Information protection system and information protection method
First Claim
1. An information protection system comprising a first assembly in which protected information is stored, and a second assembly in which authentication data are stored, wherein said second assembly comprises communication means that allows said second assembly to send information contactlessly in response to a request from said first assembly, and said first assembly comprises:
- receiving means for receiving access to the protected information;
authentication means for performing authentication in response to the reception of the authentication data from said second assembly; and
access control means that enables or disables the access received by said receiving means, depending on the result of the authentication obtained by said authentication means.
1 Assignment
0 Petitions
Accused Products
Abstract
To provide a manipulation device for a gaming machine that creates realistic sensations by means of providing responding means operated in response to feedback from a gaming machine body, the responding means being provided on the side of the manipulation device for a gaming machine having a plurality of control buttons to be used for a video gaming machine.
In the manipulation device for a gaming machine that supplies manipulation data to the gaming machine body that are obtained as a result of the manipulation of the control buttons to get a game going by using bi-directional communication means that appropriately receives data from the gaming machine body, the manipulation device for a gaming machine comprises responding means that is activated in response to a specific responding signal supplied from the gaming machine body. Different control data can be supplied to a single or a plurality of responding means by providing, as dynamic transmission data to be supplied from the gaming machine body to the manipulation device for a gaming machine, an identification code region to specify the responding means and a plurality of control data regions for the responding means specified with the identification code.
-
Citations
32 Claims
-
1. An information protection system comprising a first assembly in which protected information is stored, and a second assembly in which authentication data are stored, wherein
said second assembly comprises communication means that allows said second assembly to send information contactlessly in response to a request from said first assembly, and said first assembly comprises: -
receiving means for receiving access to the protected information;
authentication means for performing authentication in response to the reception of the authentication data from said second assembly; and
access control means that enables or disables the access received by said receiving means, depending on the result of the authentication obtained by said authentication means. - View Dependent Claims (4, 7, 8, 9, 10, 11, 12, 13, 14, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 29, 30, 31, 32)
-
-
2. An information protection system comprising a first assembly and a second assembly, the first assembly having information for authentication and protected information stored therein, wherein
said first assembly and said second assembly comprises respective communication means that allow said first assembly and said second assembly to exchange information contactlessly with said second assembly and said first assembly, respectively, said second assembly further comprising authentication means for performing authentication in response to the reception of the authentication data from said first assembly, said first assembly further comprising: -
receiving means for receiving access to the protected information; and
access control means that receives the result of the authentication obtained by said authentication means, from said second assembly, and enables or disables the access received by said receiving means, depending on the result of the authentication. - View Dependent Claims (5)
-
-
3. An information protection system comprising a first assembly in which first authentication data and protected information are stored, the first authentication data being to be used for authenticating an owner thereof, and a second assembly in which second authentication data are stored, the second authentication data being to be used for authenticating the owner, wherein
said first assembly and said second assembly comprises respective communication means that allow said first assembly and said second assembly to exchange information contactlessly with said second assembly and said first assembly, respectively, said second assembly further comprising second authentication means for performing, in response to the reception of the first authentication data from said first assembly, authentication based on the received first authentication data and the second authentication data, said first assembly further comprising: -
receiving means for receiving access to the protected information;
first authentication means for performing, in response to the reception of the second authentication data from said second assembly, authentication based on the received second authentication data and the first authentication data; and
access control means that enables or disables the access received by said receiving means, depending on the result of the authentication obtained by said first authentication means and the result of the authentication obtained by said second authentication means and received from said second assembly. - View Dependent Claims (6)
-
-
15. An information protection system comprising a first assembly in which first authentication data and protected information are stored, the first authentication data being to be used for authenticating an owner thereof, a second assembly in which second authentication data are stored, the second authentication data being to be used for authenticating the owner, and an information reader for reading the protected information, wherein
said first assembly comprises first communication means that allows said first assembly to exchange information contactlessly with said second assembly and said information reader, said second assembly comprises second communication means that allows said second assembly to exchange information contactlessly with said first assembly, and said information reader comprises third communication means that allows said information reader to exchange information contactlessly with said first assembly, said first assembly further comprising means for receiving the second authentication data from said second assembly in response to a signal from said information reader and performing authentication based on the received second authentication data and the first authentication data, thereby to permit or prohibit reading of the protected information by said information reader, depending on the result of the authentication.
-
16. An information protection system comprising a first assembly in which first authentication data and protected information are stored, the first authentication data being to be used for authenticating an owner thereof, a second assembly in which second authentication data are stored, the second authentication data being to be used for authenticating the owner, and an information reader for reading the protected information, wherein
said first assembly comprises first communication means that allows said first assembly to exchange information contactlessly with said second assembly and said information reader, said second assembly comprises second communication means that allows said second assembly to exchange information contactlessly with said first assembly, and said information reader comprises third communication means that allows said information reader to exchange information contactlessly with said first assembly, said second assembly further comprising means for receiving the first authentication data from said first assembly, performing authentication based on the received first authentication data and the second authentication data, and sending the result of the authentication to said first assembly, said first assembly further comprising means for sending the first authentication data to said second assembly in response to a signal from said information reader, and receiving the result of the authentication from said second assembly, thereby to permit or prohibit reading of the protected information by said information reader, depending on the received result of the authentication.
-
17. An information protection system comprising a first assembly in which first authentication data and protected information are stored, the first authentication data being to be used for authenticating an owner thereof, a second assembly in which second authentication data are stored, the second authentication data being to be used for authenticating the owner, and an information reader for reading the protected information, wherein
said first assembly comprises first communication means that allows said first assembly to exchange information contactlessly with said second assembly and said information reader, said second assembly comprises second communication means that allows said second assembly to exchange information contactlessly with said first assembly, and said information reader comprises third communication means that allows said information reader to exchange information contactlessly with said first assembly, said second assembly further comprising second authentication means for receiving the first authentication data from said first assembly, performing second authentication based on the received first authentication data and the second authentication data, and sending the result of the authentication to said first assembly, said first assembly further comprising: first authentication means for sending the first authentication data to said second assembly in response to a signal from said information reader, receiving the second authentication data from said second assembly, and performing first authentication based on the received second authentication data and the first authentication data; and
means that permits or prohibits reading of the protected information by said information reader, depending on the result of the authentication obtained by said first authentication means and the result of the authentication obtained by said second authentication means and received from said second assembly.
-
28. An information protection method comprising providing first and second assemblies independently at different locations, the first and second assemblies being capable of exchanging information contactlessly with each other, and storing protected information on the first assembly, wherein
the first assembly accepts an access request to the protected information, provided that the second assembly is within an area that can communicate contactlessly with the first assembly at the time when the access request is issued.
Specification