Exemplary embodiments of the present invention are explained in detail with reference to the accompanying drawings.
The user interface 12 is an input/output processing unit for input and output performed by a user, which is realized through, for example, a power switch 12a, operation buttons 12b, a display unit 12c, and the like, as shown in
The HDD connecting unit 13 is an input/output unit that performs data transmission and reception to and from the HDD 2, and is connected physically to the HDD 2 with, for example, a flat cable.
The algorithm storing unit 14 stores therein an algorithm for creating a password to be used for locking the HDD 2. It is preferable that a one-way function (for example, SHA-1, MD5, RSA, elliptic curve function, and the like) is used for the algorithm.
The main control unit 11 is a controlling unit that controls the entire information leak-preventing apparatus 1, and includes a password creating unit 11a and a lock processing unit 11b. The password creating unit 11a performs a process of creating the password using information related to the HDD 2 and the algorithm stored in the algorithm storing unit 14.
The lock processing unit 11b uses the password created by the password creating unit 11a to perform the process of locking that prevents reading of data from the HDD 2.
The HDD 2 stores therein information such as a unique identification number (for example, serial number), model number, capacity, manufacturing information (date of manufacturing, manufacturing factory, and the like). It is possible to set up a different password for each HDD by reading medium information related to the HDD 2 and creating a password according to a predetermined algorithm.
As shown in
During an unlock process, an information leak-preventing apparatus 1a, which is in locked state, reads the medium information x from the HDD 2, creates the password f(x) according to the algorithm f, and unlocks the HDD 2. At this time, the password used for locking and that for unlocking is compared in the HDD 2. If the two passwords match, the lock is released, and only then the data can be read from the HDD 2.
Thus, because passwords are created every time locking or unlocking is performed by using the medium information in the HDD 2, there is no need to store the password in the information leak-preventing apparatus. Therefore, even if the information leak-preventing apparatus is obtained and the information stored therein is analyzed by a third person, the third person cannot acquire the password. Furthermore, as compared to the configuration that includes storing different passwords for each HDD, it is possible to largely reduce the storage area necessary in the information leak-preventing apparatus.
Moreover, because a different password is used for each HDD, for example, even if the third person obtains the information leak-preventing apparatus along with the HDD 2, and acquires a password from a bus monitor in an unauthorized manner, the third person can unlock only the HDD 2, and even if other HDDs is locked by using the same information leak-preventing apparatus, it is possible to prevent unauthorized unlocking of the other HDDs.
In anticipation of the possibility of an algorithm being analyzed, it is desirable to make the provision for alteration of the algorithm, which has been stored in the algorithm storing unit 14.
The medium information that is to be used for creating the password can be selected randomly from the variety of above-mentioned information. Moreover, if a plurality of pieces of information is selected, a random combination of the selected information can be used to create an algorithm that is difficult to be analyzed.
In such a case, at the time of unlock, because the medium information used for creating the password is unknown, the user needs to try unlocking by using a plurality of password candidates. In other words, in exchange for the improvement in the confidentiality, unlocking process becomes complicated.
However, when the storage medium is to be disposed, because release of lock is not a precondition, and lock needs to be released only when it is necessary, processing load for the unlocking process is less.
Similarly, when the storage medium is taken for repairing, generally, the user is provided with an alternative storage medium, and the data is transferred to the alternative storage medium. Most of the time, because the storage medium that is to be repaired is taken out, an increase in processing load is negligible as in the case of disposing of the storage medium.
It is that the information leak-preventing apparatus 1 used for locking and the information leak-preventing apparatus 1a used for unlocking are different. Moreover, it is preferable that the information leak-preventing apparatus 1 used for locking includes only lock function, i.e., does not include unlock function. The information leak-preventing apparatus used for unlocking can include lock function; because, it is a precondition that it is under a strict management. However, it is preferable that the information leak-preventing apparatus used for unlocking includes only unlocking function.
Detailed explanation regarding process in the information leak-preventing apparatus 1 is provided with reference to a flowchart shown in
The information leak-preventing apparatus 1 uses the acquired medium information and the algorithm stored in the algorithm storing unit 14 to create a password (step S103) and locks the HDD 2 (step S104) by using the created password.
The information leak-preventing apparatus 1 issues a read command to the HDD 2 and confirms whether data reading is impossible (step S105). If the data reading is impossible (Yes at step S105), then, the information leak-preventing apparatus 1 turns off the power of the HDD 2 (step S106), and displays a message indicating normal completion of lock (step S107). Thus, the process is completed.
If reading of the data is not impossible (No at step S105), the information leak-preventing apparatus 1 turns off the power of the HDD 2 (step S108), and displays a message indicating abnormal completion of lock, in other words, displays a message that the HDD 2 could not be locked (step S109). Thus, the process is completed.
While the lock process is explained above, the unlock process is performed in the same manner as the lock process and explanation thereof is omitted.
As mentioned above, the information leak-preventing apparatus according to the embodiment acquires the medium information from the HDD 2 and creates the password according to the stored algorithm. The process of lock and unlock of the HDD 2 is performed using the created password. Thus, confidentiality is improved against the unauthorized reading of the information by the third person, and the information is restored to a state in which the information can be read again when necessary.
While the present invention has been described with reference to a few specific embodiments, the description is illustrative of the invention and is not to be construed as limiting the invention. The present invention can be arbitrarily changed or modified. For example, any character string or date can be used to create a password.
According to one aspect of the present invention, it is possible to improve confidentiality against unauthorized reading by a third person, and to restore the information to a state in which the information can be read again when necessary.
Moreover, it is possible to improve confidentiality against unauthorized reading by a third person, and to restore the information to a state in which the information can be read again when necessary.
Furthermore, it is possible to improve confidentiality against unauthorized reading by a third person.
Moreover, it is possible to improve confidentiality against unauthorized reading by a third person.
Furthermore, it is easy to create a robust password and prevent unauthorized reading of the information from the storage medium.
Moreover, it is possible to improve confidentiality against unauthorized reading by a third person, and to restore the information to a state in which the information can be read again when necessary.
Although the invention has been described with respect to a specific embodiment for a complete and clear disclosure, the appended claims are not to be thus limited but are to be construed as embodying all modifications and alternative constructions that may occur to one skilled in the art that fairly fall within the basic teaching herein set forth.
Number | Date | Country | Kind |
---|---|---|---|
2006-266079 | Sep 2006 | JP | national |