WO2004044714A1 - Computer security system - Google Patents

Computer security system Download PDF

Info

Publication number
WO2004044714A1
WO2004044714A1 PCT/JP2003/014308 JP0314308W WO2004044714A1 WO 2004044714 A1 WO2004044714 A1 WO 2004044714A1 JP 0314308 W JP0314308 W JP 0314308W WO 2004044714 A1 WO2004044714 A1 WO 2004044714A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
satisfied
condition
storage device
telephone
Prior art date
Application number
PCT/JP2003/014308
Other languages
French (fr)
Japanese (ja)
Inventor
Wataru Sato
Original Assignee
Tera Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tera Co., Ltd. filed Critical Tera Co., Ltd.
Priority to AU2003301925A priority Critical patent/AU2003301925A1/en
Publication of WO2004044714A1 publication Critical patent/WO2004044714A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Definitions

  • the present invention relates to a security system for a computer (hereinafter, simply referred to as a personal computer) such as a personal computer used in an office or the like.
  • a computer hereinafter, simply referred to as a personal computer
  • a personal computer such as a personal computer used in an office or the like.
  • the personal computer may be used.
  • a third party who is not the user of the computer can view the contents displayed on the personal computer screen, and can use the data such as files stored in the storage device without permission. It can be read out, browsed, written, or printed out.
  • the present invention has been made in view of the above-described security situation of personal computers, and it is possible to create a situation in which the used personal computers can be used or not used by a simple method.
  • the task is to provide a system.
  • the configuration of the personal computer security system of the present invention which has been made to solve the above-mentioned problems, is provided in a storage device of a computer having an input device, a storage device, a processing device, and an output device.
  • a computer Connected to a computer Data indicating the unique numerical value assigned to the mobile phone to be stored, and when the telephone is connected to the computer, the unique numeric data is logically ANDed with the unique numeric data of the storage device.
  • the control device of the processing device holds the input device or the output device in the operating state, and disconnects the telephone.
  • the logical product condition is not satisfied, at least the input device or the output device is switched to an inactive state.
  • the control device When the mobile telephone is connected, the control device causes the arithmetic device to fetch the unique numerical data from the telephone, and the same unique numerical data set in the storage device in advance and the fetched data are used.
  • the arithmetic unit performs arithmetic processing as to whether or not the logical product condition is satisfied at an appropriate interval.If the condition is satisfied, the operation state holding command is output and the telephone is disconnected. Therefore, when the above condition is not satisfied, a command to switch to the inoperative state is output.
  • FIG. 1 is a block diagram schematically showing an example of the configuration of a bass computer incorporating the security system of the present invention.
  • Fig. 2 is a block diagram of the main parts of the security system of the present invention.
  • FIG. 11 is a front view of an operation example of the security system of the present invention.
  • Fig. 1 schematically shows the basic configuration of a computer including a computer.
  • 1 is an input device for inputting data and commands from outside using a keyboard / disc player, etc.
  • 2 is a main storage device such as a hard disk.
  • a storage device provided with 2a and an auxiliary storage device 2b such as memory for storing input data and programs.
  • the storage device 2 has a function of extracting a command word, extracting data to be operated, and storing the operation result.
  • Reference numeral 3 denotes a processing unit mainly composed of a control device 3a mainly composed of a CPU and the like and an arithmetic device 3b.
  • the control device 3a controls the entire computer, and the arithmetic device 3b is a necessary device. Perform the operation.
  • Reference numeral 4 denotes an output device formed by a liquid crystal screen, printer, speaker, and so on.
  • the solid line indicates the data flow
  • the dashed line indicates the control signal flow.
  • connection cable C a connected to the external connection terminal Ka of the mobile phone KT to a connection port P such as a COM port or a USB port
  • a connection port P such as a COM port or a USB port
  • the specific data of the telephone may be stored in the storage device by radio.
  • both the unique data are always stored at an interval that can be arbitrarily set in the arithmetic unit 3b, for example, at a sampling period of 5 seconds. Is calculated, and if both unique data are available, a control signal for keeping at least the input device 1 or Z and the output device 4 in an operable state is transmitted to the input device 1 and the output device 4. To supply.
  • the sampling period may of course be other than 5 seconds.
  • the control device 3a outputs a control signal for resolving the operable state to the input device 1 and the output device 4, and switches the input device 1 and the output device 4 to a non-operable state.
  • step S 1 the unique data (a numerical value indicating a unique number of the mobile phone KT) is taken into the personal computer from the phone KT and stored in the storage device 2.
  • step S2 it is determined whether or not the telephone KT is connected to the cable C a, from which the unique data is supplied to the personal computer.Then, the unique data is input to the personal computer without being connected. Otherwise, it will be in the “PC lock” mode, including the PC end in step S3.
  • step S4 it is determined whether or not the unique data of the telephone set KT previously set in the personal computer matches the unique data of the telephone set KT input through the cable Ca. Unfortunate — If the status is correct, immediately proceed to the “Personal computer” mode including the termination of the personal computer in step S3, but if they match, the computer maintains the startup state of the personal computer. After proceeding to S5, return to step S4, and repeat this at the set sampling cycle.
  • the above computer can operate and drive the computer freely like a normal computer. Yes, but when the mobile phone KT is disconnected from the computer, the operable state of at least the input devices 1 and Z or the output device 4 is switched to the inoperable state, so that the mobile phone KT is retained. A third party other than the person doing this will not be able to start or operate this computer. Even if another mobile phone KT is connected to the vacant code C a, the unique data set in the computer and the unique data from the phone KT do not match. Evening is never operational.
  • the mobile phone KT in the security system of the present invention uses the unique data possessed by the mobile phone KT in the same manner as a computer locking means using a pass-through key or the like as a key. This constitutes a means of security.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

There is provided a security system for creating a usable/unusable condition of a personal computer by a more simple method. A computer includes an input device (1), a storage device (2), a processing device (3), and an output device (4). The storage device (2) contains data indicating a unique numeric value assigned to a mobile telephone KT to be connected to the computer. When the telephone KT is connected to the computer, a calculation device (3b) of the processing device checks whether the unique numeric value data is satisfied by the AND with the unique numeric value of the storage device (2). If the condition is satisfied, a control device (3a) of the processing device (3) maintains the input device (4) or the output device in the operation state and when the connection of the telephone KT is cut off and the AND condition is not satisfied, at least the input device (1) or the output device (4) is switched to the non-operation state.

Description

明糸田書 コ ンピュータのセキュ リ ティ システム 技術分野  Akitoda Sho Computer Security Systems Technical Field
本発明はオフィ ス等で使用されるパーソナルコ ンピュータ等のコ ンピュ一夕 (以下、 単にパソコ ンという ) のセキュ リ ティ システム に関する。  The present invention relates to a security system for a computer (hereinafter, simply referred to as a personal computer) such as a personal computer used in an office or the like.
発明の背景  Background of the Invention
昨今のオフィ ス等においては一人に少なく とも一台のパソ コ ンを 使用する こ とが当 り 前の状況にな り 、 パソ コ ン抜きでオフィ ス等に おけるあ らゆる業務の逐行は考え られないほどになっている。  In offices and the like these days, at least one personal computer was used before, and all business operations in offices and other offices without a personal computer would not be possible. It is inconceivable.
オフィ ス等において各人が夫々 に一台以上のパソコ ンを使用する 環境では、 例えば昼食時などの外出時に自分のパソ コ ンからその使 用者 (所有者) が離れてしまう と、 当該パソコ ンの使用者ではない 第三者であっても、 例えばそのパソ コ ン画面に表示されている内容 を閲覧可能である こ とは勿論、 記憶装置に格納されている フ ァイル 等のデータ を勝手に引出して閲覧した り 、 書込みをした り 、 或は、 プリ ン トアウ トする こ となどが可能となる。  In an environment where each person uses one or more personal computers in an office or the like, if the user (owner) of the personal computer leaves the personal computer when going out, for example, at lunch, the personal computer may be used. For example, even a third party who is not the user of the computer can view the contents displayed on the personal computer screen, and can use the data such as files stored in the storage device without permission. It can be read out, browsed, written, or printed out.
従来、 上記のよ う な事態を防ぐには、 パソ コ ンか らその使用者が 離れる とき、 パソコ ンを停止して外出するなどしているが、 バソコ ンから離れる度に当該パソコ ンを停止した り 、 戻る度に立上げる こ とは煩しいのみならず、 思わぬ動作 ト ラブルの原因にもな り 易い。 また、 単にパソ コ ンを停止しているだけでは、 第三者が勝手にそ のパソコ ンを立ち上げる こ とができるので、 勝手にフ ァイルの内容 を読まれた り 、 コ ピーされてしま うおそれが り 、 しかも、 その根跡 は残らないため、 パソコ ン内に格納されている様々な情報の機密保 持の面でも至って心も とないのが現状である。 Conventionally, in order to prevent the above situation, when the user leaves the personal computer, the user stops the personal computer and goes out.However, the personal computer is stopped every time the user leaves the personal computer. It is not only troublesome to start up every time you return, but it is also easy to cause unexpected operation trouble. Also, simply stopping the personal computer allows a third party to start the personal computer without permission, so that the contents of the file are read or copied without permission. At the same time, since there is no trace of this, there is no way to keep confidentiality of various information stored in the personal computer.
上記のよ う な点に鑑み、 所定手順を踏む、 例えばパス ワー ド を入 力しなければ、 パソコ ンの立上げはできてもそれ以上の操作を出来 ないよ う にしたパソコ ン用の専用 ソ フ ト も提供されているが、 この ソフ トでは、 本人であってもパソ コ ン立上げの度、 パスワー ドの入 力操作を不可欠とするため、 余り 合理的とはいえない面がある。 ま た、 パソコ ンの起動に指紋や専用キーを利用するよう にしたものも あるが、 指紋を利用する場合には、 パソ コ ンのハー ド構成に指紋読 取機構などの付属機能を不可欠とするため、 それがパソコ ン価格を 押上げ、 一方、 専用キーの場合には紛失のおそれが多いため、 キ一 失っ た場合の対応に問題が残っているなど、 実用上の難点が多い。  In consideration of the above points, if you follow the prescribed procedure, for example, if you do not enter a password, you can start up the computer but you can not perform any further operations. Software is also provided, but with this software, even if the user himself / herself, password input operation is indispensable every time the personal computer is started up, so there are aspects that are not very reasonable . Some devices use a fingerprint or a dedicated key to start up the computer, but if a fingerprint is used, it is essential that the hardware configuration of the computer include additional functions such as a fingerprint reading mechanism. However, this raises the price of personal computers, while there are many practical difficulties, such as the fact that dedicated keys are often lost, and there are still problems in dealing with lost keys.
発明の開示  Disclosure of the invention
本発明は以上のよう なパソコ ンのセキュ リ ティ 状況に鑑み、 もつ と手軽な手法によ り 、 使用 しているパソコ ンの使用可, 使用不可の 状況を創成する こ とができるセキュ リ ティ システムを提供する こ と を、 その課題とする。  The present invention has been made in view of the above-described security situation of personal computers, and it is possible to create a situation in which the used personal computers can be used or not used by a simple method. The task is to provide a system.
上記課題を解決する こ とを 目的と してなされた本発明パソ コ ンセ キユ リ ティ 方式の構成は、 入力装置, 記憶装置, 処理装置, 出力装 置を有するコ ンピュータの記憶装置に、 そのコ ンピュータに接続さ れる携帯電話機に付与された固有数値を示すデータ を記憶させてお き、 前記電話機が前記コ ンピュータに接続されたとき、 その固有数 値デ一夕が前記記憶装置の固有数値データ と論理積条件で満たされ るか否かを前記処理装置の演算装置で判別させ、 前記条件が満たさ れる ときには前記処理装置の制御装置が前記入力装置又は出力装置 を動作状態に保持させ、 前記電話機の接続が切れて前記論理積条件 が満たされないとき、 少なく とも前記入力装置又は出力装置を不作 動状態に切換える こ とを特徴とする ものである。 The configuration of the personal computer security system of the present invention, which has been made to solve the above-mentioned problems, is provided in a storage device of a computer having an input device, a storage device, a processing device, and an output device. Connected to a computer Data indicating the unique numerical value assigned to the mobile phone to be stored, and when the telephone is connected to the computer, the unique numeric data is logically ANDed with the unique numeric data of the storage device. Is determined by the processing unit of the processing device, and when the condition is satisfied, the control device of the processing device holds the input device or the output device in the operating state, and disconnects the telephone. When the logical product condition is not satisfied, at least the input device or the output device is switched to an inactive state.
上記の制御装置は、 携帯電話機が接続される とその電話機か らそ の固有数値データ を演算装置に取込ませ、 予め記憶装置に設定され ている同一の固有数値デ一夕 と前記取込みデータが適宜イ ンターパ ルで論理積条件を満足しているか否かを演算装置で演算処理させ、 前記条件を満足している ときは動作状態の保持指令を出力する と共 に、 前記電話機の接続が切れて前記条件が満たされないときは不動 作状態への切換指令を出力するよう に形成されている。  When the mobile telephone is connected, the control device causes the arithmetic device to fetch the unique numerical data from the telephone, and the same unique numerical data set in the storage device in advance and the fetched data are used. The arithmetic unit performs arithmetic processing as to whether or not the logical product condition is satisfied at an appropriate interval.If the condition is satisfied, the operation state holding command is output and the telephone is disconnected. Therefore, when the above condition is not satisfied, a command to switch to the inoperative state is output.
図面の簡単な説明  BRIEF DESCRIPTION OF THE FIGURES
次に本発明の実施の形態例について、 図を参照して説明する。 図 1 は本発明セキュ リ ティ システムを導入したバソコ ンの構成例を模 式的に示したブロ ッ ク図、 図 2 は本発明セキュ リ ティ システムの要 部のブロ ッ ク図、 図 3 は本発明セキュ リ ティ システムの動作例のフ 口一図である。  Next, an embodiment of the present invention will be described with reference to the drawings. Fig. 1 is a block diagram schematically showing an example of the configuration of a bass computer incorporating the security system of the present invention. Fig. 2 is a block diagram of the main parts of the security system of the present invention. FIG. 11 is a front view of an operation example of the security system of the present invention.
発明を実施するための最良の形態  BEST MODE FOR CARRYING OUT THE INVENTION
図 1 はバソコ ンを含むコ ンピュ一夕の基本構成を模式的に示した もので、 1 はキーポー ドゃディ スク リ 一ダゃプレーヤ等によ り外部 か らデ一夕やコマン ドを入力するための入力装置、 2 は、 ハー ドデ ィ スク等の主記憶装置.2 a とメモ リ等の補助記憶装置 2 b を具備した 記憶装置で、 入力 したデータやプログラムが格納される。 また、 記 憶装置 2 は、 命令語を取出した り 、 演算するデータを取出し、 演算 結果を記憶する機能をもっている。 3 は C P Uなどを主体に形成さ れた制御装置 3 a と演算装置 3 b を主体に構成される処理装置で、 制 御装置 3 a はコ ンピュータ全体を制御し、 演算装置 3 b は必要な演算 を実行する。 4 は液晶画面, プリ ンタ, ス ピーカなどによ り 形成さ れる出力装置である。 図 1 において、 実線はデータの流れを示し、 波線は制御信号の流れを表わしている。 Fig. 1 schematically shows the basic configuration of a computer including a computer. 1 is an input device for inputting data and commands from outside using a keyboard / disc player, etc., and 2 is a main storage device such as a hard disk. A storage device provided with 2a and an auxiliary storage device 2b such as memory for storing input data and programs. Further, the storage device 2 has a function of extracting a command word, extracting data to be operated, and storing the operation result. Reference numeral 3 denotes a processing unit mainly composed of a control device 3a mainly composed of a CPU and the like and an arithmetic device 3b.The control device 3a controls the entire computer, and the arithmetic device 3b is a necessary device. Perform the operation. Reference numeral 4 denotes an output device formed by a liquid crystal screen, printer, speaker, and so on. In FIG. 1, the solid line indicates the data flow, and the dashed line indicates the control signal flow.
上記のコ ンピュータにおいて、 本発明では C O Mポ一 トゃ U S B ポー トなどの接続口 P に、 携帯電話機 KT における外部接続端子 K a に接続された接続ケーブル C a を接続する こ とによ り 、その電話機に 固有の数値データ と して付与されている固有数値、 或は、 その電話 機の電話番号を示す数値 (以下、 前記数値を 「固有データ」 という) を、 記憶装置 2 に取込ませる。 前記電話機の固有デ一夕は無線によ り 記憶装置に取込ませてもよい。  In the above-mentioned computer, in the present invention, by connecting a connection cable C a connected to the external connection terminal Ka of the mobile phone KT to a connection port P such as a COM port or a USB port, A unique numerical value assigned as unique numerical data to the telephone or a numerical value indicating the telephone number of the telephone (hereinafter, the numerical value is referred to as “specific data”) is stored in the storage device 2. . The specific data of the telephone may be stored in the storage device by radio.
一方、 制御装置 3 a は、 先に記憶装置 2 に取込まれた固有デ一夕 と、 いま実際に前記携帯電話機 KT を接続ケーブル C a によ り このコ ンビ ュ一夕 に接続したとき、 当該コ ンピュータにいま取込まれる固有デ 一夕 とを、 演算装置 3 b において、 任意に設定できるィ ンタ一バル、 例えば 5 秒のサンプリ ング周期で、 常時、 両方の固有データがある か否かを演算させ、 双方の固有データが揃っていれば、 少なく と も 入力装置 1 、 又は Z及び、 出力装置 4 を動作可能状態に保持させる 制御信号を、 当該入力装置 1 と出力装置 4 に供給する。 なお、 サン プリ ング周期は、 勿論 5 秒以外であってもよい。 On the other hand, when the controller 3a connects the mobile phone KT to the console via the connection cable C a, In the arithmetic unit 3b, both the unique data are always stored at an interval that can be arbitrarily set in the arithmetic unit 3b, for example, at a sampling period of 5 seconds. Is calculated, and if both unique data are available, a control signal for keeping at least the input device 1 or Z and the output device 4 in an operable state is transmitted to the input device 1 and the output device 4. To supply. The sampling period may of course be other than 5 seconds.
他方、 携帯電話機 KT とコ ンピュータの上記接続が解かれる、 即ち、 接続ケーブル C aか ら前記電話機 KTが抜去され、 そのままであった り 、 異なる電話機が接続される と、 演算装置 3 b では固有デ一夕の論 理積条件が満たされない こ とになる。 この場合、 制御装置 3 a は前記 入力装置 1 と出力装置 4 に、 その動作可能状態を解く 制御信号を出 力して、 当該入力装置 1 と出力装置 4 を、 動作しない状態に切換え る。  On the other hand, if the connection between the mobile phone KT and the computer is broken, that is, if the telephone KT is disconnected from the connection cable C a and remains as it is or a different telephone is connected, the arithmetic unit 3b has a unique connection. This means that the logical condition of the day is not satisfied. In this case, the control device 3a outputs a control signal for resolving the operable state to the input device 1 and the output device 4, and switches the input device 1 and the output device 4 to a non-operable state.
,上記動作は、 図 3 のフ ロ一チャー ト図に示す順序で進む。 ステツ プ S 1 で固有デ一夕 (携帯電話機 KT に固有の番号を示す数値) が当 該電話機 KT からパソコ ンに取込まれ、 記憶装置 2 に記憶される。 ス テツ プ S 2 では、 前記電話機 KTがケーブル C a に接続されていて、 そこか ら固有データがパソコ ンに供給されるか否かが判別され、 接 続されず固有データがバソコ ンに入力されないと、ステッ プ S 3 のパ ソコ ン終了を含む 「パソコ ンロ ッ ク」 モー ド になる。  The above operation proceeds in the order shown in the flowchart of FIG. At step S 1, the unique data (a numerical value indicating a unique number of the mobile phone KT) is taken into the personal computer from the phone KT and stored in the storage device 2. In step S2, it is determined whether or not the telephone KT is connected to the cable C a, from which the unique data is supplied to the personal computer.Then, the unique data is input to the personal computer without being connected. Otherwise, it will be in the “PC lock” mode, including the PC end in step S3.
前記電話機 KT がケーブル C a を介してパソコ ンに接続されている と、 その電話機 K T から 固有コー ドがパソコ ンに供給されるか ら次 のステッ プ S 4 に進む。 ステッ プ S 4では、 先にパソコ ン内に設定さ れた前記電話機 KT の固有データが、 ケ一ブル C a を通して入力され て来るその電話機 KT の固有データ と一致するか否かが判別され、不 —致であれば直ちにステッ プ S 3 のパソコ ン終了を含む「パソ コ ン□ ッ ク」 モー ドに進むが、 一致している場合には、 パソ コ ンの立上げ 状態を維持するステッ プ S 5 に進んでか らステッ プ S 4 に戻 り 、 これ を設定したサンプリ ング周期で繰返す。 If the telephone KT is connected to the personal computer via the cable C a, the unique code is supplied from the telephone KT to the personal computer, and the process proceeds to the next step S4. In step S4, it is determined whether or not the unique data of the telephone set KT previously set in the personal computer matches the unique data of the telephone set KT input through the cable Ca. Unfortunate — If the status is correct, immediately proceed to the “Personal computer” mode including the termination of the personal computer in step S3, but if they match, the computer maintains the startup state of the personal computer. After proceeding to S5, return to step S4, and repeat this at the set sampling cycle.
以上の結果、 上記コ ン ピュータは携帯電話機 KT がケーブル C a等 でそのコ ンピュータ接続されている限り 、 通常のコ ンピュータ と同 様に自 由にそのコ ンピュータを操作し、駆動させる こ とができるが、 携帯電話機 KTがコ ンピュータか ら切 り離される と、少なく とも入力 装置 1 及び Z又は出力装置 4 の動作可能状態が作動不能の状態に切 換え られるか ら、 前記携帯電話機 KT を保持している本人以外の第 三者がこのコ ンピュータ を起動させた り 、 操作する こ とはできなく なる。 仮に、 別の携帯電話機 KT を空いている前記コー ド C a に接続 しても、 コ ンピュータ内に設定されている固有デ一夕 と電話機 KT か らの固有データが一致しないので、 コ ンピュ一夕が作動可能にな る こ とはない。  As a result, as long as the mobile phone KT is connected to the computer with the cable Ca etc., the above computer can operate and drive the computer freely like a normal computer. Yes, but when the mobile phone KT is disconnected from the computer, the operable state of at least the input devices 1 and Z or the output device 4 is switched to the inoperable state, so that the mobile phone KT is retained. A third party other than the person doing this will not be able to start or operate this computer. Even if another mobile phone KT is connected to the vacant code C a, the unique data set in the computer and the unique data from the phone KT do not match. Evening is never operational.
つま り 、本発明セキュ リ ティ システムにおける携帯電話機 KT は、 それが持っ ている固有データを、 パス ヮ一 ドゃキ一ヮー ドなどをキ —とするコ ンピュータのロ ッ ク手段と同様のロ ッ ク手段を構成する こ とになるのである。  In other words, the mobile phone KT in the security system of the present invention uses the unique data possessed by the mobile phone KT in the same manner as a computer locking means using a pass-through key or the like as a key. This constitutes a means of security.
従っ て、 昼食時等の外出時や出張時など、 本人が自分のコ ンビュ —夕か ら離れる とき、 当該本人の携帯電話機 KT を、 当該コ ンビュ一 夕 との接続を解く だけで、 そのコ ンピュータを動作不可能状態に設 定できるので、 そのコ ンピュータ に格納されている様々なデータを 安全裡に保守する こ とが可能になる。 Therefore, when the person goes away from the evening, such as when going out for lunch or on a business trip, the user simply disconnects the mobile phone KT from the person concerned and disconnects from the evening. You can set your computer to an inoperable state, so you can transfer various data stored on that computer. It will be possible to maintain safely.
産業上の利用の可能性  Industrial potential
本発明は以上の通り であるか ら、 至って簡便な手法で自分のコ ン ピュー夕のセキュ リ ティ を強固に保持する こ とが可能にな り 、 有用 性はきわめて高い。  Since the present invention is as described above, the security of one's own computer can be firmly maintained by a very simple method, and its usefulness is extremely high.

Claims

請求の範囲 The scope of the claims
1 入力装 , 記憶装置, 処理装置, 出力装置を有する コ ンピュー 夕の記憶装 に、 そのコ ンピュータに接続される携帯電話機に付与 された固有数値を示すデータを記憶させておき、 前記電話機が前記 コ ンピュー夕 に接続されたとき、 その固有数値データが前記記憶装 idの固有数値データ と論理積条件で満たされるか否かを前記処理装 の演算装 eで判別させ、 前記条件が満たされる ときには前記処理 置の制御 置が前記入力装置又は出力装置を動作状態に保持させ 刖 πέ機の接続が切れて前記論理積条件が満たされないとき、 少 な S と 刖記入力装置又は出力装置を不作動状態に切換える こ とを 特徴とするコ ンピュー夕のセキュ リ ティ システム。  1 A computer having an input device, a storage device, a processing device, and an output device stores data indicating a unique numerical value assigned to a mobile phone connected to the computer in a storage device of the computer. When connected to the computer, the arithmetic unit e of the processing unit determines whether the unique numerical data is satisfied with the unique numerical data of the storage device id by a logical product condition, and when the condition is satisfied. The control unit of the processing unit keeps the input device or the output device in an operation state.When the connection of the ππ machine is disconnected and the AND condition is not satisfied, a small amount of S and the input device or the output device are inactivated. A computer security system characterized by switching to a state.
2 制御装置は、 携帯電話機が接続される とその電話機か らその固 有数値デー夕を演算装置に取込ませ、 予め記憶装置に設定されてい る同一の固有数値デ一夕 と前記取込みデータが適宜ィ ン夕一バルで 理積条件を満足しているか否かを演算装置で演算処理させ、 前記 件を満足している ときは動作状態の保持指令を出力する と共に、 刖記電話機の接続が切れて前記条件が満たされないときは不動作状 態への切換指令を出力するよ う に形成した請求項 1 のコ ンピュータ のセキユ リ ティ システム。  (2) When the mobile phone is connected, the control device loads the unique numerical data from the telephone into the arithmetic unit, and the same unique numerical data set in advance in the storage device and the captured data. The arithmetic unit calculates whether or not the mathematics condition is satisfied at every instant, and outputs the operation state holding command when the above condition is satisfied, and when the telephone connection is 2. The computer security system according to claim 1, wherein a command for switching to a non-operation state is output when the condition is not satisfied due to a disconnection.
PCT/JP2003/014308 2002-11-11 2003-11-11 Computer security system WO2004044714A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003301925A AU2003301925A1 (en) 2002-11-11 2003-11-11 Computer security system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2002326943A JP2004164093A (en) 2002-11-11 2002-11-11 Security system for computer
JP2002-326943 2002-11-11

Publications (1)

Publication Number Publication Date
WO2004044714A1 true WO2004044714A1 (en) 2004-05-27

Family

ID=32310508

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2003/014308 WO2004044714A1 (en) 2002-11-11 2003-11-11 Computer security system

Country Status (3)

Country Link
JP (1) JP2004164093A (en)
AU (1) AU2003301925A1 (en)
WO (1) WO2004044714A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060224882A1 (en) * 2005-03-31 2006-10-05 Microsoft Corporation Method and system for unlocking a computing device
JP4800721B2 (en) * 2005-09-22 2011-10-26 Kddi株式会社 Security protection program, security system, and recording medium
JP2008219469A (en) * 2007-03-05 2008-09-18 Mitsubishi Electric Corp System for preventing secret leakage
JP5423668B2 (en) * 2008-04-23 2014-02-19 日本電気株式会社 Information processing system, information processing apparatus, portable communication device, and user information management method used therefor

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0594225A (en) * 1991-09-30 1993-04-16 Toshiba Corp Personal computer incorporated with security function
JP2001084049A (en) * 1999-09-09 2001-03-30 Canon Inc Computer and security method for computer
JP2001223691A (en) * 2000-02-04 2001-08-17 Sony Corp Information processing system, information processing unit and its method, program storage medium and transmitter
JP2002135372A (en) * 2000-10-20 2002-05-10 Okazaki Toru Personal computer in cooperation with mobile phone
JP2002157050A (en) * 2000-11-17 2002-05-31 Nec System Technologies Ltd Computer automatic recognition system by ic card

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0594225A (en) * 1991-09-30 1993-04-16 Toshiba Corp Personal computer incorporated with security function
JP2001084049A (en) * 1999-09-09 2001-03-30 Canon Inc Computer and security method for computer
JP2001223691A (en) * 2000-02-04 2001-08-17 Sony Corp Information processing system, information processing unit and its method, program storage medium and transmitter
JP2002135372A (en) * 2000-10-20 2002-05-10 Okazaki Toru Personal computer in cooperation with mobile phone
JP2002157050A (en) * 2000-11-17 2002-05-31 Nec System Technologies Ltd Computer automatic recognition system by ic card

Also Published As

Publication number Publication date
AU2003301925A1 (en) 2004-06-03
JP2004164093A (en) 2004-06-10

Similar Documents

Publication Publication Date Title
US5432939A (en) Trusted personal computer system with management control over initial program loading
KR100310093B1 (en) Security method of personal computer using password
US20070030257A1 (en) Locking digital pen
JP5297858B2 (en) Supervisory control system
US8707452B1 (en) Secure data management device
US7174549B2 (en) Computer system and method for storing product keys thereof
JP4876575B2 (en) Thin client system, server device, and terminal device
JP5672313B2 (en) Information processing apparatus and setting information management method
JPH03280119A (en) Tabletop electronic calculator
WO2004044714A1 (en) Computer security system
US9489319B1 (en) Operating time supervisory system
US20070234104A1 (en) Computer platform setup configuration data backup handling method and system
JP3128582U (en) Computer security equipment
JP4591740B2 (en) Software license management method
CN109376511A (en) The method for improving end message safety
JPS5818644B2 (en) Data processing system operation control method
JP2002116834A (en) Method for permitting use of software and system for the same and computer readable recording medium
KR940007812B1 (en) Keyboard locking method for personal computer
JP2012137905A (en) Information processing device, restoration method for setup setting value of bios and program
JP2540422Y2 (en) Telephone with memory card
WO1991019250A1 (en) Information processing device having function of preventing program from being unjustly used
JPH04248606A (en) Start protection system for computer system
JPS62100805A (en) Programmable controller
CN101373405A (en) Control method of computer keyboard lock, keyboard and computer device
CN115801948A (en) Operation method and device

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AU AZ BA BB BR BY BZ CA CN CO CR CU DM DZ EC GD GE GH GM HR ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL RU SC SD SG SL SY TJ TM TN TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION UNDER RULE 69 EPC ( EPO FORM 1205A DATED 26/08/05 )

122 Ep: pct application non-entry in european phase