; a second writing device which writes the fourth conversion key into the storage device; a second reading device which reads the fourth conversion key; and a second decrypting device which decrypts the fourth conversion key using the third conversion key.

Description

Data administrator and data managing method
Technical field
The present invention relates to data administrator and data managing method that printing machine, facsimile recorder, duplicating machine, server and personal computer etc. have detachable Nonvolatile memory devices (hard disk etc.).
The application requires the right of priority based on Japan's application for a patent for invention of Japan's application for a patent for invention 2005-45239 number of application on February 22nd, 2005,2005-45240 number and application on July 6th, 2005 2005-197370 number, and quotes its content at this.
Background technology
In printing machine etc., character font data and by the work data that principal computer provides is stored in the detachable hard disk (to call HDD in the following text).Therefore the problem that exists is, if this HDD is taken away by other people, just might leak data.
In the past, as the technology that prevents that this data from revealing, known had a following technology.The spy opens the disclosed technology of 2002-260326 communique, when being saved in video information and audio-frequency information in the recording medium, utilize the identifier of recording medium, unique information of record regenerator is encrypted, then with this as key, carry out scrambler and handle.Open in the disclosed technology of 2003-303136 communique the spy, after the enciphered data regeneration of in making recording medium such as CD, being preserved, delete key automatically.Open in the disclosed technology of 2003-131950 communique the spy, come the enciphered digital publication, and be saved in storage card etc. and preserve in the unit based on the intrinsic information of equipment.
Yet; the technology that above-mentioned patent documentation is put down in writing does not all have sufficient protection abilities, and reckons without the destruction of deciphering with key; thereby exist following shortcoming: after causing key to destroy, can't re-use data owing to maloperation and other reason.
Summary of the invention
The present invention in view of the above fact, its purpose is, a kind of data administrator and data managing method are provided, it has higher protection abilities, even and under the disrupted situation of the key that is used to decipher, also can regenerate immediately.
In order to achieve the above object, the invention provides a kind of data administrator, it has: detachable memory storage; Store the nonvolatile memory of first transition key; First ciphering unit, it is with above-mentioned first transition key, and the data-switching that should be stored in above-mentioned memory storage becomes enciphered data; First writing unit, it writes above-mentioned memory storage with above-mentioned enciphered data; First sensing element, it reads above-mentioned enciphered data from above-mentioned memory storage; First decryption unit, it has second transition key, and deciphers above-mentioned enciphered data with above-mentioned second transition key; Second ciphering unit, it has the 3rd transition key, and above-mentioned second transition key is encrypted, thereby converts the 4th transition key to; Second writing unit, it writes above-mentioned memory storage with above-mentioned the 4th transition key; Second sensing element, it reads above-mentioned the 4th transition key; Second decryption unit, it deciphers above-mentioned the 4th transition key with the 3rd transition key.
And, the invention provides a kind of data managing method, it uses in computing machine, and this computing machine has detachable memory storage; With the nonvolatile memory of storage first transition key, this data managing method comprises: first step, and it is with above-mentioned first transition key, and the data-switching that should be stored in above-mentioned memory storage becomes enciphered data; Second step, it writes above-mentioned memory storage with above-mentioned enciphered data; Third step, it reads above-mentioned enciphered data from above-mentioned memory storage; The 4th step, it deciphers above-mentioned enciphered data with second transition key; The 5th step, it is encrypted above-mentioned second transition key with the 3rd transition key, thereby converts the 4th transition key to; The 6th step, it writes above-mentioned memory storage with above-mentioned the 4th transition key; The 7th step, it reads above-mentioned the 4th transition key; The 8th step, it deciphers above-mentioned the 4th transition key with above-mentioned the 3rd transition key.
And, the invention provides a kind of data administrator, it has: detachable memory storage; Nonvolatile memory, it generates and stores first transition key; First ciphering unit, it has second transition key, with above-mentioned second transition key, above-mentioned first transition key is encrypted, thereby converts the 3rd transition key to; First writing unit, it writes above-mentioned memory storage with above-mentioned the 3rd transition key; Second ciphering unit, it has the 4th transition key, with above-mentioned the 4th transition key, above-mentioned the 3rd transition key is encrypted, thereby converts the 5th transition key to; DEU data encryption unit, it is with above-mentioned the 5th transition key, and the data-switching that should be stored in above-mentioned memory storage becomes enciphered data; Data write unit, it writes above-mentioned memory storage with above-mentioned enciphered data; The data sensing element, it reads above-mentioned enciphered data from above-mentioned memory storage; Data decryption unit, it is decrypted above-mentioned enciphered data with above-mentioned the 5th transition key; Delete cells, it and after finishing based on the deciphering of above-mentioned data decryption unit, deletes above-mentioned the 5th transition key after finishing based on the encryption of above-mentioned DEU data encryption unit.
Above-mentioned the 4th transition key can be the unique key of above-mentioned data administrator.
The invention provides a kind of data managing method, it uses in computing machine, this computing machine has: detachable memory storage and the nonvolatile memory that generates and stores first transition key, this data managing method comprises: first step, it uses second transition key, above-mentioned first transition key is encrypted, thereby convert the 3rd transition key to; Second step, it writes above-mentioned memory storage with above-mentioned the 3rd transition key; Third step, it is encrypted above-mentioned the 3rd transition key with the 4th transition key, thereby converts the 5th transition key to; The 4th step, it is with above-mentioned the 5th transition key, and the data-switching that should be stored in above-mentioned memory storage becomes enciphered data; The 5th step, it writes above-mentioned memory storage with above-mentioned enciphered data; The 6th step, it reads above-mentioned enciphered data from above-mentioned memory storage; The 7th step, it deciphers above-mentioned enciphered data with above-mentioned the 5th transition key; The 8th step, it deletes above-mentioned the 5th transition key after above-mentioned the 4th step and the end of above-mentioned the 7th step.
In addition, the invention provides a kind of data administrator, have: storage medium, it stores authenticate key, and detachable; The encryption key generation unit, it generates encryption key based on the master key of stipulating when energized; Check the unit, it is checked above-mentioned authenticate key and above-mentioned encryption key, satisfies under the situation of rated condition in the above-mentioned checked result of checking the unit, carries out writing and reading of above-mentioned storage medium.
Data administrator of the present invention can also have formatting unit, and it does not satisfy under the situation of above-mentioned condition in the above-mentioned checked result of checking the unit, carry out the format of above-mentioned storage medium, then, based on above-mentioned master key, generate suitable authenticate key, and write above-mentioned storage medium.
Above-mentioned master key can be the intrinsic identifier of above-mentioned data administrator, also can be the predefined data of user.
The present invention also provides a kind of data managing method, it uses in computing machine, and this computing machine has authentication storage key and detachable storage medium, and this data managing method comprises: encryption key generates step, it generates encryption key based on the master key of stipulating when energized; Checking step, it is checked above-mentioned authenticate key and above-mentioned encryption key; Checked result in above-mentioned checking step satisfies under the situation of rated condition, carries out the step that writes and read processing of above-mentioned storage medium; Checked result in above-mentioned checking step does not satisfy under the situation of above-mentioned condition, carries out the format of above-mentioned storage medium, then based on above-mentioned master key, generates suitable authenticate key, and writes the step of above-mentioned storage medium.
Description of drawings
Fig. 1 is that the block scheme based on the structure of the image processing system (printing machine) of the data administrator of first embodiment of the invention has been adopted in expression.
Fig. 2 is the key diagram that is used to illustrate the action of this embodiment.
Fig. 3 is the key diagram that is used to illustrate the action of this embodiment.
Fig. 4 is that the block scheme based on the structure of the image processing system (printing machine) of the data administrator of second embodiment of the invention has been adopted in expression.
Fig. 5 is the key diagram that is used to illustrate the action of this embodiment.
Fig. 6 is that the block scheme based on the structure of the image processing system (printing machine) of the data administrator of third embodiment of the invention has been adopted in expression.
Fig. 7 A and Fig. 7 B are the key diagrams that is used to illustrate the action of this embodiment when power connection.
Fig. 8 is the key diagram that is used to illustrate the write activity of this embodiment.
Fig. 9 is the key diagram of reading action that is used to illustrate this embodiment.
Embodiment
Following with reference to accompanying drawing, embodiments of the present invention are described.Fig. 1 is that the block scheme based on the formation of the image processing system (printing machine) of the data administrator of first embodiment of the invention has been adopted in expression.Among this figure, symbol 1 is by microprocessor and stores the control part that the ROM (ROM (read-only memory)) of the program of this processor constitutes, is used to carry out the control of device integral body.Symbol 2 is that data are temporary with RAM (random access memory), and symbol 3 is nonvolatile memory (non-volatile rams), stores to be used for work data (print data) encrypted secret key A.This key A is at each device and unique key, waits based on sequence number and sets.Symbol 4 is store font data and the storage medium that utilizes the work data after key A is encrypted, and it constitutes detachable structure.Symbol 5 is Department of Communication Forces, receives the work data that provides via LAN (LAN) from principal computer, and to control part 1 output.
Symbol 7 is image forming parts, transfer printing toner picture on the thin slice that has adopted photoreceptor, thus form the toner picture (uncertain image) of not photographic fixing.For the material of above-mentioned thin slice, can adopt paper and plastics etc.Symbol 8 is Mechanical Driven portions, is used to carry out the paper feeding of thin slice, the driving of arranging mechanical parts such as paper, transmission.Symbol 9 is photographic fixing portions, is used for carrying out photographic fixing based on the uncertain image on the thin slice of above-mentioned image forming part 7.9 pairs of thin slices of this photographic fixing portion heat and pressurize, thereby make uncertain image photographic fixing.Even when standby, also can keep the required heating of photographic fixing of uncertain image.Thus, can realize the OnNow that image forms without preheating.
Next, with reference to Fig. 2, Fig. 3, illustrate that the data of storage medium 4 in the above-mentioned image processing system write/read action.
At first, when storage medium 4 initialization, control part 1 is read key A from nonvolatile memory 3, and encrypts with the key B that is stored in advance among the inner ROM, and as shown in Figure 2, will write storage medium 4 by encrypting resulting key A 1.After this, via Department of Communication Force 5 with work data when principal computer is input to control part 1, control part 1 utilizes the key A in the nonvolatile memory 3, this work data is encrypted, and write storage medium 4.In addition, during work data in printing storage medium 4, read the encryption work data in the storage medium 4, and decipher with key A, and to image forming part 7 outputs.As mentioned above, because key A is at each device and therefore unique key, even storage medium 4 is installed in the image processing system of other same size, can not print work data.
Next, under thereby the situation about being destroyed former because of maloperation etc. in key A, control part 1 is read key A 1 from storage medium 4, and is decrypted with the key B in the ROM, and as shown in Figure 3, will be by the resulting key A write non-volatile memory 3 of deciphering.
Like this, in the above-described embodiment, be that unique key A is encrypted work data owing to utilize at each device, and store in the storage medium 4, even thereby storage medium 4 is stolen, can not on other device, prints work data, thereby can guarantee security.In addition, according to above-mentioned embodiment, owing to will store in the storage medium 4 with resulting key A 1 behind the key B encryption key A in the control part 1, even thereby storage medium 4 is stolen, but owing to do not have key B, so needn't worry that key A 1 can be decrypted, and, under the situation that key A in nonvolatile memory 3 is destroyed, can be by the key A 1 in the deciphering storage medium 4, the key A of regenerating immediately.
Next, with reference to accompanying drawing, second embodiment of the invention is described.Fig. 4 is that the block scheme based on image processing system (printing machine) formation of the data administrator of second embodiment of the invention has been adopted in expression.Among this figure, symbol 11 is by microprocessor and stores the control part that the ROM (ROM (read-only memory)) of the program of this processor constitutes that it is used to carry out the control of device integral body.Symbol 12 is that data are temporary with RAM (random access memory), and symbol 13 is nonvolatile memory (non-volatile rams).Storage key C in this nonvolatile memory 13.Symbol 14 is storage mediums of store font data and encrypted work data (print data), and it constitutes detachable structure.Symbol 15 is operating portions, uses when the user imports key data etc.Symbol 16 is Department of Communication Forces, receives the work data that provides via LAN (LAN) from principal computer, and to control part 11 outputs.The structure of image forming part 7, Mechanical Driven portion 8 and photographic fixing portion 9 is identical with first embodiment, thereby omits explanation.
Next, with reference to Fig. 5, illustrate that the data of storage medium 14 in the above-mentioned image processing system write/read action.
At first, when storage medium 14 initialization, the arbitrary data that the user uses as ciphering key from operating portion 15 inputs.The data of being imported are imported into control part 11, control part 11 with these data as in the ciphering key write non-volatile memory 13.Next, control part 11 is read ciphering key from nonvolatile memory 13, and utilizes the fixed key that is stored in inside in advance to encrypt, and as shown in Figure 5, will write storage medium 14 by encrypting resulting key D.Here, so-called fixed key is even mean also identical key in other image processing system of same specification.
After this, when via Department of Communication Force 16, when principal computer was input to control part 11, control part 11 was at first encrypted key D in the storage medium 14 with inner unique key with work data, and write among the RAM12 (with reference to Fig. 5) as key E.Here, so-called unique key is this device intrinsic (unique) key, based on preestablishing such as manufacturing numbering of installing and sequence number etc.Next, control part 11 utilizes the key E in the RAM12, encrypts the work data of being imported, and writes in the storage medium 14.Like this, in all the work data encryption finishes, the key E in the deletion RAM12.
Next, during work data in printing storage medium 14, control part 11 is at first similarly encrypted key D with above-mentioned, thereby generate key E, and write in the RAM12, next, read the encryption work data in the storage medium 14, and decipher with key E, then to image forming part 7 outputs.Like this, in the work data deciphering in storage medium 14 finishes, the key E in the deletion RAM12.
Like this, in the above-described embodiment, utilizing at each device is unique key, come encryption key E, therefore, even storage medium 14 is installed in the image processing system of other same specification, can not decipher inner data, thereby can not print job data.In addition,, when using end, then delete, thereby compare, can further improve protection abilities with conventional apparatus owing to only generate key E in use.
In the above-described embodiment, encryption key is identical with decruption key, uses and other paired key but also can adopt as encrypting usefulness/deciphering.
In the above-described embodiment, though be to generate key E, also can generate key E by encryption to ciphering key by key D.
In the above-described embodiment, adopted HDD as storage medium, but also can adopt storage card, CD and photomagneto disk etc.
Next, with reference to accompanying drawing, third embodiment of the invention is described.Fig. 6 is that the block scheme based on image processing system (printing machine) formation of the data administrator of third embodiment of the invention has been adopted in expression.Among this figure, symbol 21 is by microprocessor and stores the control part that the ROM (ROM (read-only memory)) of the program of this processor constitutes that it is used to carry out the control of device integral body.Symbol 22 is that data are temporary with RAM (random access memory).Symbol 23 is nonvolatile memories, stores the encryption key that is used to encrypt work data (print data).This encryption key is at each device and unique key, and it to be installing intrinsic ID number (identifier) as master key, and sets based on this master key when energized.Symbol 24 is storage mediums (HDD) of storing the work data of encrypting with encryption key, and it constitutes demountable structure.In storage medium 24, store the key identical with encryption key as authenticate key.Symbol 25 is Department of Communication Forces, receives the work data that provides via LAN (LAN) from principal computer, and to control part 21 outputs.The structure of image forming part 7, Mechanical Driven portion 8 and photographic fixing portion 9 is identical with first embodiment, thereby omits explanation.
Next, with reference to Fig. 7 A to Fig. 9, the action of above-mentioned image processing system is described.
(1) action (Fig. 7 A, Fig. 7 B) during energized
After user's energized, control part 21 is at first read the master key (ID that equipment is intrinsic) that is stored among the inner ROM, and this master key is carried out calculation process based on the regulation algorithm, thereby generates encryption key.Next, with the encryption key write non-volatile memory 23 (with reference to Fig. 7 A) that is generated.
Next, control part 21 is read authenticate key from storage medium 24, and checks with the encryption key in the nonvolatile memory 23.If the two unanimity then is judged as storage medium 24 and is proper storage medium, read/write processing thereby enter data described later.If the two is inconsistent, then being judged as storage medium 24 is wrongful storage mediums, and carries out the format processing of storage medium 24, next, to the master key in the ROM carry out based on the calculation process of the same generating algorithm of above-mentioned encryption key, thereby generate authenticate key.Next, the authenticate key that is generated is write storage medium 24, then, enter data and read/write processing (with reference to Fig. 7 B).
(2) to the data of storage medium read/write activity (Fig. 8, Fig. 9).
Under the situation of the work data of user in printing principal computer, to the appointment and the print command of principal computer input work data.The principal computer receiving printing orders, and, specified work data is sent to image processing system via LAN.The control part 21 of image processing system receives this work data, and temporary in RAM22.Next, from nonvolatile memory 23, read encryption key, encrypt the work data in the RAM22, and write storage medium 24 (with reference to Fig. 8).
Next, when printing, control part 21 is read encrypted work data from storage medium 24, and utilizes the encryption key in the nonvolatile memory 23 to decipher (with reference to Fig. 9), and send decrypted work data to image forming part 7, thereby print.
Like this, according to above-mentioned embodiment, because when energized, be based on master key (ID that equipment is intrinsic) and generate encryption key, thereby in device uses, when encryption key former thereby when being destroyed because of certain, can be by energized once more, immediately the encryption key of regenerating, thereby can not make device become out of use state.In addition, owing to make storage medium 24 authentication storage keys, and when power connection, check whether this authenticate key consistent with encryption key, thereby can detect wrongful storage medium.In addition, detecting under the situation of wrongful storage medium, after the format of having carried out storage medium is handled, correct authenticate key is being write in the storage medium, thereby can reuse wrongful storage medium immediately.
In addition, in the above-described embodiment, be with master key as the intrinsic ID of equipment, but also can set master key alone by the user.
In addition, in the above-described embodiment, be that encryption key and authenticate key are made as same key, but also can adopt the algorithm of different mutually generation encryption keys and the algorithm of generation authenticate key.In this case, in order to check the consistance of encryption key and authenticate key, be necessary to decipher respectively this two keys, and check.
In the above-described embodiment, adopted HDD, but be under the situation of storage card, CD and photomagneto disk etc., also can use the present invention at storage medium as storage medium.
The preferred embodiments of the present invention more than have been described, but have the invention is not restricted to these embodiment.In the scope that does not break away from aim of the present invention, can carry out adding, omit, replacing and other change of structure.The present invention is not subjected to the qualification of above-mentioned explanation, and is only limited by the scope of claims.

Claims (10)

1. data administrator has:
Detachable memory storage;
Store the nonvolatile memory of first transition key;
First ciphering unit, it is with above-mentioned first transition key, and the data-switching that should be stored in the above-mentioned memory storage becomes enciphered data;
First writing unit, it writes above-mentioned memory storage with above-mentioned enciphered data;
First sensing element, it reads above-mentioned enciphered data from above-mentioned memory storage;
First decryption unit, it has second transition key, and with above-mentioned second transition key, above-mentioned enciphered data is decrypted;
Second ciphering unit, it has the 3rd transition key, and with above-mentioned the 3rd transition key, by above-mentioned second transition key is encrypted, converts the 4th transition key to;
Second writing unit, it writes above-mentioned memory storage with above-mentioned the 4th transition key;
Second sensing element, it reads above-mentioned the 4th transition key;
Second decryption unit, it deciphers above-mentioned the 4th transition key with the 3rd transition key.
2. data managing method, it uses in computing machine, and this computing machine has the nonvolatile memory of detachable memory storage and storage first transition key,
This data managing method comprises:
First step, it is with above-mentioned first transition key, and the data-switching that should be stored in the above-mentioned memory storage becomes enciphered data;
Second step, it is used for above-mentioned enciphered data is write above-mentioned memory storage;
Third step, it is used for reading above-mentioned enciphered data from above-mentioned memory storage;
The 4th step, it uses second transition key, and above-mentioned enciphered data is decrypted;
The 5th step, it is encrypted above-mentioned second transition key with the 3rd transition key, thereby converts the 4th transition key to;
The 6th step, it writes above-mentioned memory storage with above-mentioned the 4th transition key;
The 7th step, it reads above-mentioned the 4th transition key;
The 8th step, it deciphers above-mentioned the 4th transition key with above-mentioned the 3rd transition key.
3. data administrator has:
Detachable memory storage;
Nonvolatile memory, it generates and stores first transition key;
First ciphering unit, it has second transition key, with above-mentioned second transition key, above-mentioned first transition key is encrypted, thereby converts the 3rd transition key to;
First writing unit, it writes above-mentioned memory storage with above-mentioned the 3rd transition key;
Second ciphering unit, it has the 4th transition key, with above-mentioned the 4th transition key, above-mentioned the 3rd transition key is encrypted, thereby converts the 5th transition key to;
DEU data encryption unit, it is with above-mentioned the 5th transition key, and the data-switching that should be stored in the above-mentioned memory storage becomes enciphered data;
Data write unit, it writes above-mentioned memory storage with above-mentioned enciphered data;
The data sensing element, it reads above-mentioned enciphered data from above-mentioned memory storage;
Data decryption unit, it is decrypted above-mentioned enciphered data with above-mentioned the 5th transition key;
Delete cells, it and after finishing based on the deciphering of above-mentioned data decryption unit, deletes above-mentioned the 5th transition key after finishing based on the encryption of above-mentioned DEU data encryption unit.
4. data administrator according to claim 3, wherein,
Above-mentioned the 4th transition key is the unique key of above-mentioned data administrator.
5. data managing method, it is in computing machine, and this computing machine has detachable memory storage and generates and stores the nonvolatile memory of first transition key,
This data managing method comprises:
First step, it uses second transition key, above-mentioned first transition key is encrypted, thereby convert the 3rd transition key to;
Second step, it writes above-mentioned memory storage with above-mentioned the 3rd transition key;
Third step, it is encrypted above-mentioned the 3rd transition key with the 4th transition key, thereby converts the 5th transition key to;
The 4th step, it is with above-mentioned the 5th transition key, and the data-switching that should be stored in the above-mentioned memory storage becomes enciphered data;
The 5th step, it writes above-mentioned memory storage with above-mentioned enciphered data;
The 6th step, it reads above-mentioned enciphered data from above-mentioned memory storage;
The 7th step, it deciphers above-mentioned enciphered data with above-mentioned the 5th transition key;
The 8th step, it deletes above-mentioned the 5th transition key after above-mentioned the 4th step and the end of above-mentioned the 7th step.
6. data administrator,
Have:
Storage medium, it is used for the authentication storage key, and detachable;
The encryption key generation unit, it generates encryption key based on the master key of stipulating when energized;
Check the unit, it is checked above-mentioned authenticate key and above-mentioned encryption key,
Satisfy under the situation of rated condition in the above-mentioned checked result of checking the unit, carry out writing and reading of above-mentioned storage medium.
7. data administrator according to claim 6 also has:
Formatting unit, it does not satisfy under the situation of above-mentioned condition in the above-mentioned checked result of checking the unit, carries out the format of above-mentioned storage medium, then based on above-mentioned master key, generates suitable authenticate key, and writes above-mentioned storage medium.
8. data administrator according to claim 6, wherein,
Above-mentioned master key is the intrinsic identifier of above-mentioned data administrator.
9. data administrator according to claim 6, wherein,
Above-mentioned master key is the predefined data of user.
10. data managing method, it uses in computing machine, and this computing machine has has stored authenticate key and detachable storage medium,
This data managing method comprises:
Encryption key generates step, and it generates encryption key based on the master key of stipulating when energized;
Checking step, it is checked above-mentioned authenticate key and above-mentioned encryption key;
Checked result in above-mentioned checking step satisfies under the situation of rated condition, carries out the step that writes and read processing of above-mentioned storage medium;
Checked result in above-mentioned checking step does not satisfy under the situation of above-mentioned condition, carries out the format of above-mentioned storage medium, generates suitable authenticate key based on above-mentioned master key then, and writes the step of above-mentioned storage medium.
CNB2006100077935A 2005-02-22 2006-02-20 Data management apparatus, data management method Expired - Fee Related CN100424660C (en)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
JP2005-045240 2005-02-22
JP2005045239A JP4498946B2 (en) 2005-02-22 2005-02-22 Data management apparatus and program thereof
JP2005045239 2005-02-22
JP2005045240 2005-02-22
JP2005-045239 2005-02-22
JP2005197370 2005-07-06
JP2005-197370 2005-07-06

Publications (2)

Publication Number Publication Date
CN1825291A true CN1825291A (en) 2006-08-30
CN100424660C CN100424660C (en) 2008-10-08

Family

ID=36935976

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100077935A Expired - Fee Related CN100424660C (en) 2005-02-22 2006-02-20 Data management apparatus, data management method

Country Status (2)

Country Link
JP (1) JP4498946B2 (en)
CN (1) CN100424660C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107408193A (en) * 2015-05-18 2017-11-28 Nec 飞鼎克株式会社 Method and program are forbidden in storage device, access

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8290159B2 (en) 2007-03-16 2012-10-16 Ricoh Company, Ltd. Data recovery method, image processing apparatus, controller board, and data recovery program
JP5041833B2 (en) * 2007-03-16 2012-10-03 株式会社リコー Data recovery method, image processing apparatus, controller board, and data recovery program
JP5391756B2 (en) * 2009-03-17 2014-01-15 株式会社リコー Image forming apparatus, information management method, and program

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1154348B9 (en) * 2000-05-11 2007-06-13 Matsushita Electric Industrial Co., Ltd. File management apparatus
AU2000255731A1 (en) * 2000-07-04 2002-01-14 Hitachi Ltd. Ic card, method for backing up ic card, and restoring method
US7203311B1 (en) * 2000-07-21 2007-04-10 The Directv Group, Inc. Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device
JP2002245427A (en) * 2001-02-20 2002-08-30 Toshiba Corp Ic card, ic card terminal device and method for duplicating ic card
JP2002368735A (en) * 2001-06-11 2002-12-20 Sharp Corp Master ic device, backup ic device for the master ic device, dummy key storage device providing dummy key to the master ic device, auxiliary device or the master ic device and the backup ic device, and key backup system using two auxiliary devices or over
JP3773431B2 (en) * 2001-09-20 2006-05-10 松下電器産業株式会社 Key mounting system, LSI for realizing the same, and key mounting method
EP1304827A1 (en) * 2001-10-08 2003-04-23 Beta Research GmbH Secure data transmission method
JP4328062B2 (en) * 2002-06-11 2009-09-09 株式会社東芝 Information storage device and information storage method
JP2004120008A (en) * 2002-09-20 2004-04-15 Pioneer Electronic Corp Key management system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107408193A (en) * 2015-05-18 2017-11-28 Nec 飞鼎克株式会社 Method and program are forbidden in storage device, access

Also Published As

Publication number Publication date
JP4498946B2 (en) 2010-07-07
CN100424660C (en) 2008-10-08
JP2006237689A (en) 2006-09-07

Similar Documents

Publication Publication Date Title
CN101355630B (en) Data processing apparatus, data processing system, and control method therefor
US7925895B2 (en) Data management apparatus, data management method, and storage medium
CN102334124B (en) File protection method and device
US7978849B2 (en) Image forming apparatus, and control method thereof
US20070050696A1 (en) Physical key for accessing a securely stored digital document
US20080163364A1 (en) Security method for controlled documents
US20060288236A1 (en) Electronic document protection system and method
JP4662138B2 (en) Information leakage prevention method and system
US7869595B2 (en) Content copying device and content copying method
JP2005020346A (en) Data encrypting device, data decrypting device, image data storage device, and image forming device
CN109547215B (en) Document information protection method based on mobile terminal fingerprint
US20090129591A1 (en) Techniques for Securing Document Content in Print and Electronic Form
JP5079343B2 (en) Device introduction method to device family by paper receipt
CN1261895C (en) Contents reproducing apparatus, contents reproduction control program and recording medium having a contents reproduction control program recorded thereon
CN100424660C (en) Data management apparatus, data management method
JP4791741B2 (en) Data processing apparatus and data processing method
CN1639789A (en) Apparatus and method for reading or writing user data
JP2003195758A (en) Data processor, interface board and data concealing method
US8132014B2 (en) Image archiver
JP2008042718A (en) Image reading system, information processing apparatus, image reader and program
JP4442583B2 (en) Image processing apparatus, image processing method, and image processing program
JP2010124213A (en) Image forming apparatus and method of controlling the same
JP2008093903A (en) Image information processing system and image information processing method
JP2005130261A (en) Image forming apparatus, its control method, and its control program
JP2006085456A (en) Data distribution system, device and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081008

Termination date: 20150220

EXPY Termination of patent right or utility model