WO2004084075A1 - 情報アクセス制御方法、アクセス制御プログラム及び外部記録媒体 - Google Patents
情報アクセス制御方法、アクセス制御プログラム及び外部記録媒体 Download PDFInfo
- Publication number
- WO2004084075A1 WO2004084075A1 PCT/JP2003/003216 JP0303216W WO2004084075A1 WO 2004084075 A1 WO2004084075 A1 WO 2004084075A1 JP 0303216 W JP0303216 W JP 0303216W WO 2004084075 A1 WO2004084075 A1 WO 2004084075A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- recording medium
- external recording
- system user
- user information
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Definitions
- the present invention relates to an information access control method for preventing information leakage in a computer system.
- the present invention relates to an information access control system and a program for controlling access to data on a computer system to prevent data leakage to an external recording medium, and an external recording medium used for the same.
- Representative examples of information leaks include unauthorized access via networks and unauthorized copying to external recording media.
- external recording media such as floppy disks and optical disks are widely used as information recording means. Therefore, it is relatively easy to copy and leak information in a computer system using such an external recording medium.
- the easiest way to prevent information leakage is to block access to information in the computer system based on the presence or absence of authentication registered in the external recording medium to which the data is copied or transferred.
- An object of the present invention to provide an information access control that controls access to information in a computer system and prevents data leakage from an external recording medium without hindering the operation of the system as described above.
- An object of the present invention is to provide a method and a program, and an external recording medium used for the method and the program.
- a first mode of the information access control method for achieving the object of the present invention is an information access control method for accessing information data on an information system using an external recording medium, wherein the external recording medium In the information system, the corresponding system user information is registered in advance, and the connection of the external recording medium is required.
- the information system user information is sent to the information system, the information system compares the system user information sent by the connection request with the registered system user information. If the comparison results in a match, the external recording medium is permitted to access information data on the system within a range specified by the system user information.
- the system user information is provided for each of a plurality of users sharing one external recording medium. It is characterized by the range in which information data on the system can be accessed.
- a third aspect of the information access control method for achieving the object of the present invention is an information access control method for information data on an information system, wherein the external recording medium includes an identifier for identifying the external recording medium ' System user information is recorded, and in the information system, the system user information is registered in advance in correspondence with an identifier for specifying the external recording medium, and the external recording medium is specified as a connection request.
- the information system detects whether or not the identifier for specifying the external recording medium is registered, and when the registration of the identifier is detected. Further, the system user information is compared with registered system user information, and when the comparison results in a match, the system user The extent specified by the broadcast, and permits access to the information data on the leading Kigaibu recording medium to the information system.
- the information system is a case in which registration of an identifier for identifying the external recording medium is detected. If the result of comparison between the user information and the registered system user information does not match, only access to information data on the information system is disabled.
- the information system further includes an identifier of the external recording medium registered in the information system. It is characterized by holding connection history information with the information system.
- a program for controlling information access to information data on an information system includes, as a connection request from an external recording medium, system user information, When sent to the system, the information system causes the system user information sent by the connection request to be compared with the registered system user information. In the range specified by (1), the external recording medium is allowed to access information data on the information system.
- the system user information includes information for a plurality of users sharing one external recording medium. For each of them, a range in which information data on the information system can be accessed is specified.
- An external recording medium for controlling access to information data on an information system which achieves the object of the present invention has, as a first aspect, system user information recorded thereon, and the system user information is When sent to the information system as a connection request for an external recording medium, the information system includes: system user information sent by the connection request; and system user information registered in the information system in advance. Are compared, and if the result of the comparison is a match, access to information data on the information system is permitted within a range specified by the system user information.
- the system user information is one type.
- Share external storage media For each of a plurality of users, a range in which information data on the information system can be accessed is specified.
- FIG. 1 is a configuration diagram of an embodiment to which the information access control method of the present invention is applied.
- FIG. 2 is a diagram schematically illustrating an operation sequence in the information access control method of the present invention in the embodiment of FIG.
- FIG. 3 is a diagram showing an example of system user information recorded on the external recording medium 20.
- FIG. 4 is a diagram showing a flow of processing using the medium logon information c in FIG.
- FIG. 5 is a diagram showing another example of system user information recorded on an external recording medium.
- FIG. 6 is a diagram showing the relationship between each employee and accessible data based on the system user information in FIG.
- FIG. 7 is an operation example of the system n using the system user information of FIG.
- FIG. 8 is a diagram for explaining an embodiment using the history left in the computer system.
- FIG. 9 is a diagram for explaining another embodiment using the history left in the computer system.
- FIG. 10 is a diagram illustrating information recorded in a computer system, showing an application example of the present invention.
- FIG. 11 is a diagram illustrating a process based on the recording information of FIG. BEST MODE FOR CARRYING OUT THE INVENTION
- FIG. 1 is a diagram showing an embodiment of an information processing system to which an information access control method according to the present invention is applied.
- a configuration example of an information processing system that can prevent an act of illegally leaking information data recorded on a hard disk drive (HDD), that is, data on the information system, for example, a fixed storage device 10 in the computer system 1 It is.
- HDD hard disk drive
- a storage device 2 is connected to a computer system 1.
- the storage device 2 controls recording or reading of data on the external recording medium 20 in accordance with the physical characteristics of the portable external recording medium 20.
- the storage device 2 is physically independent of the computer system 1 and may be externally connected to the computer system 1 by wire or wirelessly. It may be integrated so that the connection between them can be controlled in a signal by a specific command.
- the external recording medium 20 includes an identifier (medium ID) 22 that is attached to the external recording medium 20 at the time of manufacture or thereafter and specifies the external recording medium 20 itself, and a system administrator using the external recording medium 20 by a system administrator.
- Information 23 is given and recorded at a predetermined position on the medium.
- the system administrator records the identifier 22 and the system user information 23 in the authentication list 12 of the computer system 1 in the same manner.
- the external recording medium 20 may be removable from the storage device 2 such as a DVD, CD, MO disk, or flexible disk.
- the control unit According to 21, the identifier 22 and the system user information 23 recorded on the external recording medium 20 are read and transmitted to the computer system 1.
- the computer system 1 has an authentication list 12. As described above, in this authentication list 12, a unique identifier 22 assigned to the external recording medium 20 accessible by the administrator and the system user information 23 are registered in advance. .
- the authentication module 13 is realized by a software program resident in the computer system 1 including a device driver. It is provided by communication or a storage medium, and is installed in the computer system 1.
- the identifier 22 registered in the external recording medium 20 is compared with the identifier registered in the authentication list 12 to determine whether or not they match. As a result, if they match, the external recording medium 20 is Properly authenticated.
- the range according to the contents of the system user information 23 becomes apparent from the embodiment described later.
- FIG. 2 shows the information access control of the present invention in the embodiment of FIG.
- FIG. 4 is a diagram for explaining an outline of a processing sequence by a method.
- the authentication module 13 of the computer system 1 periodically inquires the storage device 2 about whether or not the external storage medium 20 is inserted. The process is performed until there is a notification that 0 has been inserted (step S 1).
- a notification that the external recording medium is present is sent from the storage device 2 to the authentication module 13 (step S 2).
- the authentication module 13 requests the storage device 2 to transmit the identifier 22 registered in the external recording medium 20 and the system user information 23 (step S 3 ).
- the storage device 2 reads the identifier 22 and the system user information 23 from the external recording medium 20 by the control unit 1 and notifies the authentication module 13 (step S4).
- the authentication module 13 sends the identifier of the authentication list of the computer system 1 registered by the administrator in advance] .2 and the identifier attached to the external recording medium 20 transmitted from the storage device 2 side. 22 is compared with (step S5).
- the identifier 22 identifying the external recording medium 20 itself at the time of manufacture or thereafter is used. In comparison with, if this is not registered in the authentication list 2, all access to the external storage medium 20 is denied.
- the authentication OK is notified to the OS (operating system) 14 of the computer system 1 ( Step S5, Y).
- step S6 the access permission is notified from the storage device 14 to the storage device 2 via the authentication module 13 (step S6). Thereafter, data access is performed from the storage device 2 through the OS 14 if necessary (step S7).
- the data access can only read information data within a range according to the contents of the system user information 23 described above.
- the storage device 2 can receive the data transmission from the computer system 1 (step S8) and copy the data accessed to the authenticated external recording medium 20.
- the system user information 23 connectable to the computer system 1 is recorded on the external recording medium 20.
- the system user information 23 is provided in an area of the external recording medium 20 that cannot be accessed by ordinary commands. For this reason, it is generally difficult to refer to or falsify.
- FIG. 3 shows an example of the system user information 23 recorded on the external recording medium 20.
- employee name a, employee number b, and medium logon information c are provided as system user information 23.
- Media log The ON information c is a password input by the user when connecting the external recording medium to the computer system 1.
- This medium logon information c is different for each user, so that the same external recording medium can be shared by multiple users. It is necessary to register such media port login information in advance by a system administrator.
- different media logon information c is registered on the same external recording medium 20 so as to be sharable by employees A, B, and so on, corresponding to each employee.
- FIG. 4 shows a flow of a process using the medium logon information c.
- the process of transmitting the identifier from the storage device 2 to the computer system 1 proceeds according to the flow of FIG. Then, it is determined whether or not the identifier matches the external recording medium registered in the authentication list 12 (step S21). If the user connects an unregistered external recording medium to the storage device 2, the identifier on the medium does not match and access to information is not established (steps S21, N).
- step S21, Y if it is determined that the identifier is registered in the authentication list 12 (step S21, Y), the computer system 1 or the storage device 2 transmits the external recording medium to the user by the computer. Prompts for password required to connect to system 1.
- step S22, Y If the user enters a valid password, that is, the medium logon information c, it matches the medium logon information c recorded on the external recording medium (step S22, Y). Access power S is allowed (step S2 3). As a result, the user can copy necessary information of the computer system to the external recording medium 20. it can.
- step S224 access to the information is denied (step S224), and the information outside Copying to recording media is not possible.
- Another embodiment to be described is to limit the information to be copied on the system in order to further increase the leakage prevention strength. That is, the type of information on the computer system 1 that can be stored in a specific external recording medium 20 is limited.
- an area that specifies accessible data on the external recording medium 20 as shown in Fig. 5 Is provided. That is, in this example, accessible data is described in addition to the name, employee number, and medium logon information shown in FIG.
- the system administrator needs to register at least the external information on the external recording medium 20 before copying the information from the system. It is not necessary to register in both the external storage medium 20 and the computer system 1 side.
- Figure 6 shows the relationship between each employee and accessible data based on the information in Figure 5.
- the employee A can access (copy to the external recording medium 20) an information group (for example, personnel data) that can be classified by Level A and a specific file File0123.dat.
- the employee B is allowed to access the information group that can be classified by Level B (for example, the entire accounting data)
- Employee C is allowed to access the file Filee0064.data, which is a part of the entire accounting data.
- the accessible data may be an individual file name as in this example, or may be a data group classified by hierarchy.
- the accessible data is stored on the external recording medium 20
- the data is encrypted with medium logon information or the like known only to the applicable authentic user.
- data copied by employees A, B, and C is stored on the external recording medium 20, but it is possible to control that only the data permitted to be accessed can be opened (opened). .
- FIG. 7 shows the flow until access is established based on the information shown in FIG.
- the processing of steps S20 to S22 is the same as the processing shown in FIG.
- step S22 if the password entered by the user matches the media logon information (step S22, Y), the information accessed will be the registered access shown in FIG. It is determined whether the data is the target data (step S25). If the data is accessible, the access is permitted (step S23); otherwise, the access is denied (step S24).
- the following application example can be added to the information access control method having the features of the present invention. As a result, it is possible to further suppress unauthorized access to information.
- FIG. 8 is a diagram showing an example registered and saved in the authentication list 12 of the computer system 1.
- connection history of each external recording medium 20 can be referred to.
- connection request for an external recording medium having the identifier Disk0004 which is considered to be a duplicate recording medium (request time: 2000.03.02 15:25)
- connection refusal and connection of the already connected original external recording medium are shut off (see results section).
- the file name File0087.dat remains as a record of the system information copy operation.
- FIG. 9 shows another embodiment, in which the history of user login status is further left in the authentication list 12 of the computer system 1.
- employee A uses an external recording medium 20 whose identifier is DiskOOOl.
- the employee A has been registered as a user of the external recording medium 20 of the identifier DiskOOOl by the system administrator in advance, and the user password, that is, the medium logon information. (10:28), the information on the system can be accessed, and it is recorded that the file File0087.dat has been copied to the external recording medium 20.
- the employee D since the employee D is not registered as a user of the external recording medium 20 with the identifier DiskOOOl, the password entered by the user does not match the medium logon information, and therefore, the external recording medium 20 is used. The connection to the information data held in the computer system 1 is refused, and the information cannot be copied, indicating that the information was prevented from being leaked.
- the external recording medium 20 is currently connected to the computer system 1 together with the identifier I of the external recording medium registered in the authentication list 12, that is, Any of the external recording media 20 is permitted to access data stored in the computer system 1, and sets a flag ⁇ ⁇ indicating whether or not the data is already connected.
- DiskOOOl is used as an identifier. It can be seen that the external recording medium 20 having the Disk0004 is already inserted into the storage device 2 and connected to the computer system 1 (the connection flag ⁇ is ON). .
- connection flag D By checking the connection flag D, it is possible to detect a duplicate connection request from an external recording medium having the same identifier.
- FIG. 11 shows a processing flow when the external recording medium 20 having the identifier Disk0004 is copied.
- the identifier of the external recording medium connected first is identified as Disk sk0004a
- the duplicated external recording medium that has issued the connection request is identified as the identifier Di sk0004b.
- step S 10 when a notification that an external recording medium is present is received from the storage device 2 (see step S2 in FIG. 11), that is, when a connection request for the external recording medium (identifier Disk0004b) is received (step S 10), the authentication module 3 of the computer system 1 receives the identifier Disk0004b (step S1]).
- the authentication module 3 authenticates that the identifier Disk0004 has been registered in the authentication list 2, and at the same time, refers to the connection flag ⁇ (step S12).
- connection flag ⁇ is not set to connection (step S12, OK)
- the connection flag ⁇ is changed from FF to ON (step S13), and the information of the computer system 1 is changed. Allow access to (Step SI4).
- the OS notifies the storage device 2 of the access permission (FIG. 2, step S6).
- step S12 if the connection flag Di corresponding to the identifier Disk0004 has already been set to ON (step S12, NO), the computer system of the copied external recording medium (Diskskb) Deny access to the information in step 1 (step S15, Fig. 11: step S5, N).
- the authentication module 3 of the computer system] blocks the access of the computer to the already connected external recording medium (Disk0004a) (step S16).
- the display function unit of the computer system 1 or the storage device 2 appropriately displays, "Because the access request by the duplicate external recording medium was received, the computer system 1 for the already connected external recording medium (Disk0004a) was It is also possible to display a message indicating that access has been blocked (step S17).
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003221418A AU2003221418A1 (en) | 2003-03-18 | 2003-03-18 | Information access control method, access control program, and external recording medium |
JP2004569557A JPWO2004084075A1 (ja) | 2003-03-18 | 2003-03-18 | 情報アクセス制御方法、アクセス制御プログラム及び外部記録媒体 |
CNB038238047A CN100347687C (zh) | 2003-03-18 | 2003-03-18 | 信息访问控制方法、访问控制程序和外部记录介质 |
PCT/JP2003/003216 WO2004084075A1 (ja) | 2003-03-18 | 2003-03-18 | 情報アクセス制御方法、アクセス制御プログラム及び外部記録媒体 |
US11/085,394 US20050162992A1 (en) | 2003-03-18 | 2005-03-21 | Information access control method, access control program, and external recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2003/003216 WO2004084075A1 (ja) | 2003-03-18 | 2003-03-18 | 情報アクセス制御方法、アクセス制御プログラム及び外部記録媒体 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/085,394 Continuation US20050162992A1 (en) | 2003-03-18 | 2005-03-21 | Information access control method, access control program, and external recording medium |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2004084075A1 true WO2004084075A1 (ja) | 2004-09-30 |
WO2004084075A9 WO2004084075A9 (ja) | 2005-02-10 |
Family
ID=33018135
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/003216 WO2004084075A1 (ja) | 2003-03-18 | 2003-03-18 | 情報アクセス制御方法、アクセス制御プログラム及び外部記録媒体 |
Country Status (4)
Country | Link |
---|---|
JP (1) | JPWO2004084075A1 (ja) |
CN (1) | CN100347687C (ja) |
AU (1) | AU2003221418A1 (ja) |
WO (1) | WO2004084075A1 (ja) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007501471A (ja) * | 2003-05-14 | 2007-01-25 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | データ媒体へのアクセスの制御 |
JP2007148762A (ja) * | 2005-11-28 | 2007-06-14 | Apro Technology Co Ltd | 外部記憶装置 |
JP2009193495A (ja) * | 2008-02-18 | 2009-08-27 | Hitachi Software Eng Co Ltd | データ持出し制御システム |
JP2011040109A (ja) * | 2004-07-30 | 2011-02-24 | Fujitsu Social Science Laboratory Ltd | コンピュータおよび簡易媒体使用プログラム |
JP2011103047A (ja) * | 2009-11-10 | 2011-05-26 | Toshiba Corp | 電子機器及びアクセス制御方法 |
EP3940470A4 (en) * | 2019-03-14 | 2022-11-23 | Omron Corporation | CONTROL SYSTEM, CONTROL METHOD, AND CONTROL DEVICE |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4562759B2 (ja) * | 2007-09-03 | 2010-10-13 | 京楽産業.株式会社 | アクセス制御装置、アクセス制御方法およびアクセス制御プログラム |
CN102467625B (zh) * | 2010-11-09 | 2015-02-11 | 深圳大学 | 一种数据保护方法、装置及系统 |
US8990586B2 (en) * | 2011-10-26 | 2015-03-24 | Alcatel Lucent | Method for selectively exposing subscriber data |
CN105653976A (zh) * | 2015-12-28 | 2016-06-08 | 湖南蚁坊软件有限公司 | 一种用于用户授权的通用权限模型的实现方法 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61226848A (ja) * | 1985-03-30 | 1986-10-08 | Nec Corp | アクセス権判定方式 |
JPH0275038A (ja) * | 1988-09-12 | 1990-03-14 | Hitachi Ltd | 情報提示装置 |
JPH02158851A (ja) * | 1988-12-12 | 1990-06-19 | Fujitsu Ltd | ファイルアクセス制御方式 |
JPH02231660A (ja) * | 1989-03-06 | 1990-09-13 | Nec Software Ltd | ファイル利用者管理装置 |
JPH06236310A (ja) * | 1993-02-09 | 1994-08-23 | Hitachi Ltd | 出力データ保護方法 |
JPH07325712A (ja) * | 1994-05-31 | 1995-12-12 | Oki Electric Ind Co Ltd | プログラム不正コピー防止装置 |
JPH09134330A (ja) * | 1995-11-07 | 1997-05-20 | Fujitsu Ltd | セキュリティ保護システム |
JPH11219320A (ja) * | 1998-02-03 | 1999-08-10 | Toshiba Corp | データ記録再生システム |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5696898A (en) * | 1995-06-06 | 1997-12-09 | Lucent Technologies Inc. | System and method for database access control |
US5857021A (en) * | 1995-11-07 | 1999-01-05 | Fujitsu Ltd. | Security system for protecting information stored in portable storage media |
-
2003
- 2003-03-18 JP JP2004569557A patent/JPWO2004084075A1/ja active Pending
- 2003-03-18 CN CNB038238047A patent/CN100347687C/zh not_active Expired - Fee Related
- 2003-03-18 AU AU2003221418A patent/AU2003221418A1/en not_active Abandoned
- 2003-03-18 WO PCT/JP2003/003216 patent/WO2004084075A1/ja active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61226848A (ja) * | 1985-03-30 | 1986-10-08 | Nec Corp | アクセス権判定方式 |
JPH0275038A (ja) * | 1988-09-12 | 1990-03-14 | Hitachi Ltd | 情報提示装置 |
JPH02158851A (ja) * | 1988-12-12 | 1990-06-19 | Fujitsu Ltd | ファイルアクセス制御方式 |
JPH02231660A (ja) * | 1989-03-06 | 1990-09-13 | Nec Software Ltd | ファイル利用者管理装置 |
JPH06236310A (ja) * | 1993-02-09 | 1994-08-23 | Hitachi Ltd | 出力データ保護方法 |
JPH07325712A (ja) * | 1994-05-31 | 1995-12-12 | Oki Electric Ind Co Ltd | プログラム不正コピー防止装置 |
JPH09134330A (ja) * | 1995-11-07 | 1997-05-20 | Fujitsu Ltd | セキュリティ保護システム |
JPH11219320A (ja) * | 1998-02-03 | 1999-08-10 | Toshiba Corp | データ記録再生システム |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007501471A (ja) * | 2003-05-14 | 2007-01-25 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | データ媒体へのアクセスの制御 |
JP2011040109A (ja) * | 2004-07-30 | 2011-02-24 | Fujitsu Social Science Laboratory Ltd | コンピュータおよび簡易媒体使用プログラム |
JP2007148762A (ja) * | 2005-11-28 | 2007-06-14 | Apro Technology Co Ltd | 外部記憶装置 |
JP2009193495A (ja) * | 2008-02-18 | 2009-08-27 | Hitachi Software Eng Co Ltd | データ持出し制御システム |
JP2011103047A (ja) * | 2009-11-10 | 2011-05-26 | Toshiba Corp | 電子機器及びアクセス制御方法 |
EP3940470A4 (en) * | 2019-03-14 | 2022-11-23 | Omron Corporation | CONTROL SYSTEM, CONTROL METHOD, AND CONTROL DEVICE |
Also Published As
Publication number | Publication date |
---|---|
CN100347687C (zh) | 2007-11-07 |
AU2003221418A1 (en) | 2004-10-11 |
CN1688983A (zh) | 2005-10-26 |
JPWO2004084075A1 (ja) | 2006-06-22 |
WO2004084075A9 (ja) | 2005-02-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100407174C (zh) | 数据保护设备及数据保护方法 | |
US8402269B2 (en) | System and method for controlling exit of saved data from security zone | |
EP1946238B1 (en) | Operating system independent data management | |
CN101572660B (zh) | 一种防止数据泄密的综合控制方法 | |
WO2010061801A1 (ja) | 機密ファイルを保護するためのクライアント・コンピュータ、及びそのサーバ・コンピュータ、並びにその方法及びコンピュータ・プログラム | |
EP3074907B1 (en) | Controlled storage device access | |
US20050033970A1 (en) | System and method for securing access to memory modules | |
JP2000259567A (ja) | アクセス制御装置、アクセス制御方法および記憶媒体 | |
JP2002351661A (ja) | セキュア・ソリューションを体系化する方法及びシステム | |
KR20070039528A (ko) | 데이터 관리 방법, 그 프로그램, 및 프로그램의 기록 매체 | |
US20050162992A1 (en) | Information access control method, access control program, and external recording medium | |
WO2004084075A1 (ja) | 情報アクセス制御方法、アクセス制御プログラム及び外部記録媒体 | |
CN101094097A (zh) | 一种硬件访问控制系统和方法 | |
US20030233440A1 (en) | Network system including host server and method of setting up host server | |
JP4044126B1 (ja) | 情報漏洩抑止装置、情報漏洩抑止プログラム、情報漏洩抑止記録媒体、及び情報漏洩抑止システム | |
KR100975133B1 (ko) | 보조기억매체의 보안 관리 시스템 및 이를 이용한 보안관리 방법 | |
CN101324913B (zh) | 计算机文件保护方法和装置 | |
JPH10260939A (ja) | コンピュータネットワークのクライアントマシン認証方法,クライアントマシン,ホストマシン及びコンピュータシステム | |
EP1684161B1 (en) | Storage system and computer system | |
US8424081B2 (en) | Disk unit, magnetic disk unit and information storage unit | |
US20030041260A1 (en) | Security protection system for identifying a user who uses an electronic device | |
JP2005258606A (ja) | 情報漏洩監査機能付きネットワークシステム | |
JP3698693B2 (ja) | アクセス制御装置及びそのコンピュータプログラム | |
KR20050049973A (ko) | 이동식 저장 장치의 저장 제어 방법 및 이를 이용한정보단말 | |
JP2003323344A (ja) | アクセス制御システム、アクセス制御方法及びアクセス制御プログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
COP | Corrected version of pamphlet |
Free format text: PAGE 1, DESCRIPTION, REPLACED BY CORRECT PAGE 1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004569557 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11085394 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20038238047 Country of ref document: CN |
|
122 | Ep: pct application non-entry in european phase |