Electric equipment, and method and program for preventing unauthorized use of same
First Claim
1. Electric equipment comprising:
- a function limiting section for setting a function limit to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
an interface for connecting an external device to the electric equipment;
a section for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a section for associating the function limit with the device identification information of a prescribed external device to thereby obtain a cryptographic key;
a memory for storing the cryptographic key;
a determining section for determining whether or not the device identification information obtained from an external device connected via the interface to the electric equipment matches the device identification information of the cryptographic key stored in the memory; and
a limit canceling section for canceling the function limit set by the function limiting section when the determining section determines that the obtained information matches the cryptographic key.
2 Assignments
0 Petitions
Accused Products
Abstract
Electric equipment, and a method and a program for preventing the unauthorized use of same, by which it is possible to prevent the theft of electric equipment installed in an environment where the electric equipment is available for the use of an unspecified number of users and the stealing of information stored in the electric equipment. The electric equipment comprises: an operation limiting section for setting a function limit to make at least part of functions of the electric equipment unavailable; an I/F for connecting an external device to the electric equipment; an external device information obtaining section for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device; a write control section for associating the function limit with the device identification information of a prescribed external device to thereby obtain a cryptographic key; an NVRAM for storing the cryptographic key; and a comparator for determining whether or not the device identification information obtained from an external device connected via the interface to the electric equipment matches the cryptographic key stored in the NVRAM. The operation limiting section cancels the function limit when the comparator determines that the obtained information matches the cryptographic key.
-
Citations
72 Claims
-
1. Electric equipment comprising:
-
a function limiting section for setting a function limit to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
an interface for connecting an external device to the electric equipment;
a section for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a section for associating the function limit with the device identification information of a prescribed external device to thereby obtain a cryptographic key;
a memory for storing the cryptographic key;
a determining section for determining whether or not the device identification information obtained from an external device connected via the interface to the electric equipment matches the device identification information of the cryptographic key stored in the memory; and
a limit canceling section for canceling the function limit set by the function limiting section when the determining section determines that the obtained information matches the cryptographic key. - View Dependent Claims (7, 13, 19)
-
-
2. Electric equipment comprising:
-
a function limiting section for setting one or more function limits to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
an interface for connecting an external device to the electric equipment;
a section for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a section for associating each function limit with the device identification information of a prescribed external device to thereby obtain a cryptographic key;
a memory for storing the cryptographic key;
a determining section for determining whether or not the device identification information obtained from an external device connected via the interface to the electric equipment matches the device identification information included in the cryptographic key stored in the memory; and
a limit canceling section for canceling each function limit set by the function limiting section when the determining section determines that the obtained information matches the device identification information associated with the function limit. - View Dependent Claims (8, 14, 20)
-
-
3. Electric equipment comprising:
-
a function limiting section for setting a function limit to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a plurality of interfaces for connecting external devices to the electric equipment;
a section for obtaining device identification information from an external device connected via one of the interfaces to the electric equipment to identify the device;
a section for associating the function limit with the specific device identification information or a combination of plural pieces of specific device identification information to thereby obtain a cryptographic key;
a memory for storing the cryptographic key;
a determining section for determining whether or not the device identification information obtained from each external device connected via one of the interfaces to the electric equipment matches the device identification information of the cryptographic key stored in the memory; and
a limit canceling section for canceling the function limit set by the function limiting section when the determining section determines that the obtained information matches the cryptographic key. - View Dependent Claims (9, 15, 21)
-
-
4. Electric equipment comprising:
-
a function limiting section for setting a function limit to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a plurality of interfaces for connecting external devices to the electric equipment;
a section for obtaining device identification information from an external device connected via one of the interfaces to the electric equipment to identify the device;
a section for generating connection route information indicating which interface is used to connect the external device that has provided the device identification information;
a section for associating the function limit with a combination of prescribed device identification information and relevant connection route information to thereby obtain a cryptographic key;
a memory for storing at least one cryptographic key;
a determining section for determining whether or not a combination of the device identification information obtained from each external device connected via one of the interfaces to the electric equipment and the connection route information for the external device matches the combination of the device identification information and the connection route information of the cryptographic key stored in the memory; and
a limit canceling section for canceling the function limit set by the function limiting section when the determining section determines that the combination of the obtained information and connection route information matches the cryptographic key. - View Dependent Claims (10, 16, 22)
-
-
5. Electric equipment comprising:
-
a function limiting section for setting one or more function limits to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a plurality of interfaces for connecting external devices to the electric equipment;
a section for obtaining device identification information from an external device connected via one of the interfaces to the electric equipment to identify the device;
a section for associating each function limit with the specific device identification information or a combination of plural pieces of specific device identification information to thereby obtain a cryptographic key;
a memory for storing at least one cryptographic key;
a determining section for determining whether or not the device identification information obtained from each external device connected via one of the interfaces to the electric equipment matches the device identification information of any one of the cryptographic keys stored in the memory; and
a limit canceling section for canceling each function limit set by the function limiting section when the determining section determines that the obtained information matches the device identification information of the cryptographic key related to the function limit. - View Dependent Claims (11, 17, 23)
-
-
6. Electric equipment comprising:
-
a function limiting section for setting one or more function limits to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a plurality of interfaces for connecting external devices to the electric equipment;
a section for obtaining device identification information from an external device connected via one of the interfaces to the electric equipment to identify the device;
a section for generating connection route information indicating which interface is used to connect the external device that has provided the device identification information;
a section for associating each function limit with a combination of prescribed device identification information and relevant connection route information to thereby obtain a cryptographic key;
a memory for storing at least one cryptographic key;
a determining section for determining whether or not a combination of the device identification information obtained from each external device connected via one of the interfaces to the electric equipment and the connection route information for the external device matches any one of the cryptographic keys stored in the memory; and
a limit canceling section for canceling each function limit set by the function limiting section when the determining section determines that the combination of the obtained information and connection route information matches the cryptographic key related to the function limit. - View Dependent Claims (12, 18, 24)
-
-
25. A method for preventing the unauthorized use of electric equipment including an interface to connect an external device thereto, comprising:
-
a function limiting step for setting a function limit to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a step for associating the function limit with the device identification information obtained at the first device identification information obtaining step to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a determining step for determining whether or not the device identification information obtained at the second device identification information obtaining step matches the device identification information of the cryptographic key stored in the memory; and
a limit canceling step for canceling the function limit set at the function limiting step when it is determined at the determining step that the information obtained at the second device identification information obtaining step matches the cryptographic key. - View Dependent Claims (31, 37, 43)
-
-
26. A method for preventing the unauthorized use of electric equipment including an interface to connect an external device thereto, comprising:
-
a function limiting step for setting one or more function limits to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a step for associating each function limit with the device identification information of a prescribed external device to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a determining step for determining whether or not the device identification information obtained at the second device identification information obtaining step matches the device identification information included in the cryptographic key stored in the memory; and
a limit canceling step for canceling each function limit set at the function limiting step when it is determined at the determining step that the information obtained at the second device identification information obtaining step matches the device identification information of the cryptographic key related to the function limit. - View Dependent Claims (32, 38, 44)
-
-
27. A method for preventing the unauthorized use of electric equipment including a plurality of interfaces to connect external devices thereto, comprising:
-
a function limiting step for setting a function limit to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a step for associating the function limit with the specific device identification information or a combination of plural pieces of specific device identification information to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a determining step for determining whether or not the device identification information or a combination of plural pieces of device identification information obtained at the second device identification information obtaining step matches the device identification information of the cryptographic key stored in the memory; and
a limit canceling step for canceling the function limit set at the function limiting step when it is determined at the determining step that the information obtained at the second device identification information obtaining step matches the cryptographic key. - View Dependent Claims (33, 39, 45)
-
-
28. A method for preventing the unauthorized use of electric equipment including a plurality of interfaces to connect external devices thereto, comprising:
-
a function limiting step for setting a function limit to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a first connection route information generating step for generating first connection route information indicating which interface is used to connect the external device to the electric equipment at the first device identification information obtaining step;
a step for associating the function limit with a combination of prescribed device identification information and relevant connection route information to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a second connection route information generating step for generating second connection route information indicating which interface is used to connect the external device to the electric equipment at the second device identification information obtaining step;
a determining step for determining whether or not a combination of the device identification information obtained at the second device identification information obtaining step and the second connection route information matches the cryptographic key stored in the memory; and
a limit canceling step for canceling the function limit set at the function limiting step when it is determined at the determining step that the combination of the information obtained at the second device identification information obtaining step and the second connection route information matches the cryptographic key. - View Dependent Claims (34, 40, 46)
-
-
29. A method for preventing the unauthorized use of electric equipment including a plurality of interfaces to connect external devices thereto, comprising:
-
a function limiting step for setting one or more function limits to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a step for associating each function limit with the specific device identification information or a combination of plural pieces of specific device identification information to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a determining step for determining whether or not the device identification information or a combination of plural pieces of device identification information obtained at the second device identification information obtaining step matches the device identification information of any one of the cryptographic keys stored in the memory; and
a limit canceling step for canceling each function limit set at the function limiting step when it is determined at the determining step that the information obtained at the second device identification information obtaining step matches the device identification information of the cryptographic key related to the function limit. - View Dependent Claims (35, 41, 47)
-
-
30. A method for preventing the unauthorized use of electric equipment including a plurality of interfaces to connect external devices thereto, comprising:
-
a function limiting step for setting one or more function limits to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a first connection route information generating step for generating first connection route information indicating which interface is used to connect the external device to the electric equipment at the first device identification information obtaining step;
a step for associating the function limit with a combination of prescribed device identification information and the first connection route information to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a second connection route information generating step for generating second connection route information indicating which interface is used to connect the external device to the electric equipment at the second device identification information obtaining step;
a determining step for determining whether or not a combination of the device identification information obtained at the second device identification information obtaining step and the second connection route information matches any one of the cryptographic keys stored in the memory; and
a limit canceling step for canceling each function limit set at the function limiting step when it is determined at the determining step that the combination of the information obtained at the second device identification information obtaining step and the second connection route information matches the cryptographic key related to the function limit. - View Dependent Claims (36, 42, 48)
-
-
49. A program for preventing the unauthorized use of electric equipment, which is built into the electric equipment including an interface to connect an external device thereto and makes a computer having effective control over the electric equipment execute steps as follows:
-
a function limiting step for setting a function limit to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a step for associating the function limit with the device identification information obtained at the first device identification information obtaining step to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a determining step for determining whether or not the device identification information obtained at the second device identification information obtaining step matches the device identification information of the cryptographic key stored in the memory; and
a limit canceling step for canceling the function limit set at the function limiting step when it is determined at the determining step that the information obtained at the second device identification information obtaining step matches the cryptographic key. - View Dependent Claims (55, 61, 67)
-
-
50. A program for preventing the unauthorized use of electric equipment, which is built into the electric equipment including an interface to connect an external device thereto and makes a computer having effective control over the electric equipment execute steps as follows:
-
a function limiting step for setting one or more function limits to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a step for associating each function limit with the device identification information of a prescribed external device to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from an external device connected via the interface to the electric equipment to identify the device;
a determining step for determining whether or not the device identification information obtained at the second device identification information obtaining step matches the device identification information included in any one of the cryptographic keys stored in the memory; and
a limit canceling step for canceling each function limit set at the function limiting step when it is determined at the determining step that the information obtained at the second device identification information obtaining step matches the device identification information of the cryptographic key related to the function limit. - View Dependent Claims (56, 62, 68)
-
-
51. A program for preventing the unauthorized use of electric equipment, which is built into the electric equipment including a plurality of interfaces to connect external devices thereto and makes a computer having effective control over the electric equipment execute steps as follows:
-
a function limiting step for setting a function limit to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a step for associating the function limit with specific device identification information or a combination of plural pieces of specific device identification information to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a determining step for determining whether or not the device identification information or a combination of plural pieces of device identification information obtained at the second device identification information obtaining step matches the device identification information of the cryptographic key stored in the memory; and
a limit canceling step for canceling the function limit set at the function limiting step when it is determined at the determining step that the information obtained at the second device identification information obtaining step matches the cryptographic key. - View Dependent Claims (57, 63, 69)
-
-
52. A program for preventing the unauthorized use of electric equipment, which is built into the electric equipment including a plurality of interfaces to connect external devices thereto and makes a computer having effective control over the electric equipment execute steps as follows:
-
a function limiting step for setting a function limit to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a first connection route information generating step for generating first connection route information indicating which interface is used to connect the external device to the electric equipment at the first device identification information obtaining step;
a step for associating the function limit with a combination of prescribed device identification information and relevant connection route information to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a second connection route information generating step for generating second connection route information indicating which interface is used to connect the external device to the electric equipment at the second device identification information obtaining step;
a determining step for determining whether or not a combination of the device identification information obtained at the second device identification information obtaining step and the second connection route information matches the cryptographic key stored in the memory; and
a limit canceling step for canceling the function limit set at the function limiting step when it is determined at the determining step that the combination of the information obtained at the second device identification information obtaining step and the second connection route information matches the cryptographic key. - View Dependent Claims (58, 64, 70)
-
-
53. A program for preventing the unauthorized use of electric equipment, which is built into the electric equipment including a plurality of interfaces to connect external devices thereto and makes a computer having effective control over the electric equipment execute steps as follows:
-
a function limiting step for setting one or more function limits to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a step for associating each function limit with the specific device identification information or a combination of plural pieces of specific device identification information to thereby obtain a cryptographic key;
a step for storing the cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a determining step for determining whether or not the device identification information or a combination of plural pieces of device identification information obtained at the second device identification information obtaining step matches the device identification information of any one of the cryptographic keys stored in the memory; and
a limit canceling step for canceling each function limit set at the function limiting step when it is determined at the determining step that the information obtained at the second device identification information obtaining step matches the device identification information of the cryptographic key related to the function limit. - View Dependent Claims (59, 65, 71)
-
-
54. A program for preventing the unauthorized use of electric equipment, which is built into the electric equipment including a plurality of interfaces to connect external devices thereto and makes a computer having effective control over the electric equipment execute steps as follows:
-
a function limiting step for setting one or more function limits to the electric equipment so that at least part of functions of the electric equipment becomes unavailable;
a first device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a first connection route information generating step for generating first connection route information indicating which interface is used to connect the external device to the electric equipment at the first device identification information obtaining step;
a step for associating the function limit with a combination of prescribed device identification information and the first connection route information to thereby obtain a cryptographic key;
a step for storing at least one cryptographic key in a memory;
a second device identification information obtaining step for obtaining device identification information from each external device connected via one of the interfaces to the electric equipment to identify the device;
a second connection route information generating step for generating second connection route information indicating which interface is used to connect the external device to the electric equipment at the second device identification information obtaining step;
a determining step for determining whether or not a combination of the device identification information obtained at the second device identification information obtaining step and the second connection route information matches any one of the cryptographic keys stored in the memory; and
a limit canceling step for canceling each function limit set at the function limiting step when it is determined at the determining step that the combination of the information obtained at the second device identification information obtaining step and the second connection route information matches the cryptographic key related to the function limit. - View Dependent Claims (60, 66, 72)
-
Specification