JP2006237689A - Data management device and its program - Google Patents

Data management device and its program Download PDF

Info

Publication number
JP2006237689A
JP2006237689A JP2005045239A JP2005045239A JP2006237689A JP 2006237689 A JP2006237689 A JP 2006237689A JP 2005045239 A JP2005045239 A JP 2005045239A JP 2005045239 A JP2005045239 A JP 2005045239A JP 2006237689 A JP2006237689 A JP 2006237689A
Authority
JP
Japan
Prior art keywords
key
data
procedure
hdd
storage device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2005045239A
Other languages
Japanese (ja)
Other versions
JP4498946B2 (en
Inventor
Kageyoshi Kanazawa
景善 金沢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kyocera Document Solutions Inc
Original Assignee
Kyocera Mita Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kyocera Mita Corp filed Critical Kyocera Mita Corp
Priority to JP2005045239A priority Critical patent/JP4498946B2/en
Priority to US11/357,532 priority patent/US7925895B2/en
Priority to CNB2006100077935A priority patent/CN100424660C/en
Publication of JP2006237689A publication Critical patent/JP2006237689A/en
Application granted granted Critical
Publication of JP4498946B2 publication Critical patent/JP4498946B2/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

<P>PROBLEM TO BE SOLVED: To provide a data management device high in security protection capability and capable of immediately reproducing an encryption key even if the encryption key is damaged. <P>SOLUTION: A control unit reads out a key (A) from an NVRAM 3, encrypts it by using a key (B), and writes it in an HDD 4 as a key (A1) when initializing the HDD 4. When job data are inputted from a host computer to the control unit via a communication part, the control unit encrypts the job data by using the key (A) in the NVRAM 3 and writes them in the HDD 4. When printing the job data in the HDD 4, the control unit reads out the encrypted job data in the HDD 4, decrypts them by using the key (A), and outputs them to an image forming part. When the key (A) is damaged due to errors in operation or the like, the control unit reads out the key (A1) from the HDD 4, decrypts it, and writes it in the NVRAM 3. <P>COPYRIGHT: (C)2006,JPO&NCIPI

Description

本発明は、プリンタ、FAX、コピー機、サーバ、パーソナルコンピュータ等、取り外し可能な不揮発性記憶装置(ハードディスク等)を具備するデータ管理装置およびそのプログラムに関する。   The present invention relates to a data management apparatus including a removable non-volatile storage device (such as a hard disk) such as a printer, a fax machine, a copier, a server, and a personal computer, and a program thereof.

プリンタ等においては、フォントデータやホストコンピュータから供給されるジョブデータがハードディスク(以下、HDDという)に記憶される。したがって、このHDDが持ち去られると、データが漏洩してしまう問題がある。
従来、このようなデータ漏洩を防止する技術として、特許文献1〜3に記載される技術が知られている。特許文献1の技術は、ビデオ情報やオーディオ情報を記録メディアに保存する時に、記録メディアの識別子により記録再生装置にユニークな情報を暗号化したものを鍵として、スクランブル処理するというものである。また、特許文献2の技術は、CD等の記録媒体に保存された暗号化データを再生した後に、鍵を自動的に消去するというものである。また、特許文献3の技術は、ディジタル著作物を機器固有の情報に基づいて暗号化し、メモリカード等の保存手段に保存するというものである。
特開2002-260326号公報 特開2003-303136号公報 特開2003-131950号公報
In a printer or the like, font data and job data supplied from a host computer are stored in a hard disk (hereinafter referred to as HDD). Therefore, there is a problem that data is leaked when this HDD is taken away.
Conventionally, techniques described in Patent Documents 1 to 3 are known as techniques for preventing such data leakage. The technique of Patent Document 1 is that when video information and audio information are stored in a recording medium, a scramble process is performed using a key obtained by encrypting unique information in a recording / reproducing apparatus by an identifier of the recording medium. The technique of Patent Document 2 is to automatically delete a key after reproducing encrypted data stored on a recording medium such as a CD. The technique of Patent Document 3 encrypts a digital work based on device-specific information and stores it in a storage means such as a memory card.
JP 2002-260326 A JP 2003-303136 A JP 2003-131950 A

しかしながら、これら特許文献に記載の技術はいずれも、復号用の鍵の破損について考慮されていないという欠点があった。
本発明は上記事情を考慮してなされたもので、その目的は、セキュリティ保護能力が高く、しかも、復号のための鍵が破損した場合においても直ちに再生することができるデータ管理装置およびそのプログラムを提供することにある。
However, all of the techniques described in these patent documents have a drawback in that no consideration is given to breakage of a decryption key.
The present invention has been made in consideration of the above circumstances, and an object of the present invention is to provide a data management device that has high security protection capability and can be immediately reproduced even when a decryption key is damaged, and a program thereof. It is to provide.

この発明は上述した課題を解決するためになされたもので、請求項1に記載の発明は、取り外し可能な記憶装置と、第1の暗号化鍵を記憶する不揮発性メモリと、前記記憶装置に記憶させるべきデータを前記第1の暗号化鍵によって暗号化する暗号化手段と、前記暗号化手段によって暗号化されたデータを前記記憶装置に書き込む第1の書込手段と、前記記憶装置からデータを読み出す第1の読出手段と、前記第1の読出手段によって読み出されたデータを前記第1の暗号化鍵に対応する第1の復号化鍵によって復号する第1の復号手段と、前記第1の復号化鍵を暗号化する第2の暗号化手段と、前記第2の暗号化手段によって暗号化された第1の復号化鍵を前記記憶装置に書き込む第2の書き込み手段と、前記記憶手段内の第1の復号化鍵を読み出す第2の読出手段と、前記第2の読出手段によって読み出された前記第1の復号化鍵を復号する第2の復号手段とを具備することを特徴とするデータ管理装置である。   The present invention has been made to solve the above-described problems. The invention according to claim 1 is directed to a removable storage device, a nonvolatile memory storing a first encryption key, and the storage device. Encryption means for encrypting data to be stored with the first encryption key; first writing means for writing data encrypted by the encryption means to the storage device; and data from the storage device First reading means for reading data, first decrypting means for decrypting data read by the first reading means with a first decryption key corresponding to the first encryption key, and Second encryption means for encrypting one decryption key, second write means for writing the first decryption key encrypted by the second encryption means to the storage device, and the storage First decryption key in the means Second reading means for reading, it is a data management apparatus according to claim comprising a second decoding means for decoding the first decryption key read by said second reading means.

請求項2に記載の発明は、取り外し可能な記憶装置と、第1の暗号化鍵を記憶する不揮発性メモリとを具備するコンピュータに、前記記憶装置に記憶させるべきデータを前記第1の暗号化鍵によって暗号化する第1の手順と、前記第1の手順によって暗号化されたデータを前記記憶装置に書き込む第2の手順と、前記記憶装置からデータを読み出す第3の手順と、前記第3の手順によって読み出されたデータを前記第1の暗号化鍵に対応する第1の復号化鍵によって復号する第4の手順と、前記第1の復号化鍵を暗号化する第5の手順と、前記第5の手順によって暗号化された第1の復号化鍵を前記記憶装置に書き込む第6の手順と、前記記憶手段内の第1の復号化鍵を読み出す第7の手順と、前記第7の手順によって読み出された前記第1の復号化鍵を復号する第8の手順とを実行させるためのプログラムである。   According to a second aspect of the present invention, there is provided a computer comprising a removable storage device and a non-volatile memory for storing a first encryption key. A first procedure for encrypting with a key; a second procedure for writing data encrypted by the first procedure into the storage device; a third procedure for reading data from the storage device; A fourth procedure for decrypting the data read by the procedure with a first decryption key corresponding to the first encryption key, and a fifth procedure for encrypting the first decryption key; , A sixth procedure for writing the first decryption key encrypted by the fifth procedure to the storage device, a seventh procedure for reading the first decryption key in the storage means, The first read by the procedure of 7 Is a program for executing an eighth step of decoding the decryption key.

この発明によれば、記憶装置が盗まれた場合においても内部のデータを保護することができ、かつ、記憶装置のデータを復号する鍵が破損した場合においても、直ちに再生することができる効果がある。   According to the present invention, the internal data can be protected even when the storage device is stolen, and even when the key for decrypting the data in the storage device is damaged, the data can be immediately reproduced. is there.

以下、図面を参照し、この発明の実施の形態について説明する。図1はこの発明の一実施の形態によるデータ管理装置を適用した画像形成装置(プリンタ)の構成を示すブロック図である。この図において、符号1はマイクロプロセッサおよび同プロセッサのプログラムが記憶されたROM(リードオンリメモリ)によって構成された制御部であり、装置全体の制御を行う。2はデータ一時記憶用のRAM(ランダムアクセスメモリ)、3はNVRAM(不揮発性RAM)であり、NVRAM3にはジョブデータ(印刷データ)を暗号化するための鍵Aが記憶されている。この鍵Aは装置毎にユニークな鍵であり、シリアル番号等に基づいて設定されている。4はフォントデータおよび鍵Aによって暗号化されたジョブデータが記憶されるHDDであり、取り外し可能に構成されている。5は通信部であり、ホストコンピュータからLAN(ローカルエリアネットワーク)を介して供給されるジョブデータを受信し、制御部1へ出力する。   Embodiments of the present invention will be described below with reference to the drawings. FIG. 1 is a block diagram showing the configuration of an image forming apparatus (printer) to which a data management apparatus according to an embodiment of the present invention is applied. In this figure, reference numeral 1 denotes a control unit constituted by a microprocessor and a ROM (Read Only Memory) in which a program of the processor is stored, and controls the entire apparatus. Reference numeral 2 denotes a RAM (random access memory) for temporary storage of data, 3 denotes an NVRAM (nonvolatile RAM), and the NVRAM 3 stores a key A for encrypting job data (print data). This key A is a unique key for each apparatus, and is set based on a serial number or the like. An HDD 4 stores font data and job data encrypted with the key A, and is configured to be removable. A communication unit 5 receives job data supplied from a host computer via a LAN (local area network) and outputs the job data to the control unit 1.

7は画像形成部であり、感光体を用いたシート上にトナー像を転写して未定着のトナー像(未定着画像)を形成する。上記シートの材質には、紙、プラスチックなどが使用される。8は機械駆動部であり、シートの給紙、排紙、搬送などの機械部分の駆動を行う。9は定着部であり、上記画像形成部7によるシート上の未定着画像の定着を行う。この定着部9は、シートに対して加熱及び加圧して未定着画像を定着させる。また、待機時においても、未定着画像の定着に要する発熱を維持する。これにより、ウォームアップすることなく、画像形成の即時始動に対応することが可能である。   Reference numeral 7 denotes an image forming unit which transfers a toner image onto a sheet using a photoconductor to form an unfixed toner image (unfixed image). As the material of the sheet, paper, plastic or the like is used. Reference numeral 8 denotes a mechanical drive unit that drives mechanical parts such as sheet feeding, paper discharge, and conveyance. A fixing unit 9 fixes the unfixed image on the sheet by the image forming unit 7. The fixing unit 9 heats and presses the sheet to fix the unfixed image. Further, the heat generation required for fixing an unfixed image is maintained even during standby. Thereby, it is possible to cope with an immediate start of image formation without warming up.

次に、上述した画像形成装置におけるHDD4のデータ書込/読出動作を図2、図3を参照して説明する。
まず、制御部1は、HDD4の初期化時において、NVRAM3から鍵Aを読み出し、予め内部のROMに記憶されている鍵Bを用いて暗号化し、図2に示すように、暗号化によって得られた鍵A1をHDD4に書き込む。以後、通信部5を介してホストコンピュータからジョブデータが制御部1へ入力されると、制御部1は、そのジョブデータをNVRAM3内の鍵Aを用いて暗号化し、HDD4に書き込む。また、HDD4内のジョブデータを印刷する時は、HDD4内の暗号化されたジョブデータを読み出し、鍵Aを用いて復号し、画像形成部7へ出力する。なお、前述したように、鍵Aは装置毎にユニークな鍵であり、したがって、HDD4を他の同一規格の画像形成装置にセットしても、ジョブデータを印刷することはできない。
Next, the data writing / reading operation of the HDD 4 in the above-described image forming apparatus will be described with reference to FIGS.
First, the controller 1 reads the key A from the NVRAM 3 at the time of initialization of the HDD 4, encrypts it using the key B stored in advance in the internal ROM, and obtains it by encryption as shown in FIG. The key A1 is written to the HDD 4. Thereafter, when job data is input from the host computer to the control unit 1 via the communication unit 5, the control unit 1 encrypts the job data using the key A in the NVRAM 3 and writes it in the HDD 4. When printing job data in the HDD 4, the encrypted job data in the HDD 4 is read, decrypted using the key A, and output to the image forming unit 7. As described above, the key A is a unique key for each apparatus. Therefore, even if the HDD 4 is set in another image forming apparatus of the same standard, job data cannot be printed.

次に、鍵Aが操作ミス等の理由によって破損した場合は、制御部1がHDD4から鍵A1を読み出し、ROM内の鍵Bを用いて復号し、図3に示すように、復号によって得られた鍵AをNVRAM3に書き込む。
このように、上記実施形態においては、装置毎にユニークな鍵Aを用いてジョブデータを暗号化し、HDD4に記憶させているので、HDD4が盗まれても、他の装置によってジョブデータを印刷することができず、セキュリティを確保することができる。また、上記実施形態によれば、鍵Aを制御部1内の鍵Bによって暗号化した鍵A1をHDD4に記憶させているので、HDD4が盗まれても、鍵Bがないため鍵A1が復号化される恐れがなく、かつ、NVRAM3内の鍵Aが破損した場合はHDD4内の鍵A1を復号することによって直ちに鍵Aを再生することができる。
Next, when the key A is damaged due to an operation error or the like, the control unit 1 reads the key A1 from the HDD 4, decrypts it using the key B in the ROM, and is obtained by decryption as shown in FIG. The key A is written into the NVRAM 3.
As described above, in the above embodiment, job data is encrypted using the unique key A for each apparatus and stored in the HDD 4, so that even if the HDD 4 is stolen, the job data is printed by another apparatus. Security can be ensured. Further, according to the above embodiment, since the key A1 obtained by encrypting the key A with the key B in the control unit 1 is stored in the HDD 4, the key A1 is decrypted because there is no key B even if the HDD 4 is stolen. If the key A in the NVRAM 3 is damaged, the key A can be immediately reproduced by decrypting the key A1 in the HDD 4.

なお、上記実施形態においては、暗号化の鍵と復号化の鍵を同一としているが、暗号化用/復号化用としてペアとなっている別の鍵を用いてもよい。この場合、HDD4に記憶させる鍵は復号用の鍵となる。
また、上記実施形態においては、HDDを用いているが、これに代えて、メモリカード、光ディスク、光磁気ディスク等を用いてもよい。
In the above embodiment, the encryption key and the decryption key are the same, but another key paired for encryption / decryption may be used. In this case, the key stored in the HDD 4 is a decryption key.
In the above embodiment, the HDD is used, but a memory card, an optical disk, a magneto-optical disk, or the like may be used instead.

本発明は、プリンタ、コピー機、FAX、サーバ、パソコン等の電子データを処理する装置において用いられる。   The present invention is used in an apparatus that processes electronic data such as a printer, a copier, a FAX, a server, and a personal computer.

この発明の一実施形態によるデータ管理装置の構成を示すブロック図である。It is a block diagram which shows the structure of the data management apparatus by one Embodiment of this invention. 同実施形態の動作を説明するための説明図である。It is explanatory drawing for demonstrating the operation | movement of the embodiment. 同実施形態の動作を説明するための説明図である。It is explanatory drawing for demonstrating the operation | movement of the embodiment.

符号の説明Explanation of symbols

1…制御部
2…RAM
3…NVRAM
4…HDD
5…通信部
1 ... Control unit 2 ... RAM
3 ... NVRAM
4 ... HDD
5 ... Communication Department

Claims (2)

取り外し可能な記憶装置と、
第1の暗号化鍵を記憶する不揮発性メモリと、
前記記憶装置に記憶させるべきデータを前記第1の暗号化鍵によって暗号化する暗号化手段と、
前記暗号化手段によって暗号化されたデータを前記記憶装置に書き込む第1の書込手段と、
前記記憶装置からデータを読み出す第1の読出手段と、
前記第1の読出手段によって読み出されたデータを前記第1の暗号化鍵に対応する第1の復号化鍵によって復号する第1の復号手段と、
前記第1の復号化鍵を暗号化する第2の暗号化手段と、
前記第2の暗号化手段によって暗号化された第1の復号化鍵を前記記憶装置に書き込む第2の書き込み手段と、
前記記憶手段内の第1の復号化鍵を読み出す第2の読出手段と、
前記第2の読出手段によって読み出された前記第1の復号化鍵を復号する第2の復号手段と、
を具備することを特徴とするデータ管理装置。
A removable storage device;
A non-volatile memory for storing the first encryption key;
Encryption means for encrypting data to be stored in the storage device with the first encryption key;
First writing means for writing the data encrypted by the encryption means to the storage device;
First reading means for reading data from the storage device;
First decryption means for decrypting data read by the first read means with a first decryption key corresponding to the first encryption key;
Second encryption means for encrypting the first decryption key;
Second writing means for writing the first decryption key encrypted by the second encryption means to the storage device;
Second reading means for reading the first decryption key in the storage means;
Second decryption means for decrypting the first decryption key read by the second read means;
A data management device comprising:
取り外し可能な記憶装置と、第1の暗号化鍵を記憶する不揮発性メモリとを具備するコンピュータに、
前記記憶装置に記憶させるべきデータを前記第1の暗号化鍵によって暗号化する第1の手順と、
前記第1の手順によって暗号化されたデータを前記記憶装置に書き込む第2の手順と、
前記記憶装置からデータを読み出す第3の手順と、
前記第3の手順によって読み出されたデータを前記第1の暗号化鍵に対応する第1の復号化鍵によって復号する第4の手順と、
前記第1の復号化鍵を暗号化する第5の手順と、
前記第5の手順によって暗号化された第1の復号化鍵を前記記憶装置に書き込む第6の手順と、
前記記憶手段内の第1の復号化鍵を読み出す第7の手順と、
前記第7の手順によって読み出された前記第1の復号化鍵を復号する第8の手順と、
を実行させるためのプログラム。
A computer comprising a removable storage device and a non-volatile memory for storing a first encryption key;
A first procedure for encrypting data to be stored in the storage device with the first encryption key;
A second procedure for writing the data encrypted by the first procedure to the storage device;
A third procedure for reading data from the storage device;
A fourth procedure for decrypting the data read out by the third procedure with a first decryption key corresponding to the first encryption key;
A fifth procedure for encrypting the first decryption key;
A sixth procedure for writing the first decryption key encrypted by the fifth procedure into the storage device;
A seventh procedure for reading the first decryption key in the storage means;
An eighth procedure for decrypting the first decryption key read by the seventh procedure;
A program for running
JP2005045239A 2005-02-22 2005-02-22 Data management apparatus and program thereof Expired - Fee Related JP4498946B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2005045239A JP4498946B2 (en) 2005-02-22 2005-02-22 Data management apparatus and program thereof
US11/357,532 US7925895B2 (en) 2005-02-22 2006-02-17 Data management apparatus, data management method, and storage medium
CNB2006100077935A CN100424660C (en) 2005-02-22 2006-02-20 Data management apparatus, data management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2005045239A JP4498946B2 (en) 2005-02-22 2005-02-22 Data management apparatus and program thereof

Publications (2)

Publication Number Publication Date
JP2006237689A true JP2006237689A (en) 2006-09-07
JP4498946B2 JP4498946B2 (en) 2010-07-07

Family

ID=36935976

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2005045239A Expired - Fee Related JP4498946B2 (en) 2005-02-22 2005-02-22 Data management apparatus and program thereof

Country Status (2)

Country Link
JP (1) JP4498946B2 (en)
CN (1) CN100424660C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008236091A (en) * 2007-03-16 2008-10-02 Ricoh Co Ltd Data recovery method, image processor, controller board, and data recovery program
JP2010217604A (en) * 2009-03-17 2010-09-30 Ricoh Co Ltd Image forming apparatus, information management method, and program
US8290159B2 (en) 2007-03-16 2012-10-16 Ricoh Company, Ltd. Data recovery method, image processing apparatus, controller board, and data recovery program

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016186109A1 (en) * 2015-05-18 2016-11-24 Necフィールディング株式会社 Storage device, access prohibition method, and program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002003271A1 (en) * 2000-07-04 2002-01-10 Hitachi, Ltd. Ic card, method for backing up ic card, and restoring method
JP2002245427A (en) * 2001-02-20 2002-08-30 Toshiba Corp Ic card, ic card terminal device and method for duplicating ic card
JP2002368735A (en) * 2001-06-11 2002-12-20 Sharp Corp Master ic device, backup ic device for the master ic device, dummy key storage device providing dummy key to the master ic device, auxiliary device or the master ic device and the backup ic device, and key backup system using two auxiliary devices or over
JP2004013763A (en) * 2002-06-11 2004-01-15 Toshiba Corp Information storage device and information storage method
JP2004120008A (en) * 2002-09-20 2004-04-15 Pioneer Electronic Corp Key management system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1154348B9 (en) * 2000-05-11 2007-06-13 Matsushita Electric Industrial Co., Ltd. File management apparatus
US7203311B1 (en) * 2000-07-21 2007-04-10 The Directv Group, Inc. Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device
JP3773431B2 (en) * 2001-09-20 2006-05-10 松下電器産業株式会社 Key mounting system, LSI for realizing the same, and key mounting method
EP1304827A1 (en) * 2001-10-08 2003-04-23 Beta Research GmbH Secure data transmission method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002003271A1 (en) * 2000-07-04 2002-01-10 Hitachi, Ltd. Ic card, method for backing up ic card, and restoring method
JP2002245427A (en) * 2001-02-20 2002-08-30 Toshiba Corp Ic card, ic card terminal device and method for duplicating ic card
JP2002368735A (en) * 2001-06-11 2002-12-20 Sharp Corp Master ic device, backup ic device for the master ic device, dummy key storage device providing dummy key to the master ic device, auxiliary device or the master ic device and the backup ic device, and key backup system using two auxiliary devices or over
JP2004013763A (en) * 2002-06-11 2004-01-15 Toshiba Corp Information storage device and information storage method
JP2004120008A (en) * 2002-09-20 2004-04-15 Pioneer Electronic Corp Key management system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008236091A (en) * 2007-03-16 2008-10-02 Ricoh Co Ltd Data recovery method, image processor, controller board, and data recovery program
US8290159B2 (en) 2007-03-16 2012-10-16 Ricoh Company, Ltd. Data recovery method, image processing apparatus, controller board, and data recovery program
JP2010217604A (en) * 2009-03-17 2010-09-30 Ricoh Co Ltd Image forming apparatus, information management method, and program

Also Published As

Publication number Publication date
JP4498946B2 (en) 2010-07-07
CN1825291A (en) 2006-08-30
CN100424660C (en) 2008-10-08

Similar Documents

Publication Publication Date Title
US7925895B2 (en) Data management apparatus, data management method, and storage medium
JP4970781B2 (en) Image forming apparatus and method of controlling image forming apparatus
US7978849B2 (en) Image forming apparatus, and control method thereof
US7869595B2 (en) Content copying device and content copying method
US8363839B2 (en) Image forming apparatus
JP2008238676A (en) Image forming system, setting information managing program, and recording medium
JP4498946B2 (en) Data management apparatus and program thereof
JP4791741B2 (en) Data processing apparatus and data processing method
JP5005477B2 (en) Nonvolatile memory device
JP2010124213A (en) Image forming apparatus and method of controlling the same
US8054482B2 (en) Locality permission based printing
US20080002826A1 (en) Copyright protection system, copyright protection device and video processing apparatus
JP4667903B2 (en) Data management apparatus and program thereof
JP2005039637A (en) Image forming device
JP6965322B2 (en) Information processing device, encryption device, control method of information processing device, and program
JP2007019711A (en) Data management apparatus and program therefor
JP5078580B2 (en) Data management apparatus and data management method
JP2010211145A (en) System for repairing data in replaceable component
JP4409494B2 (en) Image forming method and apparatus
JP6157346B2 (en) Image processing system and log recording method
JP4712316B2 (en) Image storage device, image processing device, image storage method, image storage program, and recording medium recording image storage program
JP2008287339A (en) Image processor and image processing method, and computer program and recording medium
JP2006053875A (en) Image formation device
JP2004139163A (en) Data processor and data processing method
JP2004213409A (en) Image forming apparatus, recording medium reading and writing program, and recording medium

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20080130

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20090212

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20090224

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20090422

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20100406

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20100414

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130423

Year of fee payment: 3

R150 Certificate of patent or registration of utility model

Ref document number: 4498946

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130423

Year of fee payment: 3

S533 Written request for registration of change of name

Free format text: JAPANESE INTERMEDIATE CODE: R313533

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130423

Year of fee payment: 3

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130423

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20140423

Year of fee payment: 4

LAPS Cancellation because of no payment of annual fees