摘要:
According to one embodiment, a storage device that has a nonvolatile semiconductor memory includes an authentication information storage unit that previously stores first apparatus authentication information to authenticate an authorized host device and first user authentication information to authenticate an authorized user. The storage device executes apparatus authentication on the basis of second apparatus authentication information received from a newly connected host device and the first apparatus authentication information in the authentication information storage unit and executes an invalidation process of user data stored in the nonvolatile semiconductor memory, when the apparatus authentication is failed.
摘要:
According to one embodiment, a storage device includes, when power is supplied to a storage unit, counting of an elapsed time is started. If a command is input from a host device, and the elapsed time from input of a previous command to input of a current command is calculated based on time information clocked by the host device and on a counter value counted until the corresponding command is input. Matching of the time information is determined based on a temporal relation between the adding result of adding the calculated elapsed time to the time information included in the previous command and the time information included in the current command. When the mismatching is determined, data in the storage unit is invalidated.
摘要:
A storage system includes first and second expanders for connecting storage units, each of the first and second expanders being connected cascade each other, a first controller connected one of the first and one of the second expanders and a host, a second controller connected the one of the second expanders, the one of the first expanders and the host, the second controller detecting a failure of at least one of the first controller, the first expanders and the second expanders, the second controller selectively controlling a first boot sequence which boots the first controller after the first expanders have been booted and a second boot sequence which boots the first controller before the first expanders have been booted, determining one of the first boot sequence and the second boot sequence on the basis of a place where a failure has occurred in a recovery process.
摘要:
An information access control method is presented by which access to certain specified information on an information system is restricted by means of the authentication of external recording media. The information access control method that accesses information data on an information system by using an external recording medium includes the steps of, wherein system user information is recorded onto the external recording medium, and the corresponding user information is also registered in advance on the information system, comparing the system user information sent by the connection request with the registered system user information, when the system user information is sent to the information system as a connection request from the external recording medium, and allowing the external recording medium access to the information data on the system within the limits specified by the aforementioned system user information, if the results of the comparison match.
摘要:
In case that software is written on a recording medium at physical addresses thereof in units of a prescribed size and the software is subsequently executed upon being read out of the recording medium from the physical addresses in the order of logical addresses, the corresponding relationship between the logical addresses of the software and the physical addresses conforming to the logical addresses, as well as a checking program for preventing unlawful use of the software, is added on to the main body of the software, which is then recorded on an original. Before execution of the software that has been recorded on a recording medium (the original or a copy), the corresponding relationship between the logical and physical addresses on this recording medium is obtained by the checking program. The corresponding relationship obtained and the corresponding relationship that has been added to the software are compared. If the two agree, it is deemed that the recording medium is the original and execution of the main body of the software is allowed. If the two do not agree, execution of the main body of software is not allowed.
摘要:
In a method for preventing unauthorized use of a recording medium having a user accessible area and a user inaccessible area, first information is read from the user inaccessible area of the recording medium. The first information is compared with second information concerning a true recording medium (lawfully produced copy). It is then concluded that the recording medium is the true recording medium when the first information corresponds to the second information.
摘要:
A whitening cosmetic comprises kojic acid and cyclodextrins in addition to cosmetic base materials. The kojic acid may be included in cyclodextrins before being incorporated into the cosmetic. The cosmetic has an improved stability against coloring with the passage of time and an enhance whitening effect. The cosmetic can be a toilet lotion, a cosmetic cream, a milky lotion, a pack, etc., for application to human skin.