Usage management system and usage management method

A management system and management object technology, applied in the transmission system, electronic digital data processing, user identity/authority verification, etc., can solve the problems of inability to authenticate and obtain information, and achieve reliable management, flexible security management, and high convenience Effect

Active Publication Date: 2012-12-12
NOMURA RESEARCH INSTITUTE
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, it is stated that when it is taken out of the company, it cannot be authenticated because the information cannot be obtained from the RFID transmitter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Usage management system and usage management method
  • Usage management system and usage management method
  • Usage management system and usage management method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0069] figure 1 It is an overall configuration diagram of the usage management system 1 of the first embodiment. In the usage management system 1, usage of the terminal 5 (computer) connected to the managed network 2 is managed.

[0070] The managed network 2 is managed by a single management entity such as an enterprise, and is a network closed to external networks such as the Internet. The managed network 2 includes, for example, an in-house LMN (Local Area Network) such as an enterprise, an in-company WMN (Wide Area Network) that connects LMNs installed in multiple sites through dedicated lines or the like.

[0071] Various physical network devices used in the managed network 2 are installed only in places where outsiders cannot use them (for example, if the management subject is a company, then within the company's facilities). Therefore, outsiders cannot connect the terminal 5 to the managed network 2 .

[0072] In addition, in figure 1 Although the router 4 is show...

no. 2 approach

[0137] The second embodiment differs from the first embodiment in the programs installed in the terminal 5 . Hereinafter, the same reference numerals are assigned to the same elements as those in the first embodiment, and overlapping descriptions will be omitted.

[0138] Figure 7 It is a diagram showing an example of a program stored in the storage unit 12 of the terminal 5 according to the second embodiment.

[0139] The storage unit 12 of the terminal 5 stores programs such as a BIOS 51 , a boot loader 52 , an OS 53 , and an inspection MP 57 including an authentication MP 55 and a monitoring MP 56 .

[0140] In the second embodiment, the boot loader 52 of the terminal 5 loads the OS 53 . Then, the inspection MP57 is loaded after the OS53 starts, and the authentication MP55 and the monitoring MP56 which are a part of the inspection MP57 are executed.

[0141] In the second embodiment, the transition to the available state (a state that can be used by the user) means that...

no. 3 approach

[0148] The third embodiment differs from the first embodiment in the hardware configuration of the terminal 5 and the programs installed in the terminal 5 . Hereinafter, the same reference numerals are assigned to the same elements as those in the first embodiment, and overlapping descriptions will be omitted.

[0149] Figure 8 It is an overall configuration diagram of the usage management system 1a of the third embodiment.

[0150] The configuration of the use management system 1a includes a radio wave transmitting device 6, a light emitting device 7, and the like in addition to the server 3 and the terminal 5a connected to the managed network 2.

[0151] The radio wave transmitter 6 transmits a radio wave having a specific frequency indicating that the terminal 5a is permitted to be used, or transmits a radio wave that transmits information indicating that the terminal 5a is permitted to be used. The radio wave transmitting device 6 transmits radio waves having appropriat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided are a usage management system and the like, with which usage can be managed reliably without imposing costs. A network (2) being managed is managed by a single main managing body such as a business, and is closed to external networks such as the internet. With respect to the network (2) being managed, at prescribed transmission intervals, a server (3) broadcast-transmits terminal usage permission information indicating that the usage of terminals (5) is permitted. The terminals (5) receive the information broadcast-transmitted from the server (3), and when terminal usage permission information is received, the terminals move to a useable state (a state in which they can be used by users).

Description

technical field [0001] The present invention relates to a use management system and the like for appropriately managing use of a computer. Background technique [0002] In companies and the like, there are many cases where one computer is assigned to each employee of the company. In order to prevent the leakage of information such as business secrets and personal information, the use of computers is usually limited to facilities such as enterprises. [0003] However, in the case of an easily portable computer such as a notebook PC (personal computer), company employees may take it home or the like. In the homes of company employees, etc., the security policy for use in facilities such as companies cannot be applied, so use for illegal purposes cannot be prevented. In addition, even if the company employees have no intention of illegal purposes, if it is stolen or lost, it will be used by a third party for illegal purposes. [0004] Therefore, a mechanism for restricting t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/20G06F1/00H04L9/32G06F21/44G06F21/00G06F21/31G06F21/32G06F21/34G06F21/60G06F21/62
CPCG06F2221/2149G06F2221/2111G06F2221/2101H04L9/32G06F21/31G06F21/305G06F1/00H04L63/107H04L63/08G06F21/55
Inventor 上野正浩新妻拓朗马天峰木下惇栗原良辅绿川纯央十川基太田洋平
Owner NOMURA RESEARCH INSTITUTE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products