Abstract:
To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules 131 to 133 included in an apparatus 100 each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server 200. The monitoring patterns are restructured by the update server 200 such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.
Abstract:
The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions thereof. The detection modules of the present invention perform tamper detection by verifying whether or not the correspondence between the input and output data of the application decryption process performed by the protection control module is correct. Furthermore, the present invention offers improved security against leaks of the application output data by the detection modules by having a plurality of detection modules verify different data blocks.
Abstract:
PROBLEM TO BE SOLVED: To provide a software update system for updating software more securely by enhancing reliability to software update processing in an apparatus. SOLUTION: An update server 200 obtains from the apparatus 100 a verification result relating to alteration of each update module included in a protection control module 120 and an update module group 130. The update server 200 determines a processing sequence of the apparatus 100 in accordance with an obtained verification apparatus. Concretely, when it is determined that both the protection control module 120 and the update module are improper, the update server 200 transmits an instruction to update the improper protection control module 120 to the apparatus 100 giving priority to the invalidation of the improper update module. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an alteration monitoring system with which an altered monitoring module can be identified without having increased amount of operations.SOLUTION: An information security apparatus 100c has a plurality of monitoring modules monitoring the alteration. A management device 200c includes a reception part 230c receiving monitoring results with respect to other monitoring modules by each monitoring module from the information security apparatus 100c, a detection part 220c detecting the abnormality using a part of monitoring results from the monitoring results received, a monitoring module of generation source of the monitoring results relating to the abnormality detected in the case in which the abnormality is detected, and a identification part 210c identifying the altered monitoring module from the monitoring modules identified by successively tracking the monitoring results from the corresponding monitoring module as the starting point to the generation source.