WIPO logo
Mobile | Deutsch | Español | Français | 日本語 | 한국어 | Português | Русский | 中文 | العربية |
PATENTSCOPE

Search International and National Patent Collections
World Intellectual Property Organization
Options
Query Language
Stem
Sort by:
List Length
Some content of this application is unavailable at the moment.
If this situation persist, please contact us atFeedback&Contact
1. (WO2001039140) SECURITY DEVICE, AND COMPUTER-READABLE MEDIUM STORING SECURITY PROGRAM
Latest bibliographic data on file with the International Bureau   

Pub. No.: WO/2001/039140 International Application No.: PCT/JP1999/006564
Publication Date: 31.05.2001 International Filing Date: 25.11.1999
Chapter 2 Demand Filed: 29.05.2000
IPC:
G06F 1/00 (2006.01) ,G06F 21/55 (2013.01) ,G06F 21/62 (2013.01) ,G06F 21/74 (2013.01) ,G06F 21/78 (2013.01) ,G07F 7/10 (2006.01)
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
1
Details not covered by groups G06F3/-G06F13/82
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50
Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55
Detecting local intrusion or implementing counter-measures
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60
Protecting data
62
Protecting access to data via a platform, e.g. using keys or access control rules
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70
Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
71
to assure secure computing or processing of information
74
operating in dual or compartmented mode, i.e. at least one secure mode
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70
Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
78
to assure secure storage of data
G PHYSICS
07
CHECKING-DEVICES
F
COIN-FREED OR LIKE APPARATUS
7
Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
08
by coded identity card or credit card
10
together with a coded signal
Applicants: KASHIWADA, Takeshi[JP/JP]; JP (UsOnly)
FUJITSU LIMITED[JP/JP]; 1-1, Kamikodanaka 4-chome Nakahara-ku Kawasaki-shi Kanagawa 211-8588, JP (AllExceptUS)
Inventors: KASHIWADA, Takeshi; JP
Agent: SAKAI, Hiroaki; Tokyo Club Building 2-6, Kasumigaseki 3-chome Chiyoda-ku Tokyo 100-0013, JP
Priority Data:
Title (EN) SECURITY DEVICE, AND COMPUTER-READABLE MEDIUM STORING SECURITY PROGRAM
(FR) DISPOSITIF DE SECURITE ET PROGRAMME DE SECURITE DE STOCKAGE SUR SUPPORT LISIBLE PAR ORDINATEUR
Abstract:
(EN) A storage (17) stores confidential data to be secured. A CPU (12) counts process access count data corresponding to the number of the processes associated with confidential data and also counts monitor count data corresponding to the number of times the access count data have been altered by external factors. When the process access count data exceeds a predetermined threshold, the CPU (12) restricts further processing. When the monitor access count data exceeds a predetermined threshold, the CPU (12) restricts further processing.
(FR) Une mémoire (17) mémorise des données confidentielles à protéger. Une U.C. (12) compte les données de comptage d'accès au traitement, correspondant au nombre de traitements associés aux données confidentielles et compte également les données correspondant au nombre de fois où les données de comptage d'accès ont été modifiées par des facteurs externes. Lorsque les données de comptage d'accès au traitement dépassent un seuil prédéterminé, l'U.C (12) empêche tout traitement supplémentaire. Lorsque les données de comptage d'accès au moniteur dépassent un seuil prédéterminé, l'U.C. (12) empêche tout traitement supplémentaire.
front page image
Designated States: JP, US
Publication Language: Japanese (JA)
Filing Language: Japanese (JA)