Information processing apparatus, security method, and storage medium storing security program
First Claim
1. An information processing apparatus, comprising:
- a memory that registers, in an authentication key information table, authentication key information including first identification information identifying a first nearby device capable of communication with the information processing apparatus;
a transmitter to communicate with devices; and
a computer processor operable to;
communicate with a second nearby device to retrieve second nearby device information including second identification information identifying the second nearby device;
detect a movement status of the information processing apparatus; and
determine whether to limit a functionality of the information processing apparatus, based on a detection by the information processing apparatus of the registered authentication key information from the first nearby device, retrieval by the information processing apparatus of the second nearby device information from the second nearby device, and the movement status.
1 Assignment
0 Petitions
Accused Products
Abstract
An information processing apparatus includes a key information table memory for storing, in a key information table, key information including first identification information identifying a first nearby device communicating with the information processing apparatus, a communication unit for communicating with a second nearby device present at a location where the second nearby device is communicable with the information processing apparatus, a nearby device information retrieval unit for retrieving nearby device information including second identification information identifying the second nearby device, a movement halt detector for detecting a movement status of the information processing apparatus, a functional limitation determiner for determining, based on the key information, the nearby device information, and/or the movement status, whether to limit execution of a process of a function of the information processing apparatus and a functional limitation executer for controlling the execution of the process based on the determination results.
8 Citations
20 Claims
-
1. An information processing apparatus, comprising:
-
a memory that registers, in an authentication key information table, authentication key information including first identification information identifying a first nearby device capable of communication with the information processing apparatus; a transmitter to communicate with devices; and a computer processor operable to; communicate with a second nearby device to retrieve second nearby device information including second identification information identifying the second nearby device; detect a movement status of the information processing apparatus; and determine whether to limit a functionality of the information processing apparatus, based on a detection by the information processing apparatus of the registered authentication key information from the first nearby device, retrieval by the information processing apparatus of the second nearby device information from the second nearby device, and the movement status. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A security method to be executed by a computer, the security method comprising:
-
registering, in an authentication key information table in a memory, authentication key information including first identification information of a first nearby device capable of communication with the computer; communicating with a second nearby device for retrieving second nearby device information including second identification information identifying the second nearby device; detecting a movement status of the computer; and determining whether to limit a functionality of the computer, based on a detection by the information processing apparatus of the registered authentication key information from the first nearby device, retrieval by the information processing apparatus of the second nearby device information from the second nearby device, and the movement status.
-
-
20. A non-transitory storage medium storing a security program that causes a computer to execute:
-
registering, in an authentication key information table in a memory, authentication key information including first identification information of a first nearby device capable of communication with the computer; communicating for a second nearby device for retrieving second nearby device information including second identification information identifying the second nearby device; detecting a movement status of the computer; and determining whether to limit a functionality of the computer, based on a detection by the information processing apparatus of the registered authentication key information from the first nearby device, retrieval by the information processing apparatus of the second nearby device information from the second nearby device, and the movement status.
-
Specification