Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data safety management system

A management system and data security technology, applied in data processing applications, electrical digital data processing, special data processing applications, etc., can solve problems such as damage to security, information leakage, important information leakage, etc., to prevent illegal access to storage media Effect

Inactive Publication Date: 2008-04-30
CASIO COMPUTER CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Countermeasures against information leakage due to loss or theft of portable storage media and terminals, and deliberate theft by ex-employees and part-timers are unsatisfactory
Any one of them can easily use his (her) own personal computer to access the data in the user's portable terminal or recording medium if they know the user's password or accidentally type in the password, which may be contained in the terminal or recording medium. Important information in the medium will most likely be leaked to this individual
[0005] If the portable terminal itself has a mechanism in which security measures can be set by the user, a third party can easily change this setting, so that the mechanism itself may compromise security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data safety management system
  • Data safety management system
  • Data safety management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will refer to the attached Picture 1-1 4 illustrates a security management system as a preferred embodiment of the present invention. see figure 1 , the security management system includes: a server 1 such as installed in a company; a plurality of groups of movable or portable agent terminals 2, which are respectively carried by corresponding sellers, and connected in a detachable manner through serial cables 5 on the server 1; and a plurality of sets of portable storage media 3 respectively provided in corresponding portable terminals 2 for use.

[0051] The server 1 provides each group of terminals 2 with the application software / database stored in and managed by the server 1 through a set of corresponding storage media 3 . When server 1 writes database or other data on each storage medium 3 in each group and distributes these storage media to each terminal in this group, server 1 will send each terminal in this group by setting information Correspon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Data containing important information are stored in DB cards separable from terminals. The terminals and mediums are placed in corresponding relationship. Multi-security measures are taken to prevent a third party not authorized to access one of the DB cards from accessing the card and its data due to loss and robbery of the DB card and the third party's malice to thereby prevent the information from leaking out from the DB card. To this end, when the terminal accesses the DB card, the terminal compares its own hardware identification number with that of the card to determine whether the terminal is authorized to access the DB card. When it is, the terminal 2 further compares its own software identification number with that of the card to determine whether the terminal is further authorized to access a mobile DB in the card.

Description

technical field [0001] The present invention relates to a security management scheme by devising a countermeasure against using an illegal portable terminal to access a portable data recording medium. Background technique [0002] In recent years, portable recording media such as compact memory disks and memory cards have been increasing in capacity and decreasing in size so that large-capacity databases can also be stored therein for portability. [0003] Many sellers carry their respective portable terminals to carry out their daily sales activities. Each portable terminal has only a small-capacity built-in memory, so part or all of the database used in transaction activities is stored in a portable storage medium. Vendors set the storage medium into their terminal and take the terminal to their customer / agent where display, output and / or data update is performed by accessing the data stored in the storage medium. In order to ensure that a legal terminal accesses the sto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/00G06F12/14G06F1/00G06F21/44G06F21/62G06F21/73G06F21/79
CPCG06F21/445G06F21/6218G06F2221/2153G06F21/73G06F21/79G06F2221/2129G06Q20/108G06F12/14
Inventor 大塚基
Owner CASIO COMPUTER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products