Abstract:
PROBLEM TO BE SOLVED: To provide technique inhibiting access to a computer when the security device of the computer with a security function is illegally removed. SOLUTION: A security device is hardware taking responsibility for a part of the security function of a computer and inhibits access with the following procedures when illegally removed. Data indicating that the security device is mounted on the computer is stored and held in a nonvolatile memory. After that, a procedure to inhibit access to the computer is started with some event such as power-on as a start. Next, it is detected on the basis of the data in memory that the security device has been mounted. It is further detected that the security device is now removed from the computer. When the security device is now removed even through it has been mounted, access to the computer is inhibited.
Abstract:
PROBLEM TO BE SOLVED: To prevent illegal access to a non-contact data carrier system by using a radio frequency identification(RFID) computer, for example, without lowering a performance. SOLUTION: A RFID computer 30 is provided with a CPU 35, an EEPROM 34, communication equipment 31 and 32 and power control units 40 and 41. When the RFID computer 30 in power-on state is passed through a portal gate provided in the entrance/exit of an illegal access prevention zone without authority, that portal gate transmits a signal for setting on a tamper bit 44 in the EEPROM 34. The EEPROM 34, which sets on the tamper bit 44 with this signal, outputs a tamper bit interrupt request signal. The power control units 40 and 41, which receive this signal, turn off the power of the RFID computer 30.
Abstract:
PROBLEM TO BE SOLVED: To provide an information processor capable of adjusting the set temperature for executing temperature control processing, depending on the characteristics of the information processor. SOLUTION: The information processor comprises: a central processing unit; a temperature control information storage section storing the temperature control processing performed for lowering the temperature of the central processing unit while corresponding to the set temperature; a temperature measurement section for measuring the temperature at a measurement location in the central processing unit; a temperature detection section for detecting the fact that the temperature at a detection location in the central processing unit reaches the detection temperature; an offset calculation section calculating offset, a difference between the temperature measured by the temperature measurement section and the detection temperature at the time of detecting the temperature by the temperature detection section; a set temperature correction section calculating the correction value of the setting temperature stored on the temperature control information storage section based on the offset; and a temperature control execution section executing the temperature control processing stored on the temperature control information storage section while corresponding to the set temperature when the temperature measured by the temperature measurement section reaches the correction value of the set temperature. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To inhibit access to a computer when the security device of a computer with a security function is illegally detached. SOLUTION: When the computer is powered ON, a POST program is executed and in the setting which makes the security function effective, an RFID chip 33 holds Removal Detect Enable at high level and outputs it to the control side of an analog switch 67 and one input side of a NAND element 63. A 1st short-circuit element 36 is isolated by the attachment or detachment of an RF antenna 37 to disconnect terminals 71 and 73 and an INTR signal of keyboard inhibition is outputted with the high-level signal of the element 63, inhibiting access to the computer. When the power source is OFF and the RF antenna is attached or detached, an analog switch 67 is turned OFF to cut off the electric power from a lithium battery to a CMOS memory 50, thereby inhibiting access to the computer.
Abstract:
PROBLEM TO BE SOLVED: To prevent a computer from being illegally used by providing a means enabling a regal user to easily check whether the computer has been illegally used or not. SOLUTION: In a basic input/output system(BIOS), in every cold boot of a computer system (YES in step 100), '1' is added to the value of a power ON frequency storing area formed in an EEPROM (104) and the power ON frequency after the addition of '1' is displayed (106). In a case other than the input of a supervisor password (NOT in step 108 or 112), a block provided with the power ON frequency storing area out of plural blocks in the EEPROM (electrically erasable programmable read-ony mememory) is locked (the rewriting of stored contents is interrupted).