1. Field of the Invention
The present invention relates to an electronic apparatus, an information managing method and an information managing program, and, in particular, to an electronic apparatus, an information managing method and an information managing program, for enciphering and deciphering information with the use of a key generated from a seed.
2. Description of the Related Art
Recently, security management for personal information managed by a user, such as user information, an address book or such, has become important. For example, personal information held in a general purpose device such as a hard disk drive is enciphered and managed. A seed for generating a key for enciphering (simply referred to as an ‘enciphering key’ hereinafter) is set in each of electronic apparatuses enciphering and managing personal information. The electronic apparatus generates the enciphering key from the seed, converts personal information with the use of the enciphering key into different data, and thus, increasing the security level.
An electronic apparatus in the related art has a function of backing up an address book in a lump, and restoring the same upon a recovery from a breakage or replacement of storage. In such an electronic apparatus, the security level may be increased as a result of the address book being enciphered. Such a backing up/restoring function may also be used for a case where a common address book is replicated, and then, is registered in a plurality of electronic apparatuses. Japanese Laid-open Patent Applications Nos. 2004-30315 and 2004-152262 disclose examples of increasing a security level.
The same as for a password, the seed applied for generating the enciphering key for user information or an address book may be forgotten by a user, or, the user may erroneously input the seed in the electronic apparatus. Therefore, actually, to set different seeds in respective apparatuses by a user may be difficult, in a managing viewpoint. However, in a case where the user sets a single common seed for all the electronic apparatuses because the user wishes to become free from a troublesome of setting a different seed for each apparatus, respective sets of personal information stored in the respective electronic apparatuses may be leaked at once and used for a bad purpose merely if the single common seed is known by a third person by accident.
The present invention has been devised in consideration of the above-mentioned problem, and an object of the present invention is to provide an electronic apparatus, an information managing method and an information managing program, by which a key for enciphering and deciphering information can be easily generated, while a security level can be increased.
According to the present invention, an electronic apparatus managing first information sharable among a plurality of users, includes an enciphering/deciphering part generating a key for enciphering and deciphering the first information for each of operational scopes of the first information, with at least one combination of second information previously set in the own apparatus as a seed, and enciphering and deciphering the first information with said key.
The enciphering/deciphering part may allow a user to specify the operational scope of the first information, and encipher the first information with the use of said key corresponding to said operational scope; and when deciphering the thus-enciphered first information, it may try deciphering with the key corresponding to each of the operational scopes of the first information in sequence, and set the operational scope of the first information for which the deciphering is thus succeeded in, for the key with which the deciphering is thus succeeded in.
The enciphering/deciphering part may generate the key with a combination of information, unique to the apparatus, which the user cannot change, and information, which the user can change, as a seed.
The information, unique to the apparatus, which the user cannot change, may be made of information concerning a manufacturer or a selling agency of the electronic apparatus and information uniquely identifying the apparatus.
The information, unique to the apparatus, which the user cannot change, may be made of a manufacturer name, a model name and a serial number.
The information which the user can change may include company information, division information and manager information.
The operational scope of the first information may include a scope only for the apparatus alone, a scope only for each manager, a scope common within a company, and a scope common within a division.
The first information may be address-book information.
The enciphering/deciphering part may allow a user to specify the operational scope of the first information, enciphers the first information with the key corresponding to the operational scope of the first information, and back up the first information;
may decipher with the key corresponding to the operational scope of the first information, and restore the first information in the electronic apparatus within the operational scope.
Further, according to the present invention, an information managing method for managing first information sharable by a plurality of users, includes: key generating step of generating a key for enciphering and deciphering the first information for each of operational scopes of the first information, with at least one combination of second information previously set in the own apparatus as a seed; and an enciphering/deciphering step of enciphering and deciphering the first information with the key.
The enciphering/deciphering step may include an enciphering step of allowing a user to specify the operational scope of the first information, and enciphering the first information with the use of the key corresponding to the operational scope; a deciphering step of deciphering the thus-enciphered first information, by trying to decipher with the key corresponding to each of the operational scopes of the first information in sequence; and setting the operational scope of the first information for which the deciphering is thus succeeded in, for the key with which the deciphering is thus succeeded in.
The enciphering/deciphering step may generate the key with a combination of information, unique to the apparatus, which the user cannot change, and information, which the user can change, as a seed.
The information, unique to the apparatus, which the user cannot change, may include information concerning a manufacturer or a selling agency of the electronic apparatus and information uniquely identifying the apparatus.
The information, unique to the apparatus, which the user cannot change, may include a manufacturer name, a model name and a serial number.
The information which the user can change may include company information, division information and manager information.
The operational scope of the first information may be a scope only for the apparatus itself, a scope only for each manager, a scope common within a company, and a scope common within a division.
The first information may be address-book information.
The enciphering/deciphering step may include: a backing up step of allowing a user to specify the operational scope of the first information, enciphering the first information with the key corresponding to the operational scope of the first information, and backing up the first information; a restoring step of deciphering with the key corresponding to the operational scope of the first information, and restoring the first information in the electronic apparatus within the operational scope.
According to the present invention, in an information managing program executed by an electronic apparatus, configured to include a storage and a processing unit, which manages first information sharable by a plurality of users, the storage storing the first information and second information previously set in the electronic apparatus; and the processing unit executing: a key generating step of generating a key for enciphering and deciphering the first information for each of operational scopes of the first information, with at least one combination of second information previously set in the own apparatus as a seed; and an enciphering/deciphering step of enciphering and deciphering the first information with the key.
The enciphering/deciphering step may include an enciphering step of allowing a user to specify the operational scope of the first information, and enciphering the first information with the use of the key corresponding to the operational scope; a deciphering step of deciphering the thus-enciphered first information, by trying to decipher with the key corresponding to each of the operational scopes of the first information in sequence; and setting the operational scope of the first information for which the deciphering is thus succeeded in, for the key with which the deciphering is thus succeeded in.
In the electronic apparatus according to the present invention, a key for enciphering and deciphering the first information is generated for each of operational scopes of the first information, with at least one combination of second information previously set in the own apparatus as a seed, and enciphering and deciphering the first information with the key.
As a result, management of the key is not required, and also, the key which is not fixed but variable can be easily generated for each operational scope of the first information. Accordingly, a security level is increased.
Further, in the electronic apparatus according to the present invention, the operational scope of the first information may be specified by a user, and the first information may be enciphered with the use of the key corresponding to the operational scope; and, upon deciphering of the thus-enciphered first information, deciphering may be tried with the key corresponding to each of the operational scopes of the first information in sequence, and the operational scope of the first information for which the deciphering is thus succeeded in may be set for the key with which the deciphering is thus succeeded in.
As a result, the operational scope for which deciphering is succeeded in can be easily set.
Further, in the electronic apparatus according to the present invention, the key may be generated, with a combination of information, unique to the apparatus, which the user cannot change, and information, which the user can change, as a seed.
Thus, the key corresponding to the operational scope of the first information can be generated.
Further, in the electronic apparatus according to the present invention, the information, unique to the apparatus, which the user cannot change, may be made of information concerning a manufacturer or a selling agency of the electronic apparatus and information uniquely identifying the apparatus.
As a result, the enciphered first information can be shared among the apparatuses belonging to the predetermined operational scope.
Further, in the electronic apparatus according to the present invention, the information, unique to the apparatus, which the user cannot change, may be made of a manufacturer name, a model name and a serial number.
Further, in the electronic apparatus according to the present invention, the information which the user can change may include company information, division information and manager information.
As a result, a variation of the operational scope of allowing the first information to be shared can be made to correspond to the actual user's environment, organization or such.
Further, in the electronic apparatus according to the present invention, the operational scope of the first information may be a scope only for the apparatus itself, a scope only for each manager, a scope common within a company, and a scope common within a division.
Further, in the electronic apparatus according to the present invention, the first information may be address-book information.
Further, in the electronic apparatus according to the present invention, the enciphering/deciphering part may allow a user to specify the operational scope of the first information, encipher the first information with the key corresponding to the operational scope of the first information, and back up the first information; may decipher with the key corresponding to the operational scope of the first information, and restore the first information in the electronic apparatus belonging to the operational scope.
A method, an apparatus, a system, a computer program, an information recording medium, a data structure and so forth, which apply elements, expressions, or any combinations of elements of the present invention, may correspond to respective modes of the present invention.
According to the present invention, an electronic apparatus, an information managing method and an information managing program may be provided, by which a key for enciphering and deciphering information can be easily generated, while a security level can be increased.
Other objects and further features of the present invention will become more apparent from the following detailed description when read in conjunction with the accompanying drawings:
A best mode for carrying out the present invention will now be described with reference to figures. For an embodiment of the present invention, description is made below for a digital copier (simply referred to as a ‘copier’, hereinafter) is applied as one example of an electronic apparatus. However, an electronic apparatus according to the present invention may be instead any other type of an electronic apparatus.
The main control board 200 includes an MPU (micro processing unit) 301 as a center of control, an NV-RAM (non volatile RAM) 302, a ROM (read only memory) 303 and a RAM (random access memory) 304.
To the main control board 200, the scanner unit 201, the ADF 202, the operating part 203, the HDD 208, the NIC 205, the paper feeding unit 206, the both side unit 207, the finisher 208 and the memory card unit 220 are connected. Via a special control LSI, each thereof carries out data transmission/reception, or data reading/writing, with the use of a controller board, not shown.
The I/O control board 209 is connected with the main control board 200 by a bus. To the I/O control board 209, the image forming writing unit 210, the high voltage power source 211, the fixing unit 212, the motor 213, the fan 214, the actuator 205 and the sensor 216 are connected.
The motor 213, the fan 214 and the actuator 215 are driven by output signals of the main control board 200 via the I/O control board 209. The sensor 216 transmits an input signal to the main control board 200 via the I/O control board 209. The image forming writing unit 210, the high voltage power source 211 and the fixing unit 212, for forming an image from image data, are controlled by the main control board 200 via the I/O control board 209.
In the HDD 204, user information, i.e., a so-called address book, is stored, which may be used by a facsimile application or scanner application function. To/from the memory card unit 220, a memory card 221 may be inserted or removed. When the memory card 221 is inserted in the memory card unit 220, the main control board 200 can write data to/read data from the memory card 221.
In the ROM 204, an enciphering program for enciphering/deciphering data is stored. The enciphering program is one example of an information managing program according to the present invention. In an enciphering algorithm in the enciphering program, an enciphering key having a predetermined data length can be designated.
When the initial set key 57 on the operating part 203 is pressed, an initial setting page 400 is displayed on the liquid crystal touch panel 51.
On the initial setting page 400, buttons 401 through 403 for various sorts of setting or executing operation are displayed. When the user presses any one of these buttons 401 through 403, any one of pages described later is then displayed, corresponding to the pressed one of the buttons 401 through 403. The user may carry out execution of a function, various sorts of setting, or check operation, onto the page displayed on the liquid crystal touch panel 51.
When the button 401 on the initial setting page 400 is pressed, an installation/management information setting page 410 of
When a change button 411 is pressed on the installation/management information setting page 410, a soft keyboard, with which Japanese language characters or alphanumeric characters may be input, is displayed on the liquid crystal touch panel 51. With the use of the soft keyboard, the user may input, as items of the user information, company information, division information, manager information or such. When the soft keyboard is closed, the user information thus input with the use of the soft keyboard is displayed in an input frame of the installation/management information setting page 410.
After thus inputting the necessary items of user information, upon a set button in the installation/management information setting page 410 being pressed, the input user data is stored, for example, in the NV-RAM 302. When a return button is pressed, the input user information is deleted.
When a button 402 is pressed on the initial setting page 400, an address book backing up page 420 shown in
From the address backing up page 420, the user allows to designate, as the operational scope of the address book, one from among a scope only for the apparatus itself, a scope only for each manager, a scope common within the company and a scope common within a division. A button 421 is used for designating the operational scope of the address book as the scope only for the apparatus itself. A button 422 is used for designating the operational scope of the address book as the scope only for each manager. A button 423 is used for designating the operational scope of the address book as the scope common within the company. A button 424 is used for designating the operational scope of the address book as the scope common within a division.
When the operational scope of the address book is thus designated as any one of the scope only for each manager, the scope common within the company and the scope within a division, the operational scope of the address book is determined according to the manager information, company information, or the division information set from the installation/management information setting page 410. When the user selects any one of the buttons 421 through 424, and presses an execute button of the address book backing up page 420, the copier starts address book backing up processing.
The address book backing up processing is carried out by the enciphering program 500 of
The company information, the division information and the manager information is information which the user can change. For example, the user may change it from the installation/management information setting page 410. The manufacturer name, the model name and the serial number is information which the user cannot change. The manufacturer name is information uniquely identifying the manufacturer. The model name is information uniquely identifying the model of the copier. The serial number is information which is set when the copier is shipped, and is unique to each particular product.
The enciphering program generates the enciphering key with a combination of at least one of the manufacturer name, the model name, the serial number, the company information, the division information and the manager information, as a seed. The seed for generating the enciphering key may be set for each operational scope of the address book, as shown in
For example, for a case where the operational scope of the address book is the scope only for the apparatus itself, the seed is a combination of the manufacturer name, the model name and the serial number as shown in
The key generating part 504 reads out, according to the specific operational scope of the address book selected by means of the buttons 421 through 424 of the address book backing up page 420, a combination of at least one of the manufacturer name, the model name, the serial number, the company information, the division information and the manufacturer information, from the NV-RAM 302 or the ROM 303. Thus, the seed for generating the enciphering key is obtained.
The key generating part 504 joins the combination of at least one of the manufacturer name, the model name, the serial number, the company information, the division information and the manufacturer information, thus read out, together. After that, the key generating part 504 obtains a reduced data (hash value) with the use of a digest generating algorithm such as SHA1, MD5 or such.
Then, the key generating part 504 generates the enciphering key in a length required for enciphering and deciphering information, from the thus-obtained hash value. The enciphering key thus generated employs both the information which the user cannot change and the information which the user can change. Accordingly, analogizing of the enciphering key may not easily be achieved.
Returning to
Then, in Step S13, the control part 503 writes the thus-enciphered address book data in the memory card 221 as backup data. Then, in Step S14, the control part 503 applies the UI 501 for displaying a result page indicating a result of the address book backing up processing on the liquid crystal touch panel 51.
When a button 403 of the initial setting page 400 is pressed, an address book restoration page 430 of
In Step S22, the control part 503 determines whether or not the deciphering of the backup data has been succeeded in. The determination as to whether or not the deciphering of the backup data has been succeeded in can be carried out, by a search of the thus-obtained data for a text which should be necessarily included in the backup data, i.e., for example, the manufacturer name, the model name or such.
When the deciphering has not been succeeded in (No in Step S22), the control part 503 applies the key generation part for deciphering the backup data with the use of the enciphering key, generated for a case where an operational scope of an address book is set only for each manager, in Step S23.
In Step S24, the control part 503 determines whether or not the deciphering of the backup data has been succeeded in. When the deciphering has not been succeeded in (No in Step S24), the control part 503 applies the key generation part for deciphering the backup data with the use of the enciphering key, generated for a case where an operational scope of an address book is set common within the company, in Step S25.
In Step S26, the control part 503 determines whether or not the deciphering of the backup data has been succeeded in. When the deciphering has not been succeeded in (No in Step S26), the control part 503 applies the key generation part for deciphering the backup data with the use of the enciphering key, generated for a case where an operational scope of an address book is set common within a division, in Step S27.
In Step S28, the control part 503 determines whether or not the deciphering of the backup data has been succeeded in. When the deciphering has not been succeeded in (No in Step S27), the control part 503 uses the UI 501 for displaying a result page of
On the other hand, when the deciphering has been succeeded in (Yes in any of Steps S22, S24, S26 and S28), the control part 503 writes the thus-obtained deciphered backup data in the HDD 204, in Step S30. It is noted that the operational scope of the address book, thus written in the HDD 204 in Step S30, may be set to correspond to the enciphering key, with which the deciphering of the backup data was thus succeeded in. Then, in Step S31, the control part 503 uses the UI 501 for displaying a result page of
In the address book restoration processing in
For example, when an address book is backed with a designation of the operational scope thereof only for the apparatus itself, the seed of the enciphering key includes information unique to the apparatus itself, which the user cannot change (see
When the operational scope of an address book is only for an apparatus itself as in an apparatus A, the address book information backed up in the apparatus A cannot be restored in any apparatus other then the apparatus A. This is because, when the operational scope of the address book is only for the apparatus itself, the seed is made of the combination of the manufacturer name, the model name and the serial number (see
When the operational scope of the address book is only for each manager as in an apparatus B1, address information backed up in the apparatus B1 can be restored in an apparatus A, but cannot be restored in any apparatus other than the apparatuses A and B1. This is because, when the operational scope of the address book is only for each manager, the seed is made of the combination of the manufacturer name, the model name, the company information and the manager information (see
For example, the apparatus A and the apparatus B1 are common in the manufacturer name, the model name, the company information and the manager information (see
When the operational scope of the address book is within the company as in an apparatus D, address information backed up in the apparatus D can be restored in any of the apparatuses A, B1, B2, C1, C2 and D, but cannot be restored in an apparatus X. This is because, when the operational scope of the address book is set within the company, the seed is made of the combination of the manufacturer name, the model name and the company information.
The apparatuses A, B1, B2, C1, C2 and D are common in the manufacturer name, the model name and the company information. Accordingly, these apparatuses have the identical enciphering keys. On the other hand, the company information (company name) is different between the apparatus X and the apparatus D, and thus, these apparatuses have the different enciphering keys.
When the operational scope of the address book is within a division as in the apparatus C1, address information backed up in the apparatus C1 can be restored in any of apparatuses C1 and C2, but cannot be restored in any apparatuses other than the apparatuses C1 and C2. This is because, when the operational scope of the address book is within the division, the seed is made of the combination of the manufacturer name, the model name, the company information and the division information.
The apparatuses C1 and C2 are common in the manufacturer name, the model name, the company information and the division information. Accordingly, these apparatuses have the identical enciphering keys. On the other hand, the division information (division names) is different between the apparatuses C1/C2 and the apparatuses other than those C1/C2, and thus, they have the different enciphering keys.
Thus, in a copier according to the present invention, both previously set information unique to the apparatus, which a user cannot change, and information which the user can change, are used as a seed. Accordingly, analogizing of the enciphering key is very difficult. As a result, a security strength of the address book backup data can be increased. Further, since the copier according to the present invention applies the previously set information as a seed for an enciphering key, generation of the enciphering key becomes easier. As a result, for the copier according to the present invention, management of enciphering keys is not required.
According to a copier in the present invention, the operational scope of the address book is designated, and, then, a combination of at least one information, previously set in the copier, can be utilized to correspond to the thus-designated operational scope. As a result, the user becomes free from especially setting a seed for an enciphering key.
Further, according to a copier in the present invention, a combination of at least one information previously set in the copier can be utilized as a seed for an enciphering key. As a result, a variation of an operational scope, in which address book backup information can be shared, can be made to correspond to an actual user's environment/organization. Further, according to the copier in the present invention, the operational scope in which the address book backup data can be shared can be positively shown to the user while the seed for the enciphering key is hidden, for example, through Steps S21 through S28 of
The enciphering program 500 according to the present invention may also be executed by a personal computer (PC). The above-mentioned enciphered/deciphered information may not be only address book information, but also, document information, image information or such.
The input device 31 includes a keyboard, a mouse and so forth, and is used for inputting various sorts of signals. The output device 32 includes a display device or such, and is used for displaying various sorts of windows, data and so forth. The interface unit 37 includes a modem, a LAN card and so forth, and is used for connecting with a communication network.
The enciphering program 500 according to the present invention is at least a part of various sorts of programs prepared for controlling the PC. The enciphering program 500 may be loaded as a result of it being dispatched via a recording medium 38, or downloaded via the communication network, in the PC.
As the recording medium 38 to store the enciphering program 500 for the purpose of dispatching, various types of recording media may be applied, for example, recording media optically, electrically or magnetically storing information, such as a CD-ROM, a flexible disk, a magneto-optical disk and so forth; and semiconductor memories electrically storing information such as a ROM, a flash memory, and so forth.
When the recording medium 38 storing the enciphering program 500 is set in the drive 33, the enciphering program 500 is installed in the secondary storage 34 via the drive 33. The enciphering program 500 downloaded via the communication network is installed in the secondary storage 34 via the interface unit 37. The PC stores the enciphering program 500 thus installed, and also, stores the necessary files, data and so forth.
The memory device 35 stores the enciphering program 500 read out from the secondary storage 34 upon starting up of the PC. Then, the processing unit 36 carries out various sorts of processing according to the enciphering program 500, described above, stored in the memory device 35.
The present invention is not limited to the embodiments specifically described above, and variations and modifications may be made without departing from the basic concept of the present invention claimed below. In the embodiments described above, the enciphering program 500 executes all the processing shown in
The present application is based on Japanese Priority Applications Nos. 2005-041100 and 2006-030290, filed on Feb. 17, 2005 and Feb. 7, 2006, respectively, the entire contents of which are hereby incorporated herein by reference.
Number | Date | Country | Kind |
---|---|---|---|
2005-041100 | Feb 2005 | JP | national |
2006-030290 | Feb 2006 | JP | national |