Unlock instant, AI-driven research and patent intelligence for your innovation.

Information leak-preventing apparatus and information leak-preventing method

A technology for information leakage and information reading, applied in computer security devices, preventing unauthorized use of memory, instruments, etc., can solve problems such as unreliable data confidentiality

Inactive Publication Date: 2008-04-02
FUJITSU LTD
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the problem with the prior art is that once the information about the password is leaked to a third person, the third person can maliciously use the password to lock or unlock the storage medium
Therefore, the storage medium can be easily unlocked on a personal computer, which makes the confidentiality of the data unreliable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information leak-preventing apparatus and information leak-preventing method
  • Information leak-preventing apparatus and information leak-preventing method
  • Information leak-preventing apparatus and information leak-preventing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0018] FIG. 1 is a schematic block diagram for explaining the outline and structure of an information leakage preventing apparatus 1 according to an embodiment of the present invention. As shown in the figure, the information leakage preventing apparatus 1 is connected to a hard disk drive (HDD) 2 . Further, the information leakage preventing apparatus 1 includes a main control unit 11 , a user interface 12 , an HDD connection unit 13 , and an algorithm storage unit 14 .

[0019] The user interface 12 is an input / output processing unit that performs input and output by a user, and is realized by, for example, a power switch 12a, an operation button 12b, a display unit 12c, and the like shown in FIG. 2 .

[0020] The HDD connection unit 13 is an input / output unit that performs data transmission and reception with the HDD 2 , and is physically connected to the HDD 2 through, for example, a flat cable.

[0021] The algorithm storage unit 14 stores therein an algorithm for genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A password creating unit acquires medium information such as a serial number from an HDD, and creates a password according to an algorithm previously stored in an algorithm storing unit. A lock processing unit performs the process of lock and unlock of the HDD by using the created password.

Description

technical field [0001] The present invention relates to a technique for preventing unauthorized reading of information on a storage medium by a third person. Background technique [0002] In recent years, it is common to store confidential industrial information or personal information on various storage media such as a hard disk drive (HDD). Therefore, it is necessary to prevent the storage medium from leaking information. There is a real need for a structure in which the data stored in the storage medium cannot be read by a third person when the storage medium is discarded or sent for repair. [0003] Initializing (formatting) or rewriting meaningless data is effective in making data stored in a storage medium unreadable. However, the time required for formatting or rewriting varies considerably depending on the capacity or writing speed of the storage medium. For example, in a magnetic device such as an HDD, the time required for overall rewriting is about 1 hour / 100GB...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/62
CPCG06F21/78G06F21/31G06F21/00
Inventor 门脇义则田中繁良
Owner FUJITSU LTD