×

Digital multi-function peripheral and data protection method of external memory

  • US 9,672,386 B2
  • Filed: 06/03/2014
  • Issued: 06/06/2017
  • Est. Priority Date: 06/03/2014
  • Status: Expired due to Fees
First Claim
Patent Images

1. A digital multi-function peripheral, comprising:

  • an operation panel configured to receive an operation input;

    an interface configured to connect an external memory device;

    a data storage configured to store data;

    a memory configured to store a command executed by a processor; and

    a processor configured to execute the command stored in the memory;

    whereinthe processor holds an authentication information of a user who connects the external memory device,disables an input on the operation panel in a first case where the external memory device is attached when the user logs out,encrypts data in the external memory device in a second case where removal of the external memory device is not detected within a given period of time after the input on the operation panel is disabled,stores the data obtained by encrypting the data in the external memory device in the data storage,erases the data in the external memory device, andenables the input on the operation panel after the encrypted data is stored in the data storage,wherein the operation panel includes a display,the processor displays, on the display,a warning indicating that the external memory device is to be removed in the first case where the external memory device is attached when the user logs out,the processor generates a first hash value from information containing the authentication information of the user who connects the external memory device in a third case where a state of connection of the external memory device with the interface satisfies a data saving condition,encrypts the data in the external memory device using the first hash value,stores the data obtained by encrypting the data in the external memory device using the first hash value in the data storage,generates a second hash value from the authentication information input by the user after the encrypted data is stored in the data storage, anddecrypts the encrypted data stored in the data storage based on the second hash value.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×