-
公开(公告)号:JP2004013899A
公开(公告)日:2004-01-15
申请号:JP2003150538
申请日:2003-05-28
Applicant: Internatl Business Mach Corp
, インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Maschines Corporation Inventor: DAVID CARROL CHARUNAA , HOFF JAMES PATRICK , CROMER DARYL CARVIS , WARD JAMES PETER
CPC classification number: G06F21/78 , G06F2221/2129
Abstract: PROBLEM TO BE SOLVED: To provide control of access to data stored in a storage device of a trusted computing platform system. SOLUTION: This storage device is uniquely linked with a particular computer system. Because the storage device is linked in such a manner that access is allowed only when a series of exchange examples of the link are performed, high security is attained in controlling access to a data file stored on a reader/writer. Access to data stored on the reader/writer is allowed only when the reader/writer is associated with the particular computer system and in addition, only when the storage device confirms the entry of a proper password. A trusted computing platform function is used to enhance a security function. COPYRIGHT: (C)2004,JPO
-
公开(公告)号:JP2001273059A
公开(公告)日:2001-10-05
申请号:JP2001026518
申请日:2001-02-02
Applicant: IBM
Inventor: DAVID CARROL CHARUNAA , DYURUBU MAMOHANDASU DESAI , NORMAN A DION II , VIVIEN M KLEIN , HOWARD JEFFREY ROCKER , HERNAND OVIS , ANDY LLOYD TOROTTAA , WARD JAMES PETER
Abstract: PROBLEM TO BE SOLVED: To provide a data processing system and a method protecting a USB device to enable the USB device to be available only by a connected computer system. SOLUTION: The USB device is not connected with any computer systems until it is used for the first time. When the USB device is used and connected with a specific computer system for the first time, it is connected with the specific computer system included in the data processing system. The USB device is initially incapacitated and turns to be available by responding only to the connection with the connected computer system. The USB device and the connected computer system are connected by using a pair of the encryption keys. Here the connected computer system memorizes the first key and the USB device memorizes the second key.
-