Electronic security information management method and recording medium using an IC card
First Claim
1. An information management method, comprising:
- accessing an authorization medium, when copying a data recorded in a first recording medium in an information processing apparatus to a second recording medium; and
executing the copying when an authorization permitting the copying from the first recording medium can be read from the authorization medium or refusing the copying when the authorization cannot be read.
1 Assignment
0 Petitions
Accused Products
Abstract
An electronic security information management method and recording medium using an IC card to prevent data leaks by a dishonest third party who is carrying, a secret data recorded on an information processing apparatus, such as a computer, integrated circuit card, floppy disk, or other recording medium to the outside of an organization. The electronic security information management method and recording medium can deter the use of the data copied to a recording medium by the dishonest third party and will also record and allow for later inspection the processes used for copying the data to the recording medium. The information management method includes accessing a authorization medium, when copying a data recorded in a first recording medium in an information processing apparatus to a second recording medium and executing the copying when an authorization permitting the copying from the first recording medium can be read from the authorization medium or refusing the copying when the authorization cannot be read.
-
Citations
75 Claims
-
1. An information management method, comprising:
-
accessing an authorization medium, when copying a data recorded in a first recording medium in an information processing apparatus to a second recording medium; and
executing the copying when an authorization permitting the copying from the first recording medium can be read from the authorization medium or refusing the copying when the authorization cannot be read. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 26)
-
-
10. An information management method, comprising:
-
accessing, in a authorization medium, an information permitting the use of a data recorded in a first recording medium, when reading and using a data recorded in the first recording medium; and
permitting the use of the data when a first processing apparatus can read the information from the authorization medium and refusing the use of data when the first processing apparatus cannot read the information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 28, 29, 30, 31, 32, 33, 34, 35, 36, 38, 39, 40, 41, 42, 43, 44, 45, 47, 48, 49, 50, 51)
-
-
27. An information management method, comprising:
-
setting, to a authorization medium, by a first information processing apparatus, an information permitting a copy of a data stored in a first recording medium provided in a second information processing apparatus to a second recording medium; and
copying, with the second information processing apparatus, the data stored on the first recording medium, to the second recording medium, when the information permitting a copy can be read from the authorization medium.
-
-
37. An information management method, comprising:
having a first information processing apparatus set to a second recording medium an information permitting the use of a data recorded in a first recording medium with a second information apparatus when the data is read with the second information processing apparatus.
-
46. An information management method, comprising:
-
setting, using a first information processing apparatus, to an authorization medium, a copy permitting information of a data recorded in a first recording medium provided in a second information processing apparatus to a second recording medium and an information permitting a use of the data copied to the second recording medium by a third information processing apparatus;
copying, using the second information processing apparatus, the data to the second recording medium from the first recording medium when the second information processing apparatus can read the copy permitting information from the authorization medium; and
enabling the third information processing apparatus to use the data recorded in the second recording medium when the third information processing apparatus can read the data application permitting information from the authorization medium.
-
-
52. An information management method, comprising:
-
copying a data recorded in a first recording medium provided in a first information processing apparatus to a second recording medium;
writing back, using a second information processing apparatus, to the second recording medium, an updated data updated by processing the data recorded in the second recording medium;
reading, using the first information processing apparatus, when executing the process to write back the data written back by the second recording medium to the first recording medium, an identification information of an original information processing apparatus in which the data existed from a authorization medium; and
permitting the write-back process of the data when the first information processing apparatus is identified and refusing the write-back process of data when a first information processing apparatus cannot be identified and/or the identification information cannot be read. - View Dependent Claims (53, 54, 55, 56, 57, 59, 60, 61, 62, 63)
-
-
58. An electronic storage medium containing a program embodying an information management method, comprising:
-
accessing a authorization medium when an instruction to copy a data recorded in a first recording medium provided in the information processing apparatus to a second recording medium is inputted; and
executing the instruction to copy when the apparatus can read a copy permitting information permitting the copy from the first recording medium or the authorization medium and refusing the instruction to copy when the apparatus cannot read the copy permitting information.
-
-
64. An electronic storage medium containing a program embodying an information management method, comprising:
-
accessing a authorization medium before reading and using a data recorded in a first recording medium; and
permitting the use of the data when the apparatus can read, from the authorization medium, an information permitting the use of data in the first recording medium or refusing the use of the data when the information processing apparatus cannot read the information permitting the use of data. - View Dependent Claims (65, 66, 67, 68, 70, 71, 72)
-
-
69. An electronic storage medium containing a program embodying an information management method, comprising:
recording at least one process to a authorization medium, including a security information about permitting a copy of a data stored on a first recording medium inserted in a second information processing apparatus to a second recording medium when the information is read with the second information processing apparatus.
-
73. An electronic storage medium containing a program embodying an information management method, comprising:
recording at least one process to a authorization medium, including a security information for permitting a use of a data recorded on a first recording medium by a second information processing apparatus when the security information is read with the second information processing apparatus. - View Dependent Claims (74, 75)
Specification