Abstract:
PURPOSE: To obtain a sufficient conversion function and speed even if the size of a KANA/KANJI conversion dictionary is small by integrally generating the KANA/KANJI dictionary as a program. CONSTITUTION: A CPU 102, a RAM 104, a keyboard 106, a display device 108, a hard disk 110, a floppy disk driver 112 or the like are connected to a bus 101. Alphanumerics keys, mark input keys, KANJI keys for inputting a KANA/ KANJI conversion mode, conversion keys for indicating a KANA/KANJI conversion processing after 'reading' is inputted are provided on the keyboard 106. The KANA/KANJI conversion dictionary is integrally generated as the program containing a retrieval function with such constitution. The KANA/KANJI conversion dictionary program is compiled as a dynamic link library routine(DLL) especially under an operating system for supporting the DLL, and the dictionary retrieval function is usably exported by the other program.
Abstract:
An information processing device that performs authentication processing with a mounted authentication device that securely stores unique identification information, comprises a mounting component, a memory component which stores a table with correspondent listing of the unique identifier information of the authentication device and a count value, and a control component which, when power is activated (boot), starts by reading a first program ST1 (such as a BIOS), and reads the identification information of the mounted authentication device, references the table, and if the count value is larger than a prescribed value ST2, performs authentication processing for the authentication device ST3, and when authentication has succeeded starts by reading a second program ST4 (such as an OS), and if the authentication device continues to be mounted ST5, decreases the table count value ST6 that corresponds to the unique identification information of the authentication device. Re-authentication processing ST7 may be performed, which restricts or stops the second program if failed. This encourages the user to remove the authentication device after authentication, thus preventing the information processing device from being lost or stolen with the device still mounted.
Abstract:
Eine Aufgabe der vorliegenden Erfindung ist die Bereitstellung eines Verfahrens zum Einrichten einer sicher verwalteten Ausführungsumgebung für eine virtuelle Maschine und eines hierfür verwendeten Programms. Nachdem ein Programm, in dem ein Mittel zum selektiven Maskieren eines Fensterbildschirms einer virtuellen Maschine und eine Sicherheitsfunktion integriert sind, mit Administratorberechtigung in einem Host-Betriebssystem einer Benutzerdatenstation installiert wurde, wird ein Programm mit einer integrierten Sicherheitsfunktion, die der Administrator in der virtuellen Maschine einrichten möchte, und einem integrierten Mittel zum Freigeben der Maske für einen Benutzer bereitgestellt. Wenn eine solche Situation vom Administrator geschaffen wird, kann der Benutzer, der eine virtualisierte Umgebung verwenden möchte, nicht umhin, das Installieren der Sicherheitsfunktion, deren Installation vom Administrator gewünscht wird, in der virtuellen Maschine zu akzeptieren.
Abstract:
PROBLEM TO BE SOLVED: To provide an information processing device, a control method, and a program which can minimize a security risk.SOLUTION: When a power supply is turned on, a control unit 15 reads out a first program from a first storage unit 12, and starts the first program. According to the first program, the control unit 15 reads out identification information of an authentication device 2 attached to an attachment unit 11, refers to a table T to verify a counter value associated with the identification information of the authentication device 2 is greater than a predetermined value, and performs authentication processing with the authentication device 2. When the counter value is greater than the predetermined value and the authentication is successful, the control unit 15 reads out a second program from a second storage unit 13, and starts the second program. While running the second program, if the authentication device 2 is continuously attached to the attachment part 11, the control unit 15 subtracts the counter value associated with the unique identification information of the authentication device 2 in the table.
Abstract:
PROBLEM TO BE SOLVED: To provide protection against unauthorized access.SOLUTION: A system comprises: a detection unit configured to detect unauthorized access to an information processing apparatus; and a control unit configured to shift modes of the information processing apparatus. A computer executes a first virtual machine and a second virtual machine. When the system is operating normally, the control unit causes the information processing apparatus implemented by the first virtual machine to operate in a normal mode, and causes the information processing apparatus implemented by the second virtual machine to operate in a standby mode. If the unauthorized access is detected, the control unit shifts the information processing apparatus implemented by the first virtual machine into a decoy mode, and shifts the information processing apparatus implemented by the second virtual machine into the normal mode.
Abstract:
PROBLEM TO BE SOLVED: To provide an abnormality detection system for efficiently detecting abnormality arising in a control system and for separating the control system where the abnormality is found.SOLUTION: An abnormality detection system includes: multiple control systems that are connected to a network and respectively operate within an individual protection area; a monitoring part that is provided in each control system, inspects data exchanged between the control system and an opposing party's control system to be monitored, and transmits abnormality notification when the opposing party's control system is suspected of abnormality; and a management part 210 that aggregates the abnormality notification transmitted from each monitoring part in the control systems, evaluates a reputation of the control system suspected of abnormality, and causes a protection area where the control system suspected of abnormality operates to limit outbound traffic at least from the inside of the protection area when the suspected control system is determined to have abnormality by comparing an evaluation result with a standard.
Abstract:
PROBLEM TO BE SOLVED: To apply security protection to a control system in an important infrastructure, etc.SOLUTION: An abnormality detecting device 150 in the invention comprises: an identification part 152 for receiving event information that arises within a control network 130, referring to a configuration management database 170 that maintains a dependence relationship between resources (110, 120, etc.) including a control system 102 and between processes, and identifying a group to which a resource pertaining to the event information belongs; a policy storage part 160 for storing one or more policies to associate conditions for regulating a situation suspected of having abnormality with one or more actions; an addition part 156 for acquiring group-related information to be required in applying the policies, and adding the acquired information to the event information; and a determination part 158 for applying the event information to the policies, and determining an action to be associated with the corresponding conditions as an action to be executed. Then, the abnormality detecting device 150 detects abnormality in the control network 130.
Abstract:
PROBLEM TO BE SOLVED: To enable recipients of an e-mail addressed to a plurality of destination addresses to readily specify messages of their interest. SOLUTION: A device for processing an e-mail containing a plurality of destination addresses, contents corresponding to the respective destination addresses, and display attributes for displaying the respective contents on a display device includes: means for acquiring the degree of association between a first destination address, which is one of the plurality of destination addresses, and at least one of the other destination addresses; and means for modifying the display attributes for the contents in accordance with the degree of association. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To achieve reduced office power consumption by, when the number of active user computers in the vicinity of the network printer is large, setting the network printer in a standby state and, when that number is small, powering off the network printer. SOLUTION: A method for managing a first unit and one or more other units connected to the first unit over a network is provided. The method includes (i) detecting, by a management unit, the operating state of the other units positioned within a specific range from the first unit on the basis of the location of each of the first and other units over the network, the operating state including at least an operating state at which a service request is capable of being transmitted to the first unit. The method further includes (ii) transmitting, by the management unit, to the first unit, an instruction to change an operating state of the first unit depending on a number of the other units being in the detected operating state at which the service request is capable of being transmitted. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an apparatus, a method and a computer program for checking the destination email address of an email including historical information, which, in a case where a plurality of users exchange emails including historical information with each other, eliminate the need for the users to disclose the content of the cited historical information and prevent the emails from being sent by mistake to destinations unintended by the users, thereby maintaining confidentiality. SOLUTION: An email including historical information that cites emails exchanged between a plurality of users as historical information is created. A part or all of an email address included in the historical information cited in the created email including historical information is collected as address information. The collected address information is stored. It is checked whether or not the destination email addresses set in the email including the historical information contain the stored address information, and alert information indicating the destination email address not including the address information is output. COPYRIGHT: (C)2011,JPO&INPIT