Connect public, paid and private patent data with Google Patents Public Datasets

Removable memory device for portable terminal device

Download PDF

Info

Publication number
US20010016895A1
US20010016895A1 US09033613 US3361398A US20010016895A1 US 20010016895 A1 US20010016895 A1 US 20010016895A1 US 09033613 US09033613 US 09033613 US 3361398 A US3361398 A US 3361398A US 20010016895 A1 US20010016895 A1 US 20010016895A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
device
memory
terminal
portable
removable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09033613
Other versions
US6282612B1 (en )
Inventor
Noriyasu Sakajiri
Keiichi Hayashi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Innovations Ltd (Hong Kong)
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/26Devices for signalling identity of wanted subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, i.e. memories whose operation does not require relative movement between storage means and a transducer, e.g. chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • H04M1/72519Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
    • H04M1/72522With means for supporting locally a plurality of applications to increase the functionality
    • H04M1/72527With means for supporting locally a plurality of applications to increase the functionality provided by interfacing with an external accessory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/14Details of telephonic subscriber devices including a card reading device

Abstract

A removable memory device includes a memory for storing individual information therein, a memory manager for protecting the memory when the removable memory device is not connected to a portable terminal device and for allowing access thereto when the removable memory device is connected, a data input/output part as a data sending/receiving port to/from a data input/output part of the portable terminal device, and a controller for detecting an interconnection with the portable terminal device through the data input/output part and for controlling the memory manager. The removable memory device protects the individual information stored within it from being illegally used.

Description

    BACKGROUND OF THE INVENTION
  • [0001]
    1. Field of the Invention
  • [0002]
    The present invention relates to removable memory devices. In particular, the present invention relates to a removable memory device for a portable terminal device that can be removably connected to such a portable terminal device as, e.g., a portable telephone and can store therein ID information, a telephone number list, and so on, etc., inherent in each portable terminal device.
  • [0003]
    2. Description of the Related Art
  • [0004]
    Such a portable terminal device as a portable telephone comprises a memory device which stores therein, for example, such a telephone number list as abbreviated dialing numbers or such individual information as ID information inherent in each portable terminal device, entered by a user. When a user wants to exchange the portable terminal device with another due to user's upgrading to a newer device, it is desirable to enable copying of the individual information already stored in the portable terminal device used so far to a new portable terminal device and also to enable use of the new portable terminal device with the same individual information.
  • [0005]
    Disclosed in Japanese Patent Application Laid-Open Publication No. Hei-4-302245 is a system wherein an information memory device for storing information necessary for operation of a radio telephone set, i.e., operation lock/unlock information, radio telephone participation information, or attached function restriction information, private information (i.e., individual information) such as a telephone number list, as explained in Japanese Patent Application Laid-Open Publication No. Hei-4-302245, is made in the form of an ID card or a chip and the information memory device is arranged to be removably connected to the radio telephone device.
  • [0006]
    In that system, when it is desired to exchange the radio telephone device with a newer device, by just removing the information memory device from the old radio telephone device and then attaching it to the new radio telephone device, the user can use the new radio telephone device under the same environment (that is, the same individual information) as that of the old radio telephone device.
  • [0007]
    However, the prior art radio telephone device has a problem that, since anyone can simply remove the information memory device therefrom, when another user removes the information memory device from other's radio telephone device and attaches the information memory device to his or her own radio telephone device, he or she can use it with use of the other's individual information.
  • SUMMARY OF THE INVENTION
  • [0008]
    In view of the above, the present invention has been made, and an object of the present invention is to provide a removable memory device for a portable terminal device which, when a user wants to exchange an old portable terminal device with new one and to use the new portable terminal device with individual information used so far, can reliably shift the individual information, can shorten a time necessary for the information shift to a large extent and can prevent easy illegal use of the individual information of the portable terminal device by others.
  • [0009]
    With the removable memory device for the portable terminal device in accordance with the present invention, when a user wants to exchange an old terminal device with new one, the user is required to protect an individual information already stored in the memory device.
  • [0010]
    In more detail, the memory device has a controller for judging an input command from a personal computer connected to the portable terminal device when the memory device is disconnected from the portable terminal device and a memory manager for protecting the memory at the time of the removal.
  • [0011]
    When the removable memory device of the present invention is illegally removed from the portable terminal device, the individual information stored in the memory is erased.
  • [0012]
    More specifically, the memory device has a controller for detecting a connection with the portable terminal and a memory manager having a function of erasing the memory.
  • [0013]
    The removable memory device in accordance with the present invention can be removed from the portable terminal device when a remove command (e.g., password) is entered.
  • [0014]
    For this reason, when wanting to exchange the terminal device, the user can exchange the individual information in a short time and also can prevent the user or a third party from illegally removing the memory device from the terminal device.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0015]
    The above-mentioned objects and advantages of the invention will become more apparent from the following detailed description when read in conjunction with the accompanying drawings, with like reference numerals indicating corresponding parts throughout, and wherein:
  • [0016]
    [0016]FIG. 1 is a block diagram of a removable memory device in accordance with a first embodiment of the present invention.
  • [0017]
    [0017]FIG. 2 is a configuration for explaining the shifting operation of individual information of a portable terminal device using the removable memory device in accordance with the present invention.
  • [0018]
    [0018]FIG. 3 is a flowchart for explaining the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention.
  • [0019]
    [0019]FIG. 4 is a flowchart for explaining the operation of the removable memory device according to the first embodiment of the present invention when the removable memory device was illegally removed from the portable terminal device.
  • [0020]
    [0020]FIG. 5 is a block diagram of a removable memory device and a part of a portable terminal device in accordance with a second embodiment of the present invention.
  • [0021]
    [0021]FIG. 6 is a flowchart for explaining the operation of the removable memory device according to the second embodiment of the present invention when the removable memory device was illegally removed from the portable terminal device.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • [0022]
    The present invention will be explained in connection with the drawings. Embodiments of the present invention will then be explained in detail with reference to the drawings. First, a related system will be discussed.
  • [0023]
    Explanation will now be made as to how to copy the individual information to another portable terminal device in a related portable terminal device.
  • [0024]
    Initially, a first portable terminal device, as a copy originator, is connected to such an intermediate controller as a personal computer to transfer the individual information already stored in the memory device of the first portable terminal device to the intermediate controller. Next, after the first portable terminal device is removed from the intermediate controller, a second portable terminal device, as a copy destinator, is connected to the intermediate controller to transfer to the second portable terminal device the individual information transferred from the first portable terminal device to the intermediate controller. The second portable terminal device stores in its own memory device the individual information transferred from the intermediate controller, at which stage the copying operation of the individual information is completed.
  • [0025]
    However, the related method has had a problem that the individual information is first transferred from the first portable terminal device to the intermediate controller and then stored in the memory device of the second portable terminal device, so that there is a danger that erroneous transfer of the individual information or data destruction during transmission may take place and an increased amount of information involves a longer transfer time.
  • [0026]
    [0026]FIG. 1 is a block diagram of a removable memory device in accordance with a first embodiment of the present invention.
  • [0027]
    A removable memory device 1 is made up of a memory 5 for storing individual information therein, a memory manager 6 for protecting the memory when the removable memory device 1 is not connected to a portable terminal device and for allowing access thereto when the removable memory device is connected, a data input/output part 4 as a data sending/receiving port to/from a data input/output part 2 of the portable terminal device, and a controller 3 for detecting an interconnection with the portable terminal device through the data input/output part 4 and for controlling the memory manager 6.
  • [0028]
    Explanation will next be made as to the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention, by referring to FIGS. 2 and 3. FIG. 2 is a configuration for explaining the shifting operation of the individual information of the portable terminal device using the removable memory device in accordance with the present invention, and FIG. 3 is a flowchart for explaining the operation thereof. Explanation will be made herein as to the shifting operation of the individual information stored in portable terminal device A in FIG. 2 to a portable terminal device B, by referring to steps (F-1) to (F-16) in FIG. 3.
  • [0029]
    First of all, by connecting the portable terminal device A to a personal computer 10, the portable terminal device A is put in its maintenance mode (step (F-1)). The maintenance mode may either be automatically entered when the portable terminal device A is connected to the personal computer 10, or the maintenance mode may be entered after a command to enter the maintenance mode is input via the personal computer 10.
  • [0030]
    In most systems, a command is required to enter the maintenance mode, but some systems allow for an automatically-entered maintenance when the portable terminal device A is connected to the personal computer 10.
  • [0031]
    The personal computer 10 acts as an information input/output apparatus for inputting commands, etc., to the portable terminal device or for displaying thereon information received from the portable terminal device. In the maintenance mode of the portable terminal device, the portable terminal device can do transactions on various types of maintenances. In the maintenance mode, when it is not associated with the removable memory device, the portable terminal device shifts to various types of maintenance modes (steps (F-2), (F-16)).
  • [0032]
    In this maintenance mode, next, a maintenance operator selects a removable mode for the removable memory device 1. More specifically, the operator enters a remove command into the portable terminal device A connected to the personal computer 10 (steps (F-2) and (F-3)). This remove command is accepted by the controller 3 of the removable memory device 1 via the data input/output part 2 of the Portable terminal device A and the data input/output part 4 of the removable memory device 1 (refer to FIG. 1).
  • [0033]
    The controller 3, after accepting the remove command, requires a password from the maintenance operator. The maintenance operator, in response to the password request, enters the password (password for the removal) from the personal computer 10 (step (F-4)). When the controller 3 finds a password coincidence between the operator-entered password and a password stored in the removable memory device 1 (step (F-5)), the controller 3 issues to the memory manager 6 a command to protect the memory 5 (step (F-6)). In the step (F-5), when the maintenance operator removes the removable memory device 1 from the portable terminal device A without finding a password coincidence in the controller 3, the contents stored in the memory 5 is erased and the memory 5 is initialized. The removable memory device 1 may be removed from the portable terminal device A without erasing the contents stored in the memory 5. In this case, as described later, when the portable terminal device B mounted the removable memory device 1 is connected to the personal computer 10, the contents stored in the memory 5. The password stored in the removable memory device 1 is typically only changeable by a user with system privileges or the like, and cannot be changed by a normal user. This password may be stored in the removable memory device (either in the controller 3 or the memory 5) during manufacture of the removable memory device 1, for example.
  • [0034]
    The memory manager 6, when receiving the instruction, protects the memory 5 and then issues a notification of completion of the memory protection to the controller 3 (step (F-7)). The controller 3, when receiving the notification, informs the personal computer 10 that the portable terminal device A is removable from the personal computer 10 via the portable terminal device A (step (F-8)). The personal computer 10, when receiving the removable notification, informs the maintenance operator to remove the portable terminal device A from the personal computer 10 and to remove the removable memory device 1 from the portable terminal device A.
  • [0035]
    The maintenance operator, after receiving the removal notice by means of the personal computer 10, removes the removable memory device 1 from the portable terminal device A (step (F-9)), mounts the removable memory device 1 into the portable terminal device B with protecting the contents stored in the memory 5, connects the portable terminal device B to the personal computer 10, selects a connection mode of the removable memory device 1 from the maintenance mode (F-1), and then enters on the personal computer 10 a connect command to the portable terminal device B (steps (F-2) and (F-3)).
  • [0036]
    Even when the controller 3 receives this connect command, as in the remove command explained previously, the controller 3 demands the password of the maintenance operator (step (F-10)). When the controller 3 finds a coincidence of the password entered by the maintenance operator (step (F-11)), the controller issues a memory release instruction to the memory manager 6 (step (F-12)). In the step (F-11), when the maintenance operator removes the removable memory device 1 from the portable terminal device A without finding a password coincidence in the controller 3, the contents stored in the memory 5 is erased and the memory 5 is initialized.
  • [0037]
    This instruction causes the memory manager 6 to release the memory 5 and to inform the controller 3 of completion of the memory release (step (F-13)). The controller 3, after receiving the notification, informs the personal computer 10 of completion of the connection of the removable memory device 1 via the portable terminal device B (step (F-14)). Thereafter, the maintenance operator is permitted to separate the portable terminal device B from the personal computer 10. After the portable terminal device B is separated from the personal computer 10, the operator can use the portable terminal device B (step (F-15)).
  • [0038]
    Explanation will then be made as to the operation of the removable memory device 1 according to the first embodiment when the operator removes the removable memory device 1 from the portable terminal device without following the above procedure, by referring to a flowchart of FIG. 4.
  • [0039]
    The controller 3, when confirming a connection of the portable terminal device through the data input/output part 4 (step (S-1)) and the memory protection is not carried out (step (S-2)) and the memory 5 is not newly mounted (step (S-3)) (that is, when incorrect removal is carried out), issues a memory erase instruction to the memory manager 6. The memory manager 6, when receiving the memory erase instruction, completes erasing of the contents stored in the memory 5 and then informs the controller 3 of completion of the memory erase. The controller 3, after receiving the notification, newly utilizes the memory 5 (step (S-4)).
  • [0040]
    In the step (S-2), when the memory protection is carried out, the contents stored in the memory 5 is not erased even if the maintenance operator removes the removable memory device 1 from the portable terminal device A. In the step (S-3), when the memory 5 is newly mounted, the memory 5 is initialized.
  • [0041]
    When the operator connects the removable memory device 1 to the portable terminal device without following the aforementioned procedure, the present invention can be arranged so that the portable terminal device prohibits its operation using the individual information stored in the removable memory device 1 connected thereto.
  • [0042]
    As has been explained in the foregoing, the removable memory device in accordance with the present invention is arranged so that an operator is required to enter the remove command (password) after connected from the personal computer and at the time of connection, operator's input of the connect command (password) from the personal computer causes the memory to be released. This enables the memory having the individual information already stored therein to be protected, so that illegal access can be prevented and shift of the individual information can be easily realized even at the time of exchange between portable terminal devices.
  • [0043]
    A second embodiment of the invention is shown in FIG. 5. In that figure, the controller 3′ is provided in the portable terminal device A′, which is external to the remote memory device 1′. FIG. 6 is a flowchart for explaining the operation according to the second embodiment. In FIG. 6, when the removable memory device 1′ is disconnected from a portable terminal device A′ and then later reconnected to the same portable terminal device A′ or to another portable terminal device (step S-5), and the memory 5 is not protected (step S-6), and the memory 5 is not newly mounted (step S-7), the controller 3′ issues a command to the memory manager 6 to erase the contents stored in the memory 5 if the memory 5 is not protected. After a non-protected memory 5 has been erased, the memory manager 6 informs the controller 3′ of completion of the memory erase (via the data input output part 4 of the removable memory device 1′ and the data input/output part 2 of the portable terminal device A′). The controller 3′, after receiving the notification, newly utilizes the memory 5 (step S-8). Thus, in the second embodiment, the memory 5 is not immediately erased under command of a controller 3 external to the removable memory device 1′ after disconnection of a removable memory device 1′ from a portable terminal device A′, in which the removable memory device has a non-new, non-protected memory (as in the first embodiment), but instead the erasure is performed by a controller 3′ external to the removable memory device 1′ at a time when the removable memory device 1′ is reconnected to a portable terminal device A′ (having a controller 3′ housed therein). In an alternative embodiment, the controller is housed in the personal computer 10.
  • [0044]
    While embodiments have been described herein, modification of the described embodiments may become apparent to those of ordinary skill in the art, following the teachings of the invention, without departing from the scope of the invention as set forth in the appended claims. For example, other ways of disabling the removable memory device may be contemplated while remaining within the teachings of the invention, such as, for example, disabling the data input/output part 4 or the memory manager 6, and not erasing the memory 5. For the data input/output part, this would require a control signal (not shown in FIG. 1) from the controller 3 to the data input/output part 4, where that control signal would disable the data input/output part 4.
  • [0045]
    Further, in the embodiments of the invention, a maintenance operator enters commands, a password, and so on, from a personal computer 10. However, the maintenance operator may be able to enter them from a portable terminal device A.
  • [0046]
    Moreover, in the embodiments of this invention, the maintenance operator enters commands, a password, and so on, but a user of a portable terminal device A may be able to enter them.

Claims (17)

What is claimed is:
1. A removable memory device for a portable terminal device for storing individual information including operation of the portable terminal device therein to be removed from said portable terminal device, comprising:
an input port configured to receive a command for removing the removable memory device from the portable terminal device; and
a control unit configured to protect information within the removable memory device when a verification command is received by the input port.
2. A removable memory device for a portable terminal device as set forth in
claim 1
, wherein said verification command is entered based on a request output through an information input/output device connected to said portable terminal device, and wherein said verification command is received by said control unit through said information input/output device.
3. A removable memory device for a portable terminal device as set forth in
claim 2
, wherein said information input/output device is a personal computer.
4. A removable memory device for a portable terminal device as set forth in
claim 1
, wherein, when said removable memory device is illegally separated from said portable terminal device, the information stored within said removable memory device is erased.
5. A removable memory device for a portable terminal device as set forth in
claim 1
, wherein, when said removable memory device is illegally connected to said portable terminal device, said removable memory device prohibits operation of said portable terminal device using the information stored within said removable memory device.
6. A removable memory device for a portable terminal device as set forth in
claim 2
, wherein said control unit is housed in said information input/output device.
7. A removable memory device for a portable terminal device as set forth in
claim 1
, wherein said control unit is housed in said portable terminal device.
8. A removable memory device for a portable terminal device, the removable memory device configured to store individual information related to operation of the portable terminal device, the removable memory device comprising:
an input port configured to receive an operator command for removing the removable memory device from the portable terminal device, the operator command being entered through a computer communicatively connected to the portable terminal device; and
an erase unit configured to erase the information within the removable memory device when both a) and b) occur, where a) a particular password is not entered through the computer, and b) the removable memory device is removed from the portable terminal device.
9. A removable memory device for a portable terminal device as set forth in
claim 8
, wherein, when the particular password is entered through the computer, the removable memory device is allowed to be removed from the portable terminal device without erasing any of the information stored within the removable memory device.
10. A system for allowing for protecting information stored within a removable memory device that is connectable to a portable terminal device, the information relating to operation of the portable terminal device, the system comprising:
an input port configured to receive a command for removing the removable memory device from the portable terminal device; and
a control unit configured to Protect information within the removable memory device when a verification command is received by the input port.
11. A system as set forth in
claim 10
, wherein said control unit is housed in said removable memory device.
12. A system as set forth in
claim 10
, wherein said control unit is housed in said portable terminal device.
13. A system for transferring individual information stored in a removable memory device initially coupled to a first portable terminal device, to a second portable terminal device for which said removable memory device is to be later coupled, the system comprising:
a computer configured to place said first portable terminal device in a maintenance mode when said first portable terminal device is coupled to said computer,
said first portable terminal device including a data input/output part for receiving a remove command for said removable memory device when said first portable terminal device is coupled to said computer while in said maintenance mode,
a controller configured to accept the remove command and to output a request for a password to be entered via said computer,
wherein said controller compares the entered password to a stored password to determine whether there is a coincidence,
wherein, if there is a coincidence, said controller protects the information stored in said removable memory device and informs said computer that said removable memory device can be removed from said first portable terminal device, and
wherein, when said second portable terminal device is coupled to said computer and said removable memory device is coupled to said second portable terminal device and placed in a connection mode, said controller requests to enter the password via said computer in order to allow said second portable terminal device to access the information stored in said removable memory device without erasing the information.
14. A system as set forth in
claim 13
, wherein said controller is housed in said removable memory device.
15. A system as set forth in
claim 13
, wherein said controller is housed in both said first and second portable terminal devices.
16. A method for providing removal of a memory device for a portable terminal device configured to store individual information related to operation of the portable terminal device, the method comprising the steps of:
a) receiving an operator command for removing the removable memory device from the portable terminal device, the operator command be entered through a computer communicatively connected to the portable terminal device;
b) based on the received operator command, requesting entry of a particular password to be entered through the computer; and
c) erasing the information within the removable memory device when both i) and ii) occur, where i) the particular password is not entered through the computer in response to the request made in the step b), and ii) the removable memory device is removed from the portable terminal device.
17. A method for a portable terminal device as set forth in
claim 16
, wherein, when the particular password is entered through the computer in response to the request made in the step b), the removable memory device is allowed to be removed from the portable terminal device without erasing any of the information stored within the removable memory device.
US09033613 1997-03-04 1998-03-03 Removable memory device for portable terminal device Active US6282612B1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP9-48627 1997-03-04
JP9-048627 1997-03-04
JP4862797A JP3120749B2 (en) 1997-03-04 1997-03-04 Of the mobile terminal device removable storage device

Publications (2)

Publication Number Publication Date
US20010016895A1 true true US20010016895A1 (en) 2001-08-23
US6282612B1 US6282612B1 (en) 2001-08-28

Family

ID=12808640

Family Applications (1)

Application Number Title Priority Date Filing Date
US09033613 Active US6282612B1 (en) 1997-03-04 1998-03-03 Removable memory device for portable terminal device

Country Status (4)

Country Link
US (1) US6282612B1 (en)
JP (1) JP3120749B2 (en)
CN (1) CN1136505C (en)
GB (1) GB2325116B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116575A1 (en) * 2000-11-07 2002-08-22 Yuji Toyomura Carryable memory media, portable information terminal using the same and method for managing files therein
US20040030830A1 (en) * 2001-02-26 2004-02-12 Tokyo Electron Device Limited Storage medium control method, storage medium control device, and storage medium adaptor
EP1538855A2 (en) * 2003-12-01 2005-06-08 Sony Ericsson Mobile Communications Japan, Inc. Method of preventing access to a subscriber identity module in a mobile communication terminal
US20060004974A1 (en) * 2003-03-13 2006-01-05 Paul Lin Portable non-volatile memory device and method for preventing unauthorized access to data stored thereon
US20060087699A1 (en) * 2004-09-28 2006-04-27 Seiko Epson Corporation Image processing apparatus, control method of the same, and storage medium
US20070288756A1 (en) * 2006-05-18 2007-12-13 Fuji Xerox Co., Ltd. Data processing apparatus, data processing method, and computer readable medium
US20080086680A1 (en) * 2006-05-27 2008-04-10 Beckman Christopher V Techniques of document annotation according to subsequent citation
US20080092219A1 (en) * 2006-05-27 2008-04-17 Beckman Christopher V Data storage and access facilitating techniques
US20080215841A1 (en) * 2005-07-21 2008-09-04 Clevx, Llc Memory Lock System
US20100174913A1 (en) * 2009-01-03 2010-07-08 Johnson Simon B Multi-factor authentication system for encryption key storage and method of operation therefor
US20100174922A1 (en) * 2009-01-07 2010-07-08 Johnson Simon B Encryption bridge system and method of operation thereof
USRE45422E1 (en) 2006-05-27 2015-03-17 Loughton Technology, L.L.C. Organizational viewing techniques
CN105449449A (en) * 2014-08-26 2016-03-30 鸿富锦精密工业(深圳)有限公司 Electronic product
US9401254B2 (en) 2006-05-27 2016-07-26 Gula Consulting Limited Liability Company Electronic leakage reduction techniques

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3544297B2 (en) * 1998-04-08 2004-07-21 富士通株式会社 Access control method, storage apparatus and storage medium
JP3866892B2 (en) * 2000-02-15 2007-01-10 株式会社日立グローバルストレージテクノロジーズ Information processing apparatus and its maintenance service system
US7295443B2 (en) 2000-07-06 2007-11-13 Onspec Electronic, Inc. Smartconnect universal flash media card adapters
US7493437B1 (en) 2000-07-06 2009-02-17 Mcm Portfolio Llc Flashtoaster for reading several types of flash memory cards with or without a PC
US7252240B1 (en) 2000-07-06 2007-08-07 Onspec Electronics, Inc. Memory module which includes a form factor connector
US6438638B1 (en) 2000-07-06 2002-08-20 Onspec Electronic, Inc. Flashtoaster for reading several types of flash-memory cards with or without a PC
US7278051B2 (en) 2000-07-06 2007-10-02 Onspec Electronic, Inc. Field-operable, stand-alone apparatus for media recovery and regeneration
JP2002149456A (en) 2000-11-07 2002-05-24 Matsushita Electric Ind Co Ltd Portable storage medium, file management method in portable storage medium, and portable terminal
FR2818474B1 (en) * 2000-12-18 2003-02-21 Richard Toffolet Process for the fight against theft devices "nomadic" device and corresponding installation
EP1480395B1 (en) * 2001-03-19 2007-04-25 Sony Corporation Network system
EP1258807A3 (en) * 2001-05-14 2005-11-02 Matsushita Electric Industrial Co., Ltd. Illegal access monitoring device, ic card, and illegal access monitoring method
KR100711913B1 (en) * 2002-02-04 2007-04-27 엘지전자 주식회사 Method for securing data stored in hard discs of a computer system
EP1540448A2 (en) * 2002-04-08 2005-06-15 Socket Communications, Inc. Wireless enabled memory module
JP2003331241A (en) * 2002-05-09 2003-11-21 Fujitsu Ltd Memory device and method of controlling the same
US20110063835A1 (en) * 2002-09-23 2011-03-17 Nelson Rivas Led lighting apparatus
JP2005011151A (en) * 2003-06-20 2005-01-13 Renesas Technology Corp Memory card
DE10340861A1 (en) * 2003-09-04 2005-04-07 Infineon Technologies Ag Processor circuit and method for allocating a logic chip to a memory chip
KR100605920B1 (en) * 2004-02-17 2006-08-02 삼성전자주식회사 Method for securing external memory in wireless terminal
US20060150247A1 (en) * 2004-12-30 2006-07-06 Andrew Gafken Protection of stored data
US8887295B2 (en) * 2005-06-27 2014-11-11 Safend Ltd. Method and system for enabling enterprises to use detachable memory devices that contain data and executable files in controlled and secure way
US7861934B1 (en) * 2006-05-05 2011-01-04 CompuSystems, Inc. Devices and method for recording sales leads
US20080040591A1 (en) * 2006-08-11 2008-02-14 Moyer William C Method for determining branch target buffer (btb) allocation for branch instructions
US20080040590A1 (en) * 2006-08-11 2008-02-14 Lea Hwang Lee Selective branch target buffer (btb) allocaiton
US20080195824A1 (en) * 2007-02-09 2008-08-14 Microsoft Corporation Context sensitive caching on removable storage
US8104920B2 (en) * 2008-06-01 2012-01-31 Jack Dubord Adjustable modular lighting system and method of using same
US9355238B2 (en) * 2010-05-26 2016-05-31 Ncr Corporation Secure authentication at a self-service terminal
US20120246713A1 (en) * 2011-03-24 2012-09-27 Cheng-Hsiung Liao Method and apparatus for controlling access of a secure digital memory card
US9299072B2 (en) 2014-05-29 2016-03-29 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
US9400977B2 (en) 2014-05-29 2016-07-26 Apple Inc. User device enabling access to payment information in response to mechanical input detection

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4430728A (en) * 1981-12-29 1984-02-07 Marathon Oil Company Computer terminal security system
JPS6270096A (en) 1985-09-24 1987-03-31 Casio Computer Co Ltd Holder for integrated circuit card
JPS63191450A (en) 1987-02-04 1988-08-08 Hitachi Ltd Telephone system
JPH02305159A (en) * 1989-05-19 1990-12-18 Toshiba Audio Video Eng Corp Radio telephone set
JPH0331949A (en) 1989-06-29 1991-02-12 Hitachi Ltd Information processor
US5293610A (en) * 1989-08-04 1994-03-08 Motorola, Inc. Memory system having two-level security system for enhanced protection against unauthorized access
JPH04302245A (en) 1991-03-29 1992-10-26 Toshiba Corp Radio telephony system
EP0605618A4 (en) * 1991-09-23 1998-05-13 Microsystems Z Enhanced security system for computing devices.
DE9217379U1 (en) 1992-11-09 1993-04-29 Telefonaktiebolaget L M Ericsson, Stockholm, Se
JPH08505747A (en) * 1993-08-31 1996-06-18 エリクソン ジーイー モービル コミュニケーションズ インコーポレイテッド Message storage device in a cellular mobile within terminal
CN1071083C (en) * 1994-04-07 2001-09-12 诺基亚电信公司 A removable subscriber identification module for a mobile radio terminal and a call control method
US5675628A (en) * 1994-08-01 1997-10-07 Nokia Telecommunications Oy Method and apparatus for enabling roaming of subscriber among plural mobile radio systems, using mobile equipment accepting removable subscriber identity module
FR2732790B1 (en) * 1995-04-05 1997-05-09 Gemplus Card Int information collection system for card readers
DE19621768B4 (en) * 1996-05-30 2004-03-25 Siemens Ag Telephone with cradle for a phone memory card and method for transmitting data of a phone memory card

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116575A1 (en) * 2000-11-07 2002-08-22 Yuji Toyomura Carryable memory media, portable information terminal using the same and method for managing files therein
US20040030830A1 (en) * 2001-02-26 2004-02-12 Tokyo Electron Device Limited Storage medium control method, storage medium control device, and storage medium adaptor
US20060004974A1 (en) * 2003-03-13 2006-01-05 Paul Lin Portable non-volatile memory device and method for preventing unauthorized access to data stored thereon
EP1538855A2 (en) * 2003-12-01 2005-06-08 Sony Ericsson Mobile Communications Japan, Inc. Method of preventing access to a subscriber identity module in a mobile communication terminal
US20050143059A1 (en) * 2003-12-01 2005-06-30 Sony Ericsson Mobile Communications Japan, Inc. Subscriber identity module and method of preventing access thereto, and mobile communication terminal device
EP1538855A3 (en) * 2003-12-01 2005-11-16 Sony Ericsson Mobile Communications Japan, Inc. Method of preventing access to a subscriber identity module in a mobile communication terminal
US7286852B2 (en) 2003-12-01 2007-10-23 Sony Ericsson Mobile Communications Japan, Inc. Subscriber identity module and method of preventing access thereto, and mobile communication terminal device
US20060087699A1 (en) * 2004-09-28 2006-04-27 Seiko Epson Corporation Image processing apparatus, control method of the same, and storage medium
US20080215841A1 (en) * 2005-07-21 2008-09-04 Clevx, Llc Memory Lock System
US9075571B2 (en) * 2005-07-21 2015-07-07 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
US8088172B2 (en) * 2006-05-18 2012-01-03 Fuji Xerox Co., Ltd. Data processing apparatus, data processing method, and computer readable medium
US20070288756A1 (en) * 2006-05-18 2007-12-13 Fuji Xerox Co., Ltd. Data processing apparatus, data processing method, and computer readable medium
US20080086680A1 (en) * 2006-05-27 2008-04-10 Beckman Christopher V Techniques of document annotation according to subsequent citation
USRE45422E1 (en) 2006-05-27 2015-03-17 Loughton Technology, L.L.C. Organizational viewing techniques
US8914865B2 (en) * 2006-05-27 2014-12-16 Loughton Technology, L.L.C. Data storage and access facilitating techniques
US20080092219A1 (en) * 2006-05-27 2008-04-17 Beckman Christopher V Data storage and access facilitating techniques
US9401254B2 (en) 2006-05-27 2016-07-26 Gula Consulting Limited Liability Company Electronic leakage reduction techniques
US20100174913A1 (en) * 2009-01-03 2010-07-08 Johnson Simon B Multi-factor authentication system for encryption key storage and method of operation therefor
US20100174922A1 (en) * 2009-01-07 2010-07-08 Johnson Simon B Encryption bridge system and method of operation thereof
US9286493B2 (en) 2009-01-07 2016-03-15 Clevx, Llc Encryption bridge system and method of operation thereof
CN105449449A (en) * 2014-08-26 2016-03-30 鸿富锦精密工业(深圳)有限公司 Electronic product

Also Published As

Publication number Publication date Type
CN1202055A (en) 1998-12-16 application
GB2325116A (en) 1998-11-11 application
CN1136505C (en) 2004-01-28 grant
GB2325116B (en) 1999-05-12 grant
JPH10247970A (en) 1998-09-14 application
US6282612B1 (en) 2001-08-28 grant
GB9804505D0 (en) 1998-04-29 grant
JP3120749B2 (en) 2000-12-25 grant

Similar Documents

Publication Publication Date Title
US5588146A (en) Method for the acquisition of software and data-processing system to implement the method
US5394469A (en) Method and apparatus for retrieving secure information from mass storage media
US5150412A (en) Security module for radio telephone
US6513121B1 (en) Securing feature activation in a telecommunication system
US6330624B1 (en) Access limiting to only a planar by storing a device public key only within the planar and a planar public key only within the device
US5825875A (en) Process for loading a protected storage zone of an information processing device, and associated device
US7000115B2 (en) Method and apparatus for uniquely and authoritatively identifying tangible objects
US7039811B2 (en) Apparatus and method for controlling access to contents stored in card like electronic equipment
US5146348A (en) Store-and-forward switching system
US7380140B1 (en) Providing a protected volume on a data storage device
US4482802A (en) Transaction handling system
US5870467A (en) Method and apparatus for data input/output management suitable for protection of electronic writing data
US7443527B1 (en) Secured printing system
US5684987A (en) Management system of multimedia
US6463537B1 (en) Modified computer motherboard security and identification system
US20110145932A1 (en) System and Method for Remote Management of Applications Downloaded to a Personal Portable Wireless Appliance
US6202153B1 (en) Security switching device
US5329570A (en) Copy protection of software for use in a private branch exchange switch
US20020100037A1 (en) Device and method for downloading software via a network
US5615262A (en) Device for securing an information system used in microcomputers
US4962449A (en) Computer security system having remote location recognition and remote location lock-out
US20050005131A1 (en) Memory card
US20040255145A1 (en) Memory protection systems and methods for writable memory
US20030131349A1 (en) Methods and systems for managing and collecting impulse pay-per-view data in smart card enabled television terminals
US20040228487A1 (en) Content reading apparatus

Legal Events

Date Code Title Description
AS Assignment

Owner name: NEC CORPORATION, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAKAJIRI, NORIYASU;HAYASHI, KEIICHI;REEL/FRAME:009013/0119

Effective date: 19980223

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Effective date: 20140618

Owner name: LENOVO INNOVATIONS LIMITED (HONG KONG), HONG KONG

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEC CORPORATION;REEL/FRAME:033720/0767