JP4683894B2 - Network connection member separating apparatus, information processing apparatus, and information processing system - Google Patents

Network connection member separating apparatus, information processing apparatus, and information processing system Download PDF

Info

Publication number
JP4683894B2
JP4683894B2 JP2004287269A JP2004287269A JP4683894B2 JP 4683894 B2 JP4683894 B2 JP 4683894B2 JP 2004287269 A JP2004287269 A JP 2004287269A JP 2004287269 A JP2004287269 A JP 2004287269A JP 4683894 B2 JP4683894 B2 JP 4683894B2
Authority
JP
Japan
Prior art keywords
connection member
network connection
network
information processing
separation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2004287269A
Other languages
Japanese (ja)
Other versions
JP2006099620A (en
Inventor
幸仁 窪山
Original Assignee
株式会社日本総合研究所
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社日本総合研究所 filed Critical 株式会社日本総合研究所
Priority to JP2004287269A priority Critical patent/JP4683894B2/en
Publication of JP2006099620A publication Critical patent/JP2006099620A/en
Application granted granted Critical
Publication of JP4683894B2 publication Critical patent/JP4683894B2/en
Application status is Expired - Fee Related legal-status Critical
Anticipated expiration legal-status Critical

Links

Images

Description

The present invention automatically performs an operation to physically separate a network connection member for connecting an information processing apparatus or the like to another device or network from a connected portion to which the network connection member is connected, as necessary. network connecting member separating apparatus having a mechanism for the an information processing apparatus and an information processing system.

  Conventionally, information processing that prevents computer viruses (hereinafter simply referred to as viruses) from spreading to the network during virus check processing when files are stored in the hard disk device of an information processing device connected to the network. An apparatus is known (for example, refer to Patent Document 1). In the information processing apparatus disclosed in Patent Document 1, when a flexible disk is loaded in the flexible disk apparatus, a network separation program is executed. Thereby, in the network connection mechanism, the connection between the information processing apparatus and the network is logically disconnected, and the information processing apparatus enters a stand-alone state.

  In this state, a virus check program is executed, and the corresponding file is checked for viruses. As a result of the virus check, if the safety is confirmed, the corresponding file is copied to the hard disk device. Thereafter, the information processing apparatus is connected to the network again via the network connection mechanism by the network separation program.

JP-A-11-73384

  The information processing apparatus disclosed in Patent Document 1 is effective in preventing virus infection from a flexible disk. However, it is impossible to prevent a virus from being infected by, for example, downloading a file or data from a web page via a network, connecting to a specific web page, or receiving an e-mail.

  If a virus detection program is installed in the information processing apparatus connected to the network, when the virus is infected, the virus detection program notifies that fact. However, it takes time until the user recognizes the notification and removes the connector of the cable for connecting to the network from the information processing apparatus. During this time, there is a risk that the virus may secondarily infect other information processing apparatuses connected to the network.

In order to eliminate the above-mentioned problems caused by the conventional technology, the present invention automatically detects the occurrence of an emergency such as when a virus detection program detects a virus infection, and automatically processes the information processing apparatus etc. in which the emergency occurred from the network. An object of the present invention is to provide a network connection member separating apparatus having a mechanism for physically and physically separating. Another object is to provide information processing apparatus and an information processing system including the network connection element separator.

In order to solve the above-described problems and achieve the object, a network connection member separating apparatus according to the invention of claim 1 receives a separation command from a connected portion to which a network connection member having a retaining means is connected, and the outside. A retaining release means for releasing the retaining means for the network connection member, and when the retaining means for the network connection member is released by the retaining release means, the network connecting member connected to the connected portion is pushed out. Separating means for physically separating from the connected portion, a reconnection preventing member for preventing the network connecting member from being connected to the connected portion after being separated by the separating means, and the reconnection preventing member. A reconnection prevention member driving hand that displaces between a normal position covering the connected part and an emergency position covering at least a part of the connected part. And a return means for returning the reconnection prevention member from the emergency position to the normal position, wherein the reconnection prevention member driving means causes the reconnection prevention member to be displaced at least from the normal position to the emergency position. The return means holds the reconnection preventing member back to the normal position after the cause of causing the displacement from the normal position to the emergency position is solved. It is characterized by that. According to the first aspect of the present invention, since the network connection member can be physically separated from the connected portion immediately after receiving the separation command from the outside, the information processing apparatus or network connected to the network connection member Devices can be quickly disconnected from the network. In addition, it is possible to prevent the network connection member from being connected to the connected part until the cause of disconnecting the information processing apparatus or the network device from the network is resolved. Information processing apparatuses and network devices that have been used can be connected to the network.

  The network connection member separating apparatus according to a second aspect of the present invention is the network connection member separating apparatus according to the first aspect, wherein the retainer releasing means is a retainer releasing member that pushes the retainer means of the network connecting member, and the retainer releasing member. Is provided with a retaining release releasing member driving means for displacing the network connecting member into a normal position where the retaining means of the network connection member is not pushed and an emergency position where the retaining means of the network connection member is pushed. According to the invention of claim 2, since the retaining means for the network connection member can be released, the network connection member can be physically separated from the connected portion.

  A network connection member separating apparatus according to a third aspect of the present invention is the network connection member separating apparatus according to the first or second aspect, wherein the separation means does not push the network connection member, the separation member pushing the network connection member, and the separation member. Separating member driving means for displacing to a normal position and an emergency position for pressing the network connection member is provided. According to the invention of claim 3, the network connection member can be physically separated from the connected portion.

  According to a fourth aspect of the present invention, there is provided the network connection member separating apparatus according to the third aspect, further comprising return means for returning the separation member from an emergency position to a normal position, wherein the separation member driving means includes the The separation member is held in the emergency position until at least the cause of the displacement from the normal position to the emergency position is solved, and the return means causes the separation member to be displaced from the normal position to the emergency position. It is characterized by returning to the normal position after the cause is solved. According to the fourth aspect of the present invention, it is possible to prevent the network connection member from being connected to the connected portion until the cause of disconnecting the information processing apparatus or the network device from the network is solved, and thus the cause is solved. After that, the disconnected information processing apparatus and network device can be connected to the network again.

According to a fifth aspect of the present invention, in the network connection member separating apparatus according to the fourth aspect , the return means starts an operation based on a return command received from the outside. According to the invention of claim 5 , when the cause of disconnecting the information processing device or the network device from the network is resolved, the information processing device or network device that has been disconnected is again connected to the network by issuing a return instruction. Can be connected to.

According to a sixth aspect of the present invention, the network connection member separating apparatus according to the fourth aspect of the present invention further includes a manual operation switch for starting the operation of the return means. According to the invention of claim 6 , when the cause of disconnecting the information processing device or the network device from the network is solved, the information processing device or the disconnected device is disconnected again by operating the switch and issuing a return command. Network devices can be connected to the network.

Network connecting member separation device according to the invention of claim 7 is the invention according to any one of claims 1 to 6, to separate the network connecting member from the connected part on the basis of the separation command received from the outside It further has an informing means for informing that. According to the invention of claim 7 , since it is possible to know that the network connection member has been separated from the connected portion due to the cause that the information processing apparatus or the network device has to be disconnected from the network, it is possible to accidentally cover the It can be prevented that the network connection member is disconnected from the connection portion and the network connection member is reconnected to the connected portion without solving the cause.

The network connection member separating apparatus according to the invention of claim 8 further includes a manual operation switch for causing a pseudo separation command to be issued in the invention according to any one of claims 1 to 7. Features. According to the invention of claim 8 , it can be tried that the network connection member is separated from the connected portion when the separation command is issued.

In order to solve the above-described problems and achieve the object, an information processing apparatus according to a ninth aspect of the present invention includes a network connection member separating apparatus according to any one of the first to eighth aspects, and the network. And a separation command issuing means for issuing a separation command to the connecting member separating apparatus. According to the ninth aspect of the present invention, an information processing apparatus having a function of issuing a separation command by itself and quickly disconnecting from the network when an emergency occurs newly can be obtained.

An information processing apparatus according to a tenth aspect of the present invention is the information processing apparatus according to the ninth aspect , further comprising virus detection means for detecting a computer virus, wherein the separation instruction issuing means is configured such that the virus detection means is infected with a computer virus. It is characterized in that a separation command is issued when an error is detected. According to the invention of claim 10 , when an information processing apparatus having a function of issuing a separation command by itself and quickly disconnecting from the network when newly infected with a virus is obtained, this information processing apparatus is used. Thus, it is possible to prevent the virus from spreading through the network.

An information processing apparatus according to an invention of claim 11 is a network connection member separating apparatus according to claim 5 , a virus detection means for detecting a computer virus, and when the virus detection means detects an infection of a computer virus. Separation command issuing means for issuing a separation command to the network connection member separation device, and return command issuing means for issuing a return command to the network connection member separation device after completion of the computer virus removal process. It is characterized by providing. According to the eleventh aspect of the present invention, it is possible to prevent the information processing apparatus from being connected to the network until the removal of the virus is completed for the information processing apparatus disconnected from the network due to virus infection. , It is possible to prevent the virus from spreading through the network.

In order to solve the above-described problems and achieve the object, an information processing system according to the invention of claim 12 includes the network connection member separation device according to any one of claims 1 to 8, And a network device connected between the information processing device and a network device for connecting the information processing device to a network, and connected to a connected portion of the network device via a network connection member, and the network device 1 or 2 or more information processing apparatus which has the isolation | separation command issuing means which issues a isolation | separation command with respect to the network connection member separation apparatus of this, and the network to which the said information processing apparatus was connected via the said network apparatus It is characterized by. According to the invention of claim 12 , when an emergency occurs, it is possible to construct an information processing system using an information processing apparatus having a function of issuing a separation command by itself and quickly disconnecting from the network.

An information processing system according to a thirteenth aspect of the present invention is the information processing system according to the twelfth aspect of the present invention, wherein each of the information processing devices further includes a virus detection unit that detects a computer virus, and the separation instruction issue unit It is characterized in that a separation command is issued when the detection means detects a computer virus infection. According to the invention of claim 13 , an information processing system using an information processing apparatus having a function of issuing a separation command by itself and quickly disconnecting from the network when infected with a virus can be constructed. It is possible to prevent the virus from spreading through.

An information processing system according to a fourteenth aspect of the present invention includes a network, one or more information processing apparatuses, and the network connection member separating apparatus according to the fifth aspect , and is connected to the network. A network device in which a network connection member connected to the information processing device is connected to a connected portion of the network connection member separating device, wherein each information processing device is a virus detection means for detecting a computer virus, Separation command issuance means for issuing a separation command to the network connection member separation device when a virus detection means detects a computer virus infection, and to the network connection member separation device after completion of the computer virus removal process A return command issuing means for issuing a return command And wherein the door. According to the invention of claim 14 , it is possible to prevent the information processing apparatus from being connected to the network until the removal of the virus is completed for the information processing apparatus disconnected from the network due to virus infection. , It is possible to prevent the virus from spreading through the network.

An information processing system according to a fifteenth aspect of the present invention includes the network connection member separation device according to any one of the first to eighth aspects, and connects the information processing device and the information processing device to a network. A network device connected to the network device, one or more information processing devices connected to a connected portion of the network device via a network connection member, and the information processing via the network device A network connected to the network; and a server connected to the network, wherein the server detects a computer virus, and the virus detection means causes a computer virus to infect any of the information processing devices. Network connection of the network device when it is detected that A separation command issuing means for issuing a separation command for separating a network connection member of an information processing apparatus infected with a computer virus from a connected portion to which the network connection member is connected to the material separation device. It is characterized by. According to the fifteenth aspect of the present invention, since an information processing apparatus infected with a virus can be quickly separated from the network, it is possible to prevent the virus from spreading through the network.

An information processing system according to a sixteenth aspect of the present invention includes a network, one or more information processing apparatuses, and the network connection member separating apparatus according to the fifth aspect , and is connected to the network. A network device in which a network connection member connected to the information processing device is connected to a connected portion of the network connection member separation device, and a server device connected to the network, the server device being a computer virus A virus detecting means for detecting a network virus, and when the virus detecting means detects that a computer virus is infected in any of the information processing apparatuses, the network connection member separating apparatus of the network device is infected with a computer virus. Network connection member of the information processing device Separation command issuing means for issuing a separation command for separating from the connected part to which the network connection member is connected, and the network connection member separation device after the computer virus removal process is completed, the separation It is characterized by having a return command issuing means for issuing a return command permitting connection of the network connection member of the information processing apparatus separated by the command to the connected part again. According to the invention of claim 16 , it is possible to prevent the information processing apparatus from being connected to the network until the removal of the virus is completed for the information processing apparatus disconnected from the network due to virus infection. , It is possible to prevent the virus from spreading through the network.

  According to the present invention, it is possible to automatically and physically disconnect an information processing apparatus or the like in which an emergency has occurred simultaneously with the occurrence of an emergency such as when a virus detection program detects a virus infection. There is an effect.

Exemplary embodiments of a network connection member separation device , an information processing device, and an information processing system according to the present invention will be explained below in detail with reference to the accompanying drawings. Here, a case where the network connection member is an 8-core modular connector (RJ-45 connector) used for an Ethernet (registered trademark) cable or the like will be described as an example. Therefore, in the following description, the network connection member and the network connection member separation device are referred to as a connector and a connector separation device, respectively. Note that, in the following description and the accompanying drawings, the same reference numerals are given to the same components, and duplicate descriptions are omitted.

(Embodiment 1)
FIG. 1 is a cross-sectional view showing the configuration of the connector separating apparatus according to the first embodiment. As shown in FIG. 1, the connector separating device 2 includes a retaining claw releasing piece 21, a connector pushing piece 22, and a connector reconnection preventing piece 23. The retaining pawl release piece 21 is driven by a drive source such as a motor (not shown) via a power transmission mechanism 24 such as a gear. The connector pushing piece 22 is driven by a driving source such as a motor (not shown) via a power transmission mechanism 25 such as a gear. The connector reconnection prevention piece 23 is driven by a drive source such as a motor (not shown) via a power transmission mechanism 26 such as a gear.

  These drive sources are controlled by a drive control circuit (not shown). In addition, any two of the retaining claw releasing piece 21, the connector pushing piece 22, and the connector reconnection preventing piece 23 are obtained by connecting the power transmission mechanisms 24, 25, and 26 via another power transmission mechanism. One or all of them may be driven by the same drive source. The other configuration of the connector separating apparatus 2 is the same as the configuration of the conventional network connection port to which the RJ-45 connector is connected.

  The retaining pawl release piece 21 protrudes into the housing 27 of the connector separating apparatus 2 and is a position where the retaining pawl (preventing means) 12 of the connector 1 attached to the tip of the cable 11 is pressed (emergency position). Then, it is displaced to a position where the retaining claw 12 is not pressed (normal position). When the front end of the connector 1 is normally stored in the housing 27, that is, when the connector 1 is connected, the retaining claw 12 is locked to a part of the housing 27. This prevents the connector 1 from being inadvertently disconnected from the connector separation device 2.

  When the retaining pawl release piece 21 presses the retaining pawl 12, the retaining pawl 12 and the housing 27 are disengaged, and the connector 1 can be detached from the connector separating device 2. Therefore, the retaining pawl releasing piece 21 constitutes a retaining stopper releasing member, and the driving source (not shown) for driving the retaining pawl releasing piece 21 and the power transmission mechanism 24 constitute a retaining release member driving means.

  The connector pushing piece 22 is displaced into a position where it protrudes into the housing 27 and pushes the end face of the connector 1 (emergency position) and a position where the end face of the connector 1 is not pushed (normal position). When the connector pushing piece 22 pushes the end face of the connector 1, the electrode (not shown) of the connector 1 and the electrical contact pin 28 of the connector separating device 2 provided in the housing 27 are separated, and the connector 1 is separated from the connector 1. The device 2 is separated from the device 2. Accordingly, the connector pushing piece 22 constitutes a separating member, and the drive source (not shown) for driving the connector pushing piece 22 and the power transmission mechanism 25 constitute a separating member driving means. The distance that the connector pushing piece 22 pushes the connector 1 is not particularly limited, but for example, about 5 mm is sufficient.

  The connector reconnection prevention piece 23 protrudes into the housing 27, closes a part of the opening (connected part) 29 into which the connector 1 is inserted (an emergency position), and closes the opening. It is displaced to a position where there is no (normal position). If the connector reconnection prevention piece 23 closes the opening 29 of the housing 27 in a state where the connector 1 is not inserted into the housing 27, the connector 1 cannot be connected to the connector separating device 2. That is, the connector reconnection prevention piece 23 prevents the connector 1 from being connected to the connector separating device 2.

  Therefore, the connector reconnection prevention piece 23 constitutes a reconnection prevention member, and the driving source (not shown) and the power transmission mechanism 26 for driving the connector reconnection prevention piece 23 constitute a reconnection prevention member driving means. Further, the connector reconnection prevention piece 23 returns to the normal position by being driven in a direction opposite to that when it is displaced from the normal position to the emergency position. Therefore, the drive source (not shown) that drives the connector reconnection prevention piece 23 and the power transmission mechanism 26 also serve as a return means.

  Next, the operation of the connector separating apparatus 2 will be described according to the flowchart shown in FIG. 3 to 7 are cross-sectional views showing states at each stage of the operation. FIG. 3 shows a state where the connector 1 is connected to the connector separating device 2. In this state, it always waits for an instruction to separate the connector 1 from the connector separating apparatus 2 (hereinafter referred to as a separation instruction) from the outside (step S1). When the separation command is received (step S1: Yes), the power transmission mechanism 24 is driven to displace the retaining claw release piece 21 to the emergency position and release the engagement between the retaining claw 12 and the housing 27 ( Step S2). This state is shown in FIG.

  Next, the power transmission mechanism 25 is driven, the connector pushing piece 22 is displaced to the emergency position, and the connector 1 is separated from the connector separating device 2 (step S3). This state is shown in FIG. In order to reliably separate the connector 1 from the connector separating apparatus 2, the operation of performing step S3 following step S2 may be repeated a plurality of times. Next, the power transmission mechanism 26 is driven to displace the connector reconnection prevention piece 23 to the emergency position, thereby preventing the connector 1 from being inserted again (step S4). This state is shown in FIG. In the example shown in FIG. 6, the retaining claw releasing piece 21 and the connector pushing piece 22 are returned to the normal positions, but may not be returned.

  In a state in which reconnecting of the connector 1 is prohibited, a command for permitting reconnection of the connector 1 to the connector separating apparatus 2 (hereinafter referred to as a return command) is always awaited (step S5). ). When a return command is received (step S5: Yes), the power transmission mechanism 26 is driven in the reverse direction to return the connector reconnection preventing piece 23 to the normal position (step S6). As a result, the connector 1 can be connected to the connector separating device 2 again. This state is shown in FIG.

  In addition, even if the connector reconnection prevention piece 23 is displaced to the emergency position, if the retaining claw release piece 21 and the connector push-out piece 22 do not return to the normal position, the connector reconnection prevention piece 23 is returned to the normal position. At the same time, the retaining pawl releasing piece 21 and the connector pushing piece 22 may be returned to the normal positions. Finally, the user connects the connector 1 to the connector separating apparatus 2 (step S7), and the process is completed.

  According to the first embodiment, the connector 1 can be physically separated from the connector separation device 2 immediately after the occurrence of an emergency and the separation command is received. Therefore, the information processing device connected to the connector 1 And network devices can be quickly disconnected from the network. Further, it is possible to prevent the connector 1 from being connected to the connector separating apparatus 2 until the cause of disconnecting the information processing apparatus and the network device from the network is solved and a return command is received. Therefore, the use of the connector separation device 2 can prevent a serious failure such as a secondary virus infection. Further, after the cause is solved, the disconnected information processing apparatus and network device can be connected to the network again.

(Embodiment 2)
FIG. 8 is a cross-sectional view showing the configuration of the connector separating apparatus according to the second embodiment. As shown in FIG. 8, in the connector separating apparatus 102 according to the second embodiment, the connector pushing piece 22 also serves as a connector reconnection preventing piece. Therefore, there is no drive source or power transmission mechanism for driving the connector reconnection prevention piece. Further, the drive source for driving the connector pushing piece 22 and the power transmission mechanism 25 also serve as a returning means for returning the connector pushing piece 22 to the normal position when a return command is received. Other configurations and operations are the same as those in the first embodiment.

  FIG. 9 shows a state in which the power transmission mechanism 25 is driven, the connector pushing piece 22 is displaced to the emergency position, and the connector 1 is separated from the connector separation device 102. FIG. 10 shows a state in which reconnecting of the connector 1 is prohibited by holding the state where the connector pushing piece 22 is displaced to the emergency position. FIG. 11 shows a state in which, after receiving the return command, the power transmission mechanism 25 is driven in the reverse direction to return the connector pushing piece 22 to the normal position. According to the second embodiment, the same effect as in the first embodiment can be obtained.

(Embodiment 3)
FIGS. 12, 13, and 14 are a plan view, a side view, and a front view, respectively, showing the configuration of the network device of the third embodiment. As shown in FIGS. 12 to 14, the network device according to the third embodiment is not limited to a plurality of connector separation devices 2 according to the first embodiment (the connector separation device 102 according to the second embodiment may be used). Four connector relay devices 3 are provided. The connector relay device 3 is provided with means for notifying that the connector 1 has been physically separated from the connector separation device 2 due to the separation command, that is, due to the occurrence of an emergency, for example, an eject lamp 31. Each connector separating device 2 is provided independently. The eject lamp 31 is provided so as to be exposed to the outside. 12 and 13, reference numeral 32 denotes a power cable.

  The eject lamp 31 is turned on (may be blinked) when the connector 1 is removed by the separation command, and is not turned on (or blinked) when the connector 1 is not accidentally detached, such as when the connector 1 is accidentally detached. The eject lamp 31 continues to be lit (or blinking) until a return command is received after the separation command, and is turned off when the return command is received. Therefore, when the connector 1 is disconnected from the connector separating apparatus 2, the user can know whether the connector 1 is disconnected due to some trouble or accidentally by checking the eject lamp 31. Therefore, it is possible to prevent the connector 1 from being inadvertently reconnected before the cause is solved. Note that a buzzer sound may be used to notify that the connector 1 has been removed by the separation command.

  The connector relay device 3 is used by being connected to a router or a hub in an existing information processing system constructed using a conventional network device such as a router or a hub. The conventional network device does not have a function of physically removing the connector 1 by a separation command. Therefore, according to the third embodiment, the function of physically disconnecting the connector 1 immediately after receiving the separation command can be added to the conventional network device. It is possible to prevent a serious failure such as a secondary infection from occurring. Further, after the cause is solved, the disconnected information processing apparatus and network device can be connected to the network again. Further, if the connector relay device 3 has a function as a router or a hub, a router or a hub having a function of physically disconnecting the connector 1 immediately after receiving the separation command can be obtained.

(Embodiment 4)
FIG. 15 is a front view showing the configuration of the network device of the fourth embodiment. As shown in FIG. 15, the network device according to the fourth embodiment is a connector relay device 103 including a return start switch 33 and a pseudo separation command issue switch 34 in addition to the eject lamp 31. In FIG. 15, reference numerals 35 and 36 denote lamps indicating, for example, the link establishment state and the transmission / reception state. The return start switch 33, the pseudo separation command issue switch 34, the eject lamp 31 and the other lamps 35 and 36 are provided exposed to the outside. Other configurations are the same as those of the third embodiment.

  The return start switch 33 is pressed to start the return operation of the connector reconnection preventing piece 23 of the connector separating apparatus 2 of the first embodiment (or the connector pushing piece 22 of the connector separating apparatus 102 of the second embodiment). Button. That is, after the connector 1 is disconnected by the disconnection command, the connector 1 can be reconnected to the connector separating apparatus 2 (or the connector separating apparatus 102) by pressing the return start switch 33.

  However, the return start switch 33 is pushed after the cause of the disconnection of the connector 1 by the separation command is solved. In this case, for example, it is preferable that the network administrator is authorized to press the return start switch 33. The pseudo separation command issue switch 34 is a button that is pressed to cause a separation command to be issued in a pseudo manner. By pressing the pseudo separation command issue switch 34, the separation command can be issued even when there is no cause for issuing the original separation command. Therefore, when the separation command is received, the connector separation device 2 (or connector) It can be tested that the separation device 102) works.

  In addition to performing the test, the connector 1 can be removed by simply pressing the pseudo-separation command issuing switch 34 when it is desired to remove the connector 1. For example, a one-shot multivibrator is used as a circuit that issues a separation instruction in a pseudo manner when the pseudo separation instruction issue switch 34 is pressed. According to the fourth embodiment, the same effect as that of the third embodiment can be obtained in addition to the effect that the above-described return by manual operation and the test can be performed.

(Embodiment 5)
16, FIG. 17, and FIG. 18 are a plan view, a side view, and a front view, respectively, showing the configuration of the network device of the fifth embodiment. As shown in FIGS. 16 to 18, the network device according to the fifth embodiment includes an eject lamp 31 and a connector 1 connected to the connector separation device 2 according to the first embodiment (or the connector separation device 102 according to the second embodiment). This is the connector relay device 203 provided with the same connector portion 37 as in FIG. The eject lamp 31 is provided so as to be exposed to the outside. The electrical contact pin 28 of the connector separation device 2 (or the connector separation device 102) is electrically connected to an electrode (not shown) of the connector portion 37.

  The connector relay device 203 is directly attached to the other device without a cable or the like by connecting the connector unit 37 to the network connection port 101 of the other device. That is, the connector relay device 203 is used as an adapter for adding a function of physically disconnecting the connector 1 immediately after receiving the disconnection command to the conventional port 101 having no function of physically disconnecting the connector 1 by the disconnection command. .

  The connector portion 37 is provided with a retaining claw 38 that engages with the housing of the port 101 of another device. In addition, the connector relay device 203 is provided with a pressing button 39 for pressing down the retaining claw 38. When removing the connector relay device 203 connected to the port 101 of another device, the press button 39 is pressed to push down the retaining pawl 38, the engagement of the retaining pawl 38 is released, and the connector relay device 203 is pulled out. That's fine. The connector portion 37 may be a connector having a standard different from that of the connector 1. According to the fifth embodiment, since the function of physically disconnecting the connector 1 immediately after receiving the separation command can be added to the conventional information processing apparatus or network device, by using the connector relay device 203, It is possible to prevent a serious failure such as a secondary virus infection from occurring. Further, after the cause is solved, the disconnected information processing apparatus and network device can be connected to the network again.

(Embodiment 6)
19, FIG. 20, and FIG. 21 are a plan view, a side view, and a front view, respectively, showing the configuration of the network device of the sixth embodiment. As shown in FIGS. 19 to 21, the network device according to the sixth embodiment applies the connector separation device 2 according to the first embodiment (or the connector separation device 102 according to the second embodiment) to a network connection port. In addition, the PCMCIA card 4 is provided with an eject lamp 31.

  Reference numeral 41 denotes a portion inserted into a PCMCIA standard card slot provided in an information processing apparatus such as a notebook personal computer or an adapter for a PCMCIA card, and reference numeral 42 is exposed outside the card slot. Part. The connector separating device 2 (or the connector separating device 102) and the eject lamp 31 are provided in a portion 42 of the PCMCIA card 4 exposed to the outside of the card slot. Reference numeral 43 denotes an electrode portion that is electrically connected to another device in the card slot.

  According to the sixth embodiment, the PCMCIA card 4 having a function of physically disconnecting the connector 1 is obtained immediately after receiving the separation command. Therefore, by using this PCMCIA card 4, serious infection such as secondary infection of a virus is caused. Can be prevented from occurring. Further, after the cause is solved, the disconnected information processing apparatus and network device can be connected to the network again. The PCMCIA card 4 may be ejected from the card slot immediately after receiving the separation command. In that case, the PCMCIA card 4 itself may be provided with a mechanism that can be ejected, for example, by pushing the back end face in the card slot, or the PCMCIA card 4 such as the connector pushing piece 22 is pushed out into the card slot. A mechanism may be provided. In the sixth embodiment, the PCMCIA card 4 has been described as an example. However, the present invention is not limited to this, and there is a compact flash (registered trademark) type LAN card or the like, and any card type that is detachable from the slot may be used.

(Embodiment 7)
22, 23, and 24 are a plan view, a side view, and a front view, respectively, showing the configuration of the network device of the seventh embodiment. As shown in FIGS. 22 to 24, the network device of the seventh embodiment applies the connector separation device 2 of the first embodiment (or the connector separation device 102 of the second embodiment) to the network connection port. In addition, the PCI card 104 is provided with an eject lamp 31.

  Reference numeral 46 denotes a circuit board on which a network connection circuit is formed, and reference numeral 47 denotes a metal fitting fixed to a housing of a desktop (stationary) personal computer or the like. The eject lamp 31 is provided so as to be exposed outside the metal fitting 47. Reference numeral 48 denotes an electrode portion that is inserted into an expansion slot of a PCI bus standard provided on a motherboard of another device and is electrically connected to the other device. According to the seventh embodiment, since the PCI card 104 having a function of physically disconnecting the connector 1 is obtained immediately after receiving the separation command, the use of this PCI card 104 can cause serious secondary infection such as viruses. Can be prevented from occurring. Further, after the cause is solved, the disconnected information processing apparatus and network device can be connected to the network again. The expansion slot may be an expansion slot other than the PCI bus. In this case, instead of the PCI card 104, an expansion card corresponding to this expansion slot may be used.

(Embodiment 8)
FIG. 25 is a block diagram illustrating a configuration of the information processing apparatus according to the eighth embodiment. As shown in FIG. 25, the information processing apparatus 5 according to the eighth embodiment applies the connector separating apparatus 2 according to the first embodiment (or the connector separating apparatus 102 according to the second embodiment) to the network connection port. Is. Although not particularly limited, in the illustrated example, three connector separation devices 2 are provided, and are connected to the network 100 via the connector 1 and the cable 11, respectively. The information processing apparatus 5 stores a virus detection program 51, a separation instruction issue program 52, and a return instruction issue program 53 in, for example, a built-in hard disk.

  The virus detection program 51 searches for a virus when a file or data is downloaded or an e-mail is received via the network 100. The virus detection program 51 has a function of searching for viruses in both data and electronic mail. The separation command issuing program 52 issues a separation command when virus infection is detected by the execution of the virus detection program 51. The return instruction issue program 53 issues a return instruction after the process for removing the virus is completed. Accordingly, the virus detection program 51, the separation instruction issue program 52, and the return instruction issue program 53 have functions as virus detection means, separation instruction issue means, and return instruction issue means, respectively.

  Next, the operation of the information processing apparatus 5 will be described according to the flowchart shown in FIG. When data or electronic mail is received via the network 100, the virus detection program 51 is executed (step S11). As a result, when it is detected that the search target data or e-mail is infected with a virus (step S12: Yes), a virus detection signal is output and the virus detection program 51 is terminated. The separation command issuing program 52 is executed by inputting a virus detection signal, and issues a separation command (step S13).

  Then, as described in the first embodiment, the retaining claws 12 of the connector separating device 2 (or the connector separating device 102) are released (step S14), and the connector 1 is separated from the connector separating device 2 (step S15). . Subsequently, the connector reconnection preventing piece 23 (in the case of the connector separating apparatus 102, the connector pushing piece 22) is displaced to the emergency position (step S16) to prevent the connector 1 from being inserted again. While the reconnection of the connector 1 is prohibited, the process waits for the virus removal to be completed (step S17).

  When virus removal is completed (step S17: Yes), the return command issue program 53 is executed and a return command is issued (step S18). Thereby, the connector reconnection preventing piece 23 (in the case of the connector separating apparatus 102, the connector pushing piece 22) is returned (reset) to the normal position (step S19). Thereafter, the user connects the connector 1 to the connector separating apparatus 2 (step S20), and the process is completed.

  According to the eighth embodiment, when a virus is infected, a separation command is issued by itself to quickly disconnect from the network 100, so that the virus can be prevented from spreading through the network 100. Further, when the information processing apparatus 5 is infected with a virus, it is possible to prevent the information processing apparatus 5 from being connected to the network 100 until the removal thereof is completed, so that the virus can be prevented from spreading through the network 100.

(Embodiment 9)
FIG. 27 is a block diagram illustrating a configuration of the information processing system according to the ninth embodiment. As shown in FIG. 27, the information processing system 6 of the ninth embodiment is different from the existing information processing system in which the information processing apparatus 105 is connected to the network 100 via the conventional hub 61 and router 62. A connector relay device 3 (may be the connector relay device 103 of the fourth embodiment) is added. Depending on the existing information processing system, the presence / absence and number of hubs 61 and routers 62 are different, but the connector relay device 3 (or connector relay device 103) is provided as close to the information processing device 105 as possible. It is done.

  In FIG. 27, the number is not particularly limited. For example, four information processing apparatuses 105 are connected to the connector relay apparatus 3 (or the connector relay apparatus 103), but in order to avoid the figure from becoming complicated. Only one of them (the information processing apparatus 105 at the lower left) shows the internal configuration. The same applies to the other three information processing apparatuses 105. As in the eighth embodiment, the information processing apparatus 105 stores a virus detection program 51, a separation instruction issue program 52, and a return instruction issue program 53 in, for example, a built-in hard disk.

  The separation command issued by the separation command issuing program 52 is sent to the connector relay device 3 (or via the cable 11 that connects the information processing device 105 and the hub 61 (which may be the router 62) in the existing information processing system. To the connector relay device 103). Apart from this cable 11, the information processing device 105 and the connector relay device 3 (or the connector relay device 103) are connected by a newly provided control line 54.

  The return command issued by the return command issuing program 53 is sent to the connector relay device 3 (or the connector relay device 103) via the control line 54. The control line 54 is a dedicated line that can send only a return command. The control line 54 may be used to send a separation command to the connector relay device 3 (or the connector relay device 103). The operation of the information processing system 6 follows the flowchart shown in FIG. According to the ninth embodiment, the same effect as in the eighth embodiment can be obtained.

(Embodiment 10)
FIG. 28 is a block diagram illustrating a configuration of the information processing system according to the tenth embodiment. As shown in FIG. 28, the information processing system 106 according to the tenth embodiment is different from the existing information processing system in which the information processing apparatus 205 is connected to the network 100 via the conventional hub 61 and router 62. The connector relay device 3 (which may be the connector relay device 103 of the fourth embodiment) is added, and the server device 305 connected to the network 100 searches for viruses, issues separation commands, and issues return commands. Is. Depending on the existing information processing system, the presence / absence and number of hubs 61 and routers 62 are different, but the connector relay device 3 (or connector relay device 103) is provided as close to the information processing device 205 as possible. It is done.

  As with the information processing apparatus 5 of the eighth embodiment, the server apparatus 305 stores a virus detection program 51, a separation instruction issue program 52, and a return instruction issue program 53 in, for example, a built-in hard disk. That is, the server device 305 remotely monitors the information processing device 205 via the network 100, and when the information processing device 205 downloads a file or data or receives an e-mail via the network 100, The information processing device 205 is searched for viruses. When the server device 305 detects a virus infection, the server device 305 issues a separation command.

  The separation command is sent to the connector separation apparatus 2 (or the information processing apparatus 205 infected with a virus in the connector relay apparatus 3 (or the connector relay apparatus 103) via the network 100, the router 62, and the hub 61 (or To the connector separating device 102). As a result, the information processing apparatus 205 infected with the virus is disconnected from the network 100. Thereafter, for example, a network administrator performs a virus removal process on the information processing apparatus 205 infected with the virus.

  When the virus removal process is completed, for example, the network administrator notifies the server device 305 that the removal has been completed. Thereby, the server device 305 issues a return command. The return command follows the same path as the disconnection command, and the connector separation device 2 (or connector separation device) that connects the information processing device 205 of the connector relay device 3 (or connector relay device 103) that has completed the virus removal process. 102). The operation of the information processing system 106 follows the flowchart shown in FIG. When the server device 305 detects a virus infection, the server device 305 sends a signal notifying the virus infection to the connector relay device 3 (or connector relay device 103), and the separation command is sent to the connector relay device 3 (or It may be configured to be issued in the connector relay device 103).

  According to the tenth embodiment, the same effect as in the eighth embodiment can be obtained. Further, out of a large number of information processing devices 205 connected to the server device 305 via the network 100, only a specific area including the information processing device 205 infected with a virus, for example, one department of the office is separated from the network 100. Therefore, in other areas, business can be continued without any problems.

  As described above, the present invention is not limited to the above-described embodiment, and various modifications can be made. For example, the network connection member is not limited to an RJ-45 connector. Even in such a case, the network connection member connected to the network connection member separation device may be configured to be physically disconnected. Further, the retaining pawl releasing piece 21, the connector pushing piece 22 or the connector reconnection preventing piece 23 may be driven by, for example, an elastic force of a spring, or may be constituted by an electromagnetically operated solenoid core material. You may make it drive by exciting a solenoid.

  Also, the return start switch 33 and the pseudo separation command issue switch 34 may be provided in the connector relay devices 3 and 203 of the third and fifth embodiments, the PCMCIA card 4 of the sixth embodiment, and the PCI card 104 of the seventh embodiment. Good. In the connector relay devices 3, 103, 203, the PCMCIA card 4 and the PCI card 104, the positions of the eject lamp 31, the return start switch 33, and the pseudo separation command issue switch 34 are as long as the visibility and operability are not significantly impaired. Is optional.

  In the case of an information processing system in which server side and client side information processing apparatuses communicate with each other wirelessly, such as a wireless LAN (local area network), for example, the present invention is implemented by a bridge with a wired LAN. It may be applied to a certain access point, and the wired LAN connector connected to the access point may be physically disconnected by a separation command. Further, it may be configured to provide means for detecting that the connector 1 is disconnected from the connector separating apparatuses 2 and 102 by issuing a separation command, and to confirm that the connector 1 is physically disconnected from the connector separating apparatuses 2 and 102. .

  In addition, the present invention is not limited to viruses, but is software called so-called spyware that collects data in an information processing device and sends it to a specific external collector, or a nuisance that is distributed indiscriminately for commercial purposes. It can also be applied to prevent unwanted data such as e-mail and damage from e-mail. Furthermore, the present invention is configured such that a separation command is issued when a predetermined time has elapsed, and an information processing apparatus that has not been used for a certain period of time or installed anti-virus software has not been updated for a certain period of time. The information processing apparatus may be physically removed from the network.

  As described above, the network connection member separation device, the network device, the information processing device, and the information processing system according to the present invention are useful for an information processing system connected to a network, particularly from a public network such as the Internet. In an information processing system that may receive unwanted data or mail such as viruses, spyware, or spam mails, it is suitable for a security technology that can minimize damage when receiving such unwanted data or mail.

FIG. 3 is a cross-sectional view illustrating a configuration of the connector separation device according to the first embodiment. 6 is a flowchart showing the operation of the connector separation device according to the first embodiment. FIG. 6 is a cross-sectional view showing the operation of the connector separation device according to the first embodiment. FIG. 6 is a cross-sectional view showing the operation of the connector separation device according to the first embodiment. FIG. 6 is a cross-sectional view showing the operation of the connector separation device according to the first embodiment. FIG. 6 is a cross-sectional view showing the operation of the connector separation device according to the first embodiment. FIG. 6 is a cross-sectional view showing the operation of the connector separation device according to the first embodiment. FIG. 6 is a cross-sectional view illustrating a configuration of a connector separation device according to a second embodiment. FIG. 10 is a cross-sectional view showing the operation of the connector separation device according to the second embodiment. FIG. 10 is a cross-sectional view showing the operation of the connector separation device according to the second embodiment. FIG. 10 is a cross-sectional view showing the operation of the connector separation device according to the second embodiment. FIG. 9 is a plan view showing a configuration of a connector relay device according to a third embodiment. FIG. 10 is a side view showing a configuration of a connector relay device according to a third embodiment. FIG. 10 is a front view illustrating a configuration of a connector relay device according to a third embodiment. It is a front view which shows the structure of the connector relay apparatus of Embodiment 4. FIG. 10 is a plan view illustrating a configuration of a connector relay device according to a fifth embodiment. It is a side view which shows the structure of the connector relay apparatus of Embodiment 5. It is a front view which shows the structure of the connector relay apparatus of Embodiment 5. FIG. 10 is a plan view showing a configuration of a PCMCIA card according to a sixth embodiment. FIG. 10 is a side view showing a configuration of a PCMCIA card according to a sixth embodiment. FIG. 10 is a front view showing a configuration of a PCMCIA card according to a sixth embodiment. FIG. 20 is a plan view showing a configuration of a PCI card according to a seventh embodiment. FIG. 20 is a side view showing a configuration of a PCI card according to a seventh embodiment. FIG. 20 is a front view showing a configuration of a PCI card according to a seventh embodiment. FIG. 20 is a block diagram illustrating a configuration of an information processing device according to an eighth embodiment. 20 is a flowchart illustrating the operation of the information processing apparatus according to the eighth embodiment. FIG. 20 is a block diagram illustrating a configuration of an information processing system according to a ninth embodiment. FIG. 20 is a block diagram illustrating a configuration of an information processing system according to a tenth embodiment.

Explanation of symbols

1 Network connection member (connector)
2,102 Network connection member separation device (connector separation device)
3,103,203 Network equipment (connector relay device)
4 Network equipment (PCMCIA card)
5, 105, 205 Information processing device 6, 106 Information processing system 12 Retaining means (retaining claw)
21 Retaining release member (Retaining claw release piece)
22 Separation member (Connector push piece)
23 Reconnection prevention member (Connector reconnection prevention piece)
24 Retaining release releasing member driving means (power transmission mechanism)
25 Separating member driving means (power transmission mechanism)
26 Reconnection prevention member driving means (power transmission mechanism), return means 29 Connected portion (opening into which connector is inserted)
31 Notification means (eject lamp)
33 switch (return start switch)
34 switch (pseudo-separated instruction issue switch)
37 Connection (Connector)
51 Virus detection means (virus detection program)
52 Separation instruction issue means
53 Return command issuing means (return command issuing program)
100 Network 104 Network device (PCI card)
305 Server device

Claims (16)

  1. A connected portion to which a network connection member having a retaining means is connected;
    A retaining release means for receiving a separation command from the outside and releasing the retaining means for the network connection member;
    When the retaining means of the network connection member is released by the retaining prevention releasing means, a separating means that pushes out the network connecting member connected to the connected part and physically separates it from the connected part;
    A reconnection prevention member for preventing a network connection member from being connected to the connected portion after being separated by the separating means; a normal position for covering the connected portion; and the connected portion. A reconnection prevention member driving means for displacing the reconnection prevention member to an emergency position covering at least a part of the part, and a return means for returning the reconnection prevention member from the emergency position to the normal position,
    The reconnection prevention member driving means holds the reconnection prevention member in an emergency position until at least the cause of causing the displacement from the normal position to the emergency position is solved, and the return means is configured to reconnect the reconnection. A network connection member separating apparatus , wherein the prevention member is returned to the normal position after the cause of causing the displacement from the normal position to the emergency position is solved .
  2.   The retainer release means includes a retainer release member that pushes the retainer means of the network connection member, a normal position where the retainer release member does not push the retainer means of the network connection member, and a retainer means for the network connection member. The network connection member separating apparatus according to claim 1, further comprising a retaining member release member driving unit that is displaced to an emergency position for pressing.
  3.   The separation means includes a separation member that pushes the network connection member, and a separation member driving means that displaces the separation member into a normal position where the network connection member is not pushed and an emergency position where the network connection member is pushed. The network connection member separation device according to claim 1 or 2.
  4. A return means for returning the separation member from the emergency position to the normal position;
    The separation member driving means holds the separation member in an emergency position until at least the cause of causing the displacement from the normal position to the emergency position is solved, and the return means holds the separation member in the normal position. 4. The network connection member separating apparatus according to claim 3, wherein the network connection member is returned to the normal position after the cause of causing the displacement from the emergency position to the emergency position is solved.
  5. The network connection member separating apparatus according to claim 4 , wherein the return unit starts an operation based on a return command received from the outside.
  6. The network connection member separating apparatus according to claim 4 , further comprising a manual operation switch for starting the operation of the return means.
  7. The network connection member according to claim 1 , further comprising a notification unit that notifies that the network connection member is separated from the connected portion based on a separation command received from outside. Separation device.
  8. The network connection member separating apparatus according to claim 1 , further comprising a manual operation switch for causing a pseudo separation command to be issued.
  9. The network connection member separation device according to any one of claims 1 to 8 ,
    Separation command issuing means for issuing a separation command to the network connection member separation device;
    An information processing apparatus comprising:
  10. A virus detection means for detecting a computer virus;
    The information processing apparatus according to claim 9 , wherein the separation command issuing unit issues a separation command when the virus detection unit detects infection of a computer virus.
  11. The network connection member separating apparatus according to claim 5 ;
    Virus detection means for detecting computer viruses;
    A separation command issuing means for issuing a separation command to the network connection member separation device when the virus detection means detects a computer virus infection;
    A return command issuing means for issuing a return command to the network connection member separating apparatus after the computer virus removal process is completed;
    An information processing apparatus comprising:
  12. A network device having the network connection member separation device according to any one of claims 1 to 8 and connected between an information processing device and a network device for connecting the information processing device to a network When,
    One or more information processing devices connected to a connected portion of the network device via a network connection member and having a separation command issuing means for issuing a separation command to the network connection member separation device of the network device; ,
    A network to which the information processing apparatus is connected via the network device;
    An information processing system comprising:
  13. Each of the information processing devices further includes virus detection means for detecting a computer virus,
    13. The information processing system according to claim 12 , wherein the separation command issuing unit issues a separation command when the virus detection unit detects infection of a computer virus.
  14. Network,
    One or more information processing devices;
    The network connection member separating apparatus according to claim 5 is connected to the network, and a network connection member connected to the information processing apparatus is connected to a connected portion of the network connection member separating apparatus. With connected network equipment,
    Each of the information processing devices includes a virus detection unit that detects a computer virus, a separation command issue unit that issues a separation command to the network connection member separation device when the virus detection unit detects a computer virus infection, and An information processing system comprising return command issuing means for issuing a return command to the network connection member separating apparatus after completion of the computer virus removal process.
  15. A network device having the network connection member separation device according to any one of claims 1 to 8 and connected between an information processing device and a network device for connecting the information processing device to a network When,
    One or more information processing devices connected to a connected portion of the network device via a network connection member;
    A network to which the information processing apparatus is connected via the network device;
    A server device connected to the network;
    The server device is a virus detection means for detecting a computer virus, and when the virus detection means detects that a computer virus is infected in any of the information processing devices, the server device is connected to the network connection member separation device of the network device. On the other hand, there is provided a separation command issuing means for issuing a separation command for separating a network connection member of an information processing apparatus infected with a computer virus from a connected portion to which the network connection member is connected. Information processing system.
  16. Network,
    One or more information processing devices;
    The network connection member separating apparatus according to claim 5 is connected to the network, and a network connection member connected to the information processing apparatus is connected to a connected portion of the network connection member separating apparatus. Connected network devices,
    A server device connected to the network;
    The server device is a virus detection means for detecting a computer virus, and when the virus detection means detects that a computer virus is infected in any of the information processing devices, the server device is connected to the network connection member separation device of the network device. On the other hand, a separation command issuing means for issuing a separation command for separating a network connection member of an information processing apparatus infected with a computer virus from a connected portion to which the network connection member is connected, and a computer virus removal process Is issued a return command for allowing the network connection member of the information processing device separated by the separation command to be connected again to the connected part Information characterized by having means Management systems.
JP2004287269A 2004-09-30 2004-09-30 Network connection member separating apparatus, information processing apparatus, and information processing system Expired - Fee Related JP4683894B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2004287269A JP4683894B2 (en) 2004-09-30 2004-09-30 Network connection member separating apparatus, information processing apparatus, and information processing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2004287269A JP4683894B2 (en) 2004-09-30 2004-09-30 Network connection member separating apparatus, information processing apparatus, and information processing system

Publications (2)

Publication Number Publication Date
JP2006099620A JP2006099620A (en) 2006-04-13
JP4683894B2 true JP4683894B2 (en) 2011-05-18

Family

ID=36239335

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2004287269A Expired - Fee Related JP4683894B2 (en) 2004-09-30 2004-09-30 Network connection member separating apparatus, information processing apparatus, and information processing system

Country Status (1)

Country Link
JP (1) JP4683894B2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2106578B1 (en) * 2007-01-22 2016-09-14 Simon Yoffe Security switch
JP2014096649A (en) * 2012-11-08 2014-05-22 Toshiba Corp Virus interruption system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6293874A (en) * 1985-10-21 1987-04-30 Toshiba Corp Electric junction structure
JPH04301384A (en) * 1991-03-29 1992-10-23 Fujitsu Ltd Lock control system for connector
JPH05288793A (en) * 1992-04-07 1993-11-02 Yazaki Corp Connector terminal inspection tool
JPH06104048A (en) * 1992-09-17 1994-04-15 Sony Corp Eject and lock device of ic memory card
JPH09283217A (en) * 1996-04-16 1997-10-31 Toshihisa Eshiro Plug disconnecting device
JPH09326277A (en) * 1996-06-05 1997-12-16 Hideji Okamoto Receptacle strip to extract plug in emergency
JPH11154566A (en) * 1997-11-20 1999-06-08 Hitachi Information Systems Ltd Hub having unintended connecting preventive mechanism
JP2004030078A (en) * 2002-06-24 2004-01-29 Canon Inc Socket for housing storage medium, and information processor
JP2004213233A (en) * 2002-12-27 2004-07-29 Ffc:Kk Management device capable of shutting off network connection and controller

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6293874A (en) * 1985-10-21 1987-04-30 Toshiba Corp Electric junction structure
JPH04301384A (en) * 1991-03-29 1992-10-23 Fujitsu Ltd Lock control system for connector
JPH05288793A (en) * 1992-04-07 1993-11-02 Yazaki Corp Connector terminal inspection tool
JPH06104048A (en) * 1992-09-17 1994-04-15 Sony Corp Eject and lock device of ic memory card
JPH09283217A (en) * 1996-04-16 1997-10-31 Toshihisa Eshiro Plug disconnecting device
JPH09326277A (en) * 1996-06-05 1997-12-16 Hideji Okamoto Receptacle strip to extract plug in emergency
JPH11154566A (en) * 1997-11-20 1999-06-08 Hitachi Information Systems Ltd Hub having unintended connecting preventive mechanism
JP2004030078A (en) * 2002-06-24 2004-01-29 Canon Inc Socket for housing storage medium, and information processor
JP2004213233A (en) * 2002-12-27 2004-07-29 Ffc:Kk Management device capable of shutting off network connection and controller

Also Published As

Publication number Publication date
JP2006099620A (en) 2006-04-13

Similar Documents

Publication Publication Date Title
DE19737214B4 (en) Method of operating a computer system, computer system and secondary bus controller
US5740012A (en) Computer system having a structure for easy assembling/disassembling of peripheral equipment
EP2230621B1 (en) Method and system for detecting viruses on handheld computers
US20060137010A1 (en) Method and system for a self-healing device
JP2005004745A (en) Bus router between integrated circuits
US7788349B2 (en) Information processing system and method
US7536598B2 (en) Computer system capable of supporting a plurality of independent computing environments
US6745330B1 (en) Computer system having peripheral device look
US20060005245A1 (en) Techniques for self-isolation of networked devices
US7251132B1 (en) Receiving frame having removable computer drive carrier and lock
US5852743A (en) Method and apparatus for connecting a plug-and-play peripheral device to a computer
JPH0997125A (en) Computer system and extension unit used therefor
JP2005004746A (en) System and method for detecting presence of device connected to inter-integrated circuit router and resetting device
KR20030038542A (en) A computer with switchable components
JPH08179856A (en) Portable computer used in dockable computer system and method for performing docking or releasing docking
US20020078397A1 (en) Backup / recovery system and methods for protecting a computer system
US8140733B2 (en) Secure external computer hub
US7447822B2 (en) Hot-plug control system and method
EP0889415A2 (en) Dual voltage card connector
EP1092194B1 (en) Device for use as stand-alone device and as slave device in a data bus system
JP2004302656A (en) Control program and control device
US6634898B2 (en) Switch mechanism for online replacement of PCI cards
US5832237A (en) Portable computer system and method for controlling a power of system
JP2005006305A (en) Inter-integrated circuit router for supporting individual transmission rate
EP1851908A1 (en) Network security enhancement methods, apparatuses, systems, media, signals and computer programs

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20070928

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20100706

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20100831

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20110125

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20110208

R150 Certificate of patent or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20140218

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20140218

Year of fee payment: 3

S111 Request for change of ownership or part of ownership

Free format text: JAPANESE INTERMEDIATE CODE: R313113

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20140218

Year of fee payment: 3

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

LAPS Cancellation because of no payment of annual fees