WO2013073260A1 - 記憶装置 - Google Patents
記憶装置 Download PDFInfo
- Publication number
- WO2013073260A1 WO2013073260A1 PCT/JP2012/072303 JP2012072303W WO2013073260A1 WO 2013073260 A1 WO2013073260 A1 WO 2013073260A1 JP 2012072303 W JP2012072303 W JP 2012072303W WO 2013073260 A1 WO2013073260 A1 WO 2013073260A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- data
- storage device
- computer
- authenticated
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Definitions
- the present invention relates to a storage device, and more specifically, relates to information protection in a storage device that can be started and communicated when connected to a computer.
- a storage device equipped with a USB interface for connecting to a computer such as a USB (flash) memory, a USB-connected portable HDD or the like is small and portable, so it is highly likely to be lost or stolen.
- a computer such as a USB (flash) memory, a USB-connected portable HDD or the like
- flash flash
- HDD USB-connected portable HDD
- a password is input when information is written to a storage device such as a USB memory, and the information cannot be read from the storage device unless the password is input.
- an information storage device includes a reader / writer (R / W) that receives an ID from an RFID card and a large-capacity storage. Based on the received ID, it is disclosed that an area accessible from a terminal of a large-capacity storage is changed, or access to the R / W from the terminal is blocked.
- R / W reader / writer
- Patent Document 2 when it is detected that the storage device is in an isolated state separated from the information processing device by a preset distance or more. Further, it is disclosed that access to a part or all of data recorded in the storage device is prohibited, or that data recorded in the storage device is encrypted.
- Patent Document 1 does not consider data protection when an ID cannot be received from an RFID card, and does not consider data encryption at all.
- an object of the present invention is to perform appropriate and efficient information protection in a storage device that can be started and communicated when connected to a computer while solving or reducing these problems of the prior art.
- the present invention provides a storage device that can be activated and communicated when connected to a computer.
- the storage device receives an interface that controls communication with a computer, a data storage unit that stores data received from the computer via the interface, and a wireless signal including ID information at a predetermined timing, and the received ID
- a wireless signal processing unit that authenticates information, encrypts data using the authenticated ID information as a key, sends the encrypted data to the data storage unit, and the wireless signal processing unit is authenticated within a predetermined time.
- a control unit that disables communication with a computer at an interface when a wireless signal including information is not received.
- the received ID information is authenticated and the data is encrypted using the authenticated ID information as a key, it is possible to save the trouble of inputting a password when the data is encrypted.
- a wireless signal including ID information authenticated within a predetermined time is not received, communication with a computer is disabled, so that the storage device is lost or the user is in use. Even in the case where the user is away from the computer, the data in the storage device can be protected.
- data can be protected by a storage device alone without the intervention of a computer and software executed therein.
- control unit when receiving a data read request from a computer while the radio signal processing unit is receiving a radio signal including authenticated ID information within a predetermined time, issues a read request.
- Corresponding encrypted data is read from the data storage unit, the encrypted data is decrypted using the authenticated ID information as a key, and the decrypted data is sent to the computer via the interface.
- data is decrypted using the authenticated ID information as a key not only in data encryption but also in the decryption, it is possible to save the trouble of inputting a password when reading data. At the same time, it is possible to further promote and strengthen data protection.
- the storage device further includes an ID information storage unit for storing the ID information and an authentication switch for the ID information, and the control unit is wireless when the authentication switch is on.
- the signal processing unit is instructed to store the received ID information as registered ID information in the ID information storage unit.
- a storage device that functions only with the new registration ID information by storing new ID information as new registration ID information in the ID information storage unit according to the user's intention. It becomes possible to use as. As a result, the storage device can be reused (repeatedly used) while maintaining the data protection function.
- the wireless signal processing unit determines whether or not the received ID information matches the registered ID information stored in the ID information storage unit, except when the authentication switch is turned on. Authentication is performed by judging.
- authentication of ID information received in a storage device is automatically performed by comparison with registered ID information, so that a key for encryption and the use thereof are used without the intervention of a computer. It is possible to manage authentication.
- the ID information includes a first ID number unique to the medium carrying the ID information and a second ID number associated with the first ID number.
- One or both of the first ID number and the second ID number in the authenticated ID information are used as a key for encryption or decryption.
- either or both of a first ID number unique to a medium carrying ID information and a second ID number associated with the first ID number are encrypted or decrypted.
- a medium carrying ID information to be communicated can be specified (limited) by an ID number unique to the medium, data protection can be further strengthened. Become.
- the wireless signal processing unit includes an RFID reader / writer (R / W), and the ID information is carried on the medium as an RFID tag that can communicate with the R / W.
- FIG. 1 is a diagram showing a configuration example of a storage device of the present invention and its communication environment.
- a communication environment is configured by a computer 10, a USB memory 20, and a non-contact (wireless) ID card 30.
- the computer 10 is not limited to the notebook type of FIG. 1, and a form such as a desktop type, a tablet type, or a server can be arbitrarily selected.
- the computer 10 may be connected to a network or may be a stand-alone computer.
- the storage device is not limited to the USB memory 20 shown in FIG. 1, and may be any storage device that can basically be started and communicated when connected to a computer.
- the storage device may include an interface other than the USB interface.
- the USB memory 20 may be a USB-connected HDD or the like instead of the semiconductor memory (flash memory) type of FIG.
- the USB memory 20 is activated by inserting a USB interface (terminal) 22 into the USB interface 12 of the computer 10 from the direction of arrow A, and can communicate with the computer 10.
- the USB memory 20 further performs wireless communication (B) with the ID card 30.
- the ID card 30 includes a circuit (IC, IC tag) for wireless communication with the USB memory 20, an antenna (coil), and a memory for storing ID information.
- the ID card 30 is not limited to the card (flat plate) type shown in FIG. 1, and an arbitrary form such as a disk type, a pen type, or a name tag type can be selected.
- the ID information includes a first ID number unique to the ID card 30 (for example, a product number composed of a plurality of digits) and a second ID number accompanying the first ID number (for example, a plurality of alphanumeric characters). )
- the ID information stored in the ID card 30 and the registration ID information for authentication (described later) stored in the storage device are updated at regular intervals (same other It is desirable to change the ID information.
- FIG. 2 is a block diagram showing a configuration example of the storage device of the present invention.
- the control unit 210 includes a processor (CPU), a register, a memory, and the like, and performs various controls described later.
- the radio signal processing unit 220 receives a radio signal including ID information at every predetermined timing, and authenticates the received ID information.
- the ID information storage unit 230 stores ID information.
- the ID information storage unit 230 may be built in the control unit 210 or may also be used as a memory in the control unit 210.
- the interface (I / F) 240 controls communication (input / output) with a computer.
- the data storage unit 250 stores data received from the computer via the interface (I / F) 240.
- the data storage unit 250 includes a flash memory, an HDD, or the like.
- the authentication switch (SW) 260 is a switch that is turned on by the user when the ID information is stored (registered) in the ID information storage unit 230 newly or newly.
- the authentication switch (SW) 260 is formed of a button type or slide type switch whose position changes depending on on / off. The embodiment can be arbitrarily selected.
- the ON signal is not output unless the authentication SW 260 is pressed for a certain time (for example, a few seconds). It is desirable to do.
- a small light-emitting element such as an LED may be turned on or blinked to visually notify the user of the start and completion of registration (update) of the new ID information.
- a sound such as a beep sound may be generated to audibly notify the user of the start and completion of registration (update) of new ID information.
- FIG. 3 is a diagram showing details of a configuration example of the storage device of the present invention and an example of a signal path. The operation of each element constituting the present invention will be mainly described with reference to FIG.
- the radio signal processing unit 220 includes an R / W control unit 221, a timer 222, and an antenna 223.
- the R / W control unit 221 includes, for example, an RFID reader / writer (R / W).
- RFID R / W an ID card containing an IC (ID) tag for RFID is used.
- the RFID R / W sends a radio signal, which is an electromagnetic wave, to the ID card via the antenna 223, that is, polls, activates the ID card containing the RFID IC tag, and is stored in the memory of the ID card.
- ID information is transmitted as a radio signal (electromagnetic wave).
- the R / W control unit 221 receives a radio signal including ID information from the ID card.
- the timer 222 measures the time from the start of polling. The time measured by the timer 222 is used for ID information authentication and control for data protection, which will be described later.
- the R / W control unit 221 authenticates the received ID information and stores it in the authenticated ID information storage unit 230. The control of polling and ID information authentication will be described later.
- the control unit 210 includes an encryption / decryption unit 211, a memory control unit 212, and an I / F and authentication control unit 213.
- the encryption / decryption unit 211 encrypts data sent from the computer via the I / F 240 using the authenticated ID information as a key, and the encrypted data is sent to the data storage unit 250 via the memory control unit 212. Send to.
- the encryption / decryption unit 211 includes a first ID number (for example, a product number composed of a plurality of digits) unique to the ID card 30 and a first ID number associated with the first ID number.
- One or both of two ID numbers are used as a key for encryption or decryption.
- the memory control unit 212 is a general memory controller such as a control for writing data to the data storage unit 250 and reading data from the data storage unit 250, and address control for writing and reading in the data storage unit 250. It has a function.
- the I / F and authentication control unit 213 When the I / F and authentication control unit 213 receives a signal indicating that a radio signal including ID information authenticated within a predetermined time is received from the R / W control unit 221, the I / F 240 When a data read request is received from the computer via the, the memory control unit 212 is instructed to read data corresponding to the read request.
- the predetermined time said here is preset, for example, is 10 seconds. Whether or not the predetermined time has been reached is determined by the R / W control unit 221 based on the elapsed time after the start of polling measured by the timer 222.
- the memory control unit 212 reads the encrypted data corresponding to the read request from the data storage unit and sends it to the encryption / decryption unit 211.
- the encryption / decryption unit 211 decrypts the transmitted encrypted data using the authenticated ID information as a key, and sends the decrypted data to the computer via the I / F 240
- the I / F and authentication control unit 213 When the I / F and authentication control unit 213 further receives a signal from the R / W control unit 221 indicating that the wireless signal including the authenticated ID information is not received within a predetermined time, the I / F 240 Disable communication with computers in The predetermined time said here is preset, for example, is 10 seconds.
- the method of disabling communication with the computer is, for example, a state where the impedance of the data line is set to high (Hi-Z) or low (Low-Z) in the I / F 240 and is logically disconnected from the computer (data transmission / reception disabled) State). At this time, the transaction being transferred is executed to the end, and transmission / reception for at least one packet is completed.
- the storage device 20 is activated again. That is, for example, in the USB memory 20 illustrated in FIG. 1, the USB memory (terminal) 22 of the computer 10 is once disconnected and then reinserted. There is a need.
- the I / F and authentication control unit 213 further receives the signal indicating that the ID information authentication switch (SW) 260 is turned on, and uses the ID information received by the R / W control unit 221 as registered ID information. Instructing storage in the ID information storage unit 230.
- the newly stored registration ID information serves as a reference for authentication judgment in the R / W control unit 221. That is, authentication is performed by determining whether or not the registration ID information matches the registration ID information, and encryption / decryption is performed. Used as a key for encryption / decryption in the unit 211. Thereby, even if the ID card is lost or the like, the use of the storage device 20 can be continued using the ID information stored in the new ID card.
- FIG. 4 is a diagram showing a flow of polling and authentication processing between a storage device (Memory) and an ID card (ID Card). Note that the polling and authentication control in FIG. 4 is actually executed by the wireless signal processing unit 220 (R / W control unit 221) in the storage device as described above.
- FIG. 4A shows a case where the ID information is successfully authenticated
- FIG. 4B shows an example where the authentication fails.
- the storage device is activated (Power) On), and polling is started at a predetermined timing (P1).
- P1 a predetermined timing
- the ID card When the ID card is in a state where it can communicate with the storage device, it returns Ack and simultaneously transmits ID information (A1).
- the storage device determines whether or not the received ID information matches the registered ID information. If the ID information matches and the authentication is OK, Valid Flag is output (F1). Thereafter, the same operation is repeated for each polling. Now, it is assumed that, in the n-th polling (Pn), Ack does not return and ID information cannot be received (An).
- the storage device fails to authenticate the ID information and outputs InvalidInFlag (Fn). In FIG. 4A, this authentication failure is repeated twice.
- the Valid Flag output is maintained and the authentication of ID information is continued.
- This predetermined time ⁇ T1 is, for example, 10 seconds as described above.
- a signal indicating the state that is, a signal indicating that a wireless signal including ID information authenticated within the predetermined time is received is R /
- the data is sent from the W control unit 221 to the I / F and authentication control unit 213.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
Description
12、22 USBインターフェイス(I/F)
20 記憶装置(USBメモリ)
270 通信経路(バス)
Claims (7)
- コンピュータに接続されると起動して通信可能となる記憶装置であって、
前記コンピュータとの通信を制御するインターフェイスと、
前記インターフェイスを介して前記コンピュータから受信したデータを保管するデータ記憶部と、
ID情報を含む無線信号を所定のタイミング毎に受信し、受信したID情報を認証する無線信号処理部と、
認証されたID情報をキーとして前記データを暗号化し、当該暗号化したデータを前記データ記憶部に送り、さらに、前記無線信号処理部が所定時間内に前記認証されたID情報を含む無線信号を受信しない場合、前記インターフェイスにおける前記コンピュータとの通信を不能にする制御部と、
を備える記憶装置。 - 前記制御部は、前記無線信号処理部が所定時間内に前記認証されたID情報を含む無線信号を受信している間に、前記コンピュータからデータ読み出し要求があった場合、当該読み出し要求に対応する暗号化されたデータを前記データ記憶部から読み出して、当該暗号化されたデータを前記認証されたID情報をキーとして復号化して、当該復号されたデータを前記インターフェイスを介して前記コンピュータに送る、請求項1の記憶装置。
- 前記ID情報を保管するためのID情報記憶部と、
前記ID情報の認証スイッチと、を更に備え、
前記制御部は、前記認証スイッチがオンになっている場合に、前記無線信号処理部に対して受信したID情報を登録ID情報として前記ID情報記憶部に保管することを指示する、請求項1の記憶装置。 - 前記無線信号処理部は、前記認証スイッチがオンになっている場合を除いて、受信したID情報が前記ID情報記憶部に保管されている登録ID情報に一致するか否かを判定することにより前記認証をおこなう、請求項3の記憶装置。
- 前記ID情報には、当該ID情報を担持する媒体固有の第1のID番号と、当該第1のID番号に付随する第2のID番号とが含まれ、
前記制御部は、認証されたID情報中の前記第1のID番号および前記第2のID番号のいずれか一方あるいは双方を前記キーとして用いる、請求項1または2の記憶装置。 - 前記無線信号処理部はRFIDのリーダ/ライタ(R/W)を含み、
前記ID情報は、前記R/Wと通信可能なRFIDタグとして前記媒体に担持される、請求項5の記憶装置。 - 前記インターフェイスはUSBインターフェイスからなり、前記データ記憶部は、半導体メモリおよび磁気メモリの少なくとも1つを含む、請求項1~6のいずれか1項の記憶装置。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201280056703.5A CN103946860B (zh) | 2011-11-19 | 2012-09-03 | 存储装置 |
JP2013544158A JP6029592B2 (ja) | 2011-11-19 | 2012-09-03 | 記憶装置 |
DE112012004804.0T DE112012004804T5 (de) | 2011-11-19 | 2012-09-03 | Speichereinheit |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011-253368 | 2011-11-19 | ||
JP2011253368 | 2011-11-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013073260A1 true WO2013073260A1 (ja) | 2013-05-23 |
Family
ID=48428104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2012/072303 WO2013073260A1 (ja) | 2011-11-19 | 2012-09-03 | 記憶装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US8909944B2 (ja) |
JP (1) | JP6029592B2 (ja) |
DE (1) | DE112012004804T5 (ja) |
WO (1) | WO2013073260A1 (ja) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015041550A (ja) * | 2013-08-22 | 2015-03-02 | コイト電工株式会社 | 鉄道車両の併結・分割に対応する照明制御システム |
JP2015041548A (ja) * | 2013-08-22 | 2015-03-02 | コイト電工株式会社 | 照明制御システム |
JP2016149112A (ja) * | 2015-02-05 | 2016-08-18 | 株式会社バッファロー | 記憶装置、情報処理システム、記憶装置における認証方法及びプログラム |
JP2018007102A (ja) * | 2016-07-05 | 2018-01-11 | 株式会社デンソー | メッセージの認証異常判別装置 |
US10204654B2 (en) | 2015-02-05 | 2019-02-12 | Buffalo Inc. | Storage device, information processing system, authentication method, and non-transitory computer readable medium |
JP2021192265A (ja) * | 2016-01-04 | 2021-12-16 | クレブエックス エルエルシーClevx, Llc | 暗号を伴うデータセキュリティシステム |
US11971967B2 (en) | 2007-09-27 | 2024-04-30 | Clevx, Llc | Secure access device with multiple authentication mechanisms |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103440465B (zh) * | 2013-08-29 | 2018-04-06 | 成都卫士通信息安全技术有限公司 | 一种移动存储介质安全控制方法 |
TWI530799B (zh) * | 2013-11-28 | 2016-04-21 | 慧榮科技股份有限公司 | 應用於通用串列匯流排裝置的頻率校正方法及其相關的通用串列匯流排裝置 |
US11936645B2 (en) | 2017-03-30 | 2024-03-19 | Kingston Digital, Inc. | Smart security storage system |
US10880296B2 (en) | 2017-03-30 | 2020-12-29 | Kingston Digital Inc. | Smart security storage |
EP3388964A1 (en) * | 2017-04-10 | 2018-10-17 | Gemalto Sa | Encrypted memory card |
CN109729064B (zh) * | 2018-05-14 | 2021-04-20 | 网联清算有限公司 | 加密机故障处理方法及信息处理系统 |
US11388000B2 (en) | 2019-06-19 | 2022-07-12 | Innotek, Inc. | Systems and methods to facilitate data security in a portable storage device |
WO2023287585A1 (en) * | 2021-07-14 | 2023-01-19 | Secturion Systems, Inc. | Secure data transfer over wireless networks using data storage encryptors |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006268682A (ja) * | 2005-03-25 | 2006-10-05 | Fujitsu Ltd | 認証システム、その制御方法、情報処理システムおよび携帯型認証装置 |
JP2007249263A (ja) * | 2006-03-13 | 2007-09-27 | Buffalo Inc | 持ち運び可能なデータストレージデバイスおよびデータの書き込みおよび読み出し制御方法 |
JP2010102617A (ja) * | 2008-10-27 | 2010-05-06 | Dainippon Printing Co Ltd | 外部記憶装置アクセス管理システム、装置、方法、プログラム、記録媒体 |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5982877A (en) * | 1995-06-19 | 1999-11-09 | Nippon Telegraph And Telephone Corporation | Communications system using portable recording medium |
US5742756A (en) * | 1996-02-12 | 1998-04-21 | Microsoft Corporation | System and method of using smart cards to perform security-critical operations requiring user authorization |
JP3875101B2 (ja) * | 1999-10-04 | 2007-01-31 | シーメンス ヴィディーオー オートモーティヴ コーポレイション | 機械式キーによらない車両制御システム及び方法 |
US20020042883A1 (en) * | 2000-10-04 | 2002-04-11 | Soundvoice Limited | Method and system for controlling access by clients to servers over an internet protocol network |
US7503480B2 (en) * | 2001-07-10 | 2009-03-17 | American Express Travel Related Services Company, Inc. | Method and system for tracking user performance |
JP2004208169A (ja) * | 2002-12-26 | 2004-07-22 | Kyocera Corp | 無線データ通信システム及びコンピュータ装置 |
JP2005157545A (ja) * | 2003-11-21 | 2005-06-16 | Matsushita Electric Ind Co Ltd | 無線通信媒体処理装置 |
JP4135151B2 (ja) * | 2004-01-28 | 2008-08-20 | 日本電気株式会社 | Rfidを用いたシングルサインオン方法及びシステム |
JP4140905B2 (ja) | 2004-03-22 | 2008-08-27 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 記憶装置及びプログラム |
KR100582389B1 (ko) * | 2004-11-08 | 2006-05-23 | 주식회사 팬택앤큐리텔 | Rf 결제시 중간 이벤트를 차단하는 모바일 커머스무선통신 단말기 및 그 방법 |
US8606231B2 (en) * | 2005-11-16 | 2013-12-10 | Sirius Xm Radio Inc. | Proprietary radio control head with authentication |
JP2007148670A (ja) * | 2005-11-25 | 2007-06-14 | Matsushita Electric Ind Co Ltd | 携帯端末装置 |
US9137012B2 (en) * | 2006-02-03 | 2015-09-15 | Emc Corporation | Wireless authentication methods and apparatus |
JP2007257574A (ja) * | 2006-03-27 | 2007-10-04 | Hitachi High-Tech Science Systems Corp | 無線式認証システム |
JP2007329720A (ja) * | 2006-06-08 | 2007-12-20 | Citizen Holdings Co Ltd | 遠隔操作システム及び遠隔操作プログラム |
US20090023474A1 (en) * | 2007-07-18 | 2009-01-22 | Motorola, Inc. | Token-based dynamic authorization management of rfid systems |
JP2009042927A (ja) * | 2007-08-07 | 2009-02-26 | Toppan Forms Co Ltd | 情報記憶装置および情報管理システム |
JP4993114B2 (ja) * | 2007-11-28 | 2012-08-08 | 大日本印刷株式会社 | 携帯型ストレージデバイスの共有管理方法、および、携帯型ストレージデバイス |
JP2009245020A (ja) * | 2008-03-28 | 2009-10-22 | Ikutoku Gakuen Kanagawa Koka Daigaku | Usb接続による暗号化装置 |
US8451122B2 (en) * | 2008-08-08 | 2013-05-28 | Tyfone, Inc. | Smartcard performance enhancement circuits and systems |
JP2010237768A (ja) * | 2009-03-30 | 2010-10-21 | Toshiba Corp | 補助記憶装置 |
US9105027B2 (en) * | 2009-05-15 | 2015-08-11 | Visa International Service Association | Verification of portable consumer device for secure services |
US8893967B2 (en) * | 2009-05-15 | 2014-11-25 | Visa International Service Association | Secure Communication of payment information to merchants using a verification token |
US8185165B2 (en) * | 2009-06-01 | 2012-05-22 | Hewlett-Packard Development Company, L.P. | Method and apparatus for adaptive power saving in a mobile computing device |
JP5409164B2 (ja) * | 2009-07-27 | 2014-02-05 | キヤノン株式会社 | 画像形成装置および画像形成装置の制御方法および制御プログラム |
US20110047371A1 (en) * | 2009-08-18 | 2011-02-24 | Benjamin William Timby | System and method for secure data sharing |
EP2397868A1 (en) * | 2010-06-15 | 2011-12-21 | The European Union, represented by the European Commission | Method of providing an authenticable time-and-location indication |
-
2012
- 2012-09-03 JP JP2013544158A patent/JP6029592B2/ja not_active Expired - Fee Related
- 2012-09-03 DE DE112012004804.0T patent/DE112012004804T5/de active Pending
- 2012-09-03 WO PCT/JP2012/072303 patent/WO2013073260A1/ja active Application Filing
- 2012-11-19 US US13/680,445 patent/US8909944B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006268682A (ja) * | 2005-03-25 | 2006-10-05 | Fujitsu Ltd | 認証システム、その制御方法、情報処理システムおよび携帯型認証装置 |
JP2007249263A (ja) * | 2006-03-13 | 2007-09-27 | Buffalo Inc | 持ち運び可能なデータストレージデバイスおよびデータの書き込みおよび読み出し制御方法 |
JP2010102617A (ja) * | 2008-10-27 | 2010-05-06 | Dainippon Printing Co Ltd | 外部記憶装置アクセス管理システム、装置、方法、プログラム、記録媒体 |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11971967B2 (en) | 2007-09-27 | 2024-04-30 | Clevx, Llc | Secure access device with multiple authentication mechanisms |
JP2015041550A (ja) * | 2013-08-22 | 2015-03-02 | コイト電工株式会社 | 鉄道車両の併結・分割に対応する照明制御システム |
JP2015041548A (ja) * | 2013-08-22 | 2015-03-02 | コイト電工株式会社 | 照明制御システム |
JP2016149112A (ja) * | 2015-02-05 | 2016-08-18 | 株式会社バッファロー | 記憶装置、情報処理システム、記憶装置における認証方法及びプログラム |
JP2017054515A (ja) * | 2015-02-05 | 2017-03-16 | 株式会社バッファロー | 記憶装置、情報処理システム、記憶装置における認証方法及びプログラム |
US10204654B2 (en) | 2015-02-05 | 2019-02-12 | Buffalo Inc. | Storage device, information processing system, authentication method, and non-transitory computer readable medium |
JP2021192265A (ja) * | 2016-01-04 | 2021-12-16 | クレブエックス エルエルシーClevx, Llc | 暗号を伴うデータセキュリティシステム |
JP7248754B2 (ja) | 2016-01-04 | 2023-03-29 | クレブエックス エルエルシー | 暗号を伴うデータセキュリティシステム |
JP2018007102A (ja) * | 2016-07-05 | 2018-01-11 | 株式会社デンソー | メッセージの認証異常判別装置 |
Also Published As
Publication number | Publication date |
---|---|
US8909944B2 (en) | 2014-12-09 |
CN103946860A (zh) | 2014-07-23 |
US20130132739A1 (en) | 2013-05-23 |
JP6029592B2 (ja) | 2016-11-24 |
JPWO2013073260A1 (ja) | 2015-04-02 |
DE112012004804T5 (de) | 2014-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6029592B2 (ja) | 記憶装置 | |
US10719457B2 (en) | Storage device having a wireless communication function | |
JP4943751B2 (ja) | 電子データアクセス制御システム、プログラム及び情報記憶媒体 | |
JP2008512738A (ja) | データを交換するための携帯型記憶装置及び方法 | |
US20110060921A1 (en) | Data Encryption Device | |
US20080320317A1 (en) | Electronic device and information processing method | |
EP1775881A1 (en) | Data management method, program thereof, and program recording medium | |
US11222144B2 (en) | Self-encrypting storage device and protection method | |
US9471808B2 (en) | File management system and method | |
KR20120123885A (ko) | 저장 장치의 인증 장치 및 인증 장치 연결 수단을 구비한 저장 장치 | |
JP4977543B2 (ja) | 制御装置、制御システム、制御方法及び制御プログラム | |
JP2007316968A (ja) | セキュリティ機能付き外部記憶装置及び外部記憶装置のセキュリティ管理方法 | |
KR20160099771A (ko) | 비콘 신호를 이용한 보안 usb 메모리 장치 및 그 동작 방법 | |
JP2011205528A (ja) | 通信装置、通信方法、及び、通信システム | |
KR20110023685A (ko) | 인증 기능을 구비하는 ssd 및 그 구동 방법 | |
JP2009258979A (ja) | ハードディスク装置 | |
KR20130050690A (ko) | 인증 시스템 | |
JP2011239123A (ja) | 情報処理装置及び暗号鍵管理方法及びプログラム | |
CN102034054A (zh) | 信息验证系统 | |
KR101410488B1 (ko) | 외장 메모리용 보안 젠더 및 이를 이용한 외장 메모리 관리 방법 | |
KR100910541B1 (ko) | 태그를 이용한 컴퓨터 보안 시스템 및 운용 방법 | |
CN103946860B (zh) | 存储装置 | |
US11777746B2 (en) | Mutual authentication system and mutual authentication method | |
JP2011108151A (ja) | 外付けストレージ用セキュリティ・アダプター | |
WO2023193318A1 (zh) | 芯片、编码设备、电子设备、认证数据的更新系统及方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12849860 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2013544158 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1120120048040 Country of ref document: DE Ref document number: 112012004804 Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12849860 Country of ref document: EP Kind code of ref document: A1 |