Abstract:
Provided is means for preventing information leakage from a data distribution destination. A data distribution server (20) of the present invention includes: a database (130) which stores access control implementation modules (132 to 138), which implement, upon a client, an access control mechanism which controls access to a resource by a process according to an imparted policy corresponding to the environment of the client and a deployment unit for deployment into a storage area in which distributed data included in a distributed package is protected; a database (120), which stores distributed data (124) and a security policy (122) specified for the distributed data (124); an environment detection unit (144) for detecting the environment of a client (30B) which requests receipt of the distributed data; and a transmission unit (150) for transmitting a distributed package (160) which includes distributed data (162), a security policy (164), and an access control-implemented module (166) corresponding to the environment of the client (30B).
Abstract:
After installing a program in which means for selectively masking a window screen of a virtual machine and a security function are integrated onto a host OS of a user terminal under the authority of an administrator, a program in which a security function that the administrator wants to be introduced into the virtual machine and means for releasing the mask are integrated is provided for a user. When such a situation is created by the administrator, the user who wants to use a virtualized environment cannot but accept to install the security function the installation of which is desired by the administrator, onto the virtual machine. This is achieved using rendering instruction hooking with a first mode for hooking virtual machine application rendering and a second mode for instructions issued by an application. A common key cryptographic system process the screen rendering instructions. A random key may be used as a secret key transmitted via a named pipe.
Abstract:
PROBLEM TO BE SOLVED: To provide a method, a computer program, an apparatus and a system capable of determining a confidential label of document information in real time.SOLUTION: A label determination apparatus 3 includes: an operation detection section 341 for detecting a predetermined operation on document information; a content extraction section 342 for extracting contents contained in the document information in response to the detection of the predetermined operation; a policy information acquisition section 343 for acquiring policy information indicating a relation between the contents and the confidential label from a policy server 1; and a determination section 344 for determining the confidential label of the document information by determining the confidential label corresponding to the contents on the basis of the policy information acquired by the policy information acquisition section 343 in response to the extraction of the contents by the content extraction section 342.
Abstract:
PROBLEM TO BE SOLVED: To provide a device, a method and a computer program for supporting creation of reply mail, which efficiently retrieves past e-mail to be quoted as desired reply mail and reduces the complexity of creation of reply mail even when e-mail is exchanged among a plurality of users. SOLUTION: When e-mail that has been stored most recently is extracted from history information, and when an instruction indicating that the body part of the e-mail is necessary is accepted, the body part of the e-mail is temporarily stored. When the second latest e-mail is extracted from the history information, and when information on a sender at the header part of the e-mail does not match information on the creator of reply mail, the address of the sender is set to the address of the recipient of the reply mail, the temporarily stored body part is added to the reply mail, and history information on the second latest and preceding e-mail is added. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a server system, a medium management system, a medium management method and a computer program for managing a printable medium having an electronic tag, which assign a plurality of destinations to a plurality of printed matters. SOLUTION: The server system includes:a first receiver that, when information is printed on a medium, receives an electronic tag ID of an electronic tag in the printed medium and a plurality of recipient IDs specified by a user; a second receiver that, when the printed medium is stored in a repository, receives, from the repository, the electronic tag ID and a repository ID; and an associating unit that, when the electronic tag ID sent from the printing apparatus agrees with the electronic tag ID sent from the repository, associates a recipient ID corresponding to the repository ID sent from the repository, out of the plurality of recipient IDs sent from the printing apparatus, with the agreed electronic tag ID. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To send the transfer destination of a message to a desirable computer or mobile device in an instant messaging system. SOLUTION: This method is provided, for distributing an instant message in a server connected to two or more computers through a network. The two or more computers include a groupware client where a user can uses one and the same user ID to simultaneously log in and which can respectively set statuses that can be different. The method includes a step for authenticating a user of a groupware client that tries to log in by using the user ID, a step for recording the user ID and status information associated with an instant messaging user ID, a step for receiving an instant message to the user ID, and a step for determining to which of the two or more client computers the instant message should be distributed on the basis of the status information. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
Computervorrichtung, die mit einer virtualisierten Umgebung ausgestattet ist,in der eine virtuelle Maschine in einem Host-Betriebssystem eingerichtet wird, wobei sich ein erster Sicherheitsagent im Host-Betriebssystem befindet und wobei sich ein zweiter Sicherheitsagent in einem Gast-Betriebssystem der virtuellen Maschine befindet, wobeider erste Sicherheitsagent Folgendes aufweist:einen Zugangskontrollabschnitt zum Steuern des Zugriffs durch eine Anwendung im Host-Betriebssystem;einen ersten Darstellungsbefehl-Hook-Abschnitt zum selektiven Hooken eines von einer Anwendung einer virtuellen Maschine ausgegebenen Bildschirmdarstellungsbefehls; undeinen Verschlüsselungsverarbeitungs-Abschnitt zum Ausführen einer Verschlüsselungsverarbeitung des vom ersten Darstellungsbefehl-Hook-Abschnitt gehookten Bildschirmdarstellungsbefehls mit Hilfe eines Verschlüsselungssystems mit allgemeinem Schlüssel; undwobei der zweite Sicherheitsagent Folgendes aufweist:einen Zugangskontrollabschnitt zum Steuern eines Zugriffs durch eine Anwendung im Gast-Betriebssystem;einen zweiten Darstellungsbefehl-Hook-Abschnitt zum selektiven Hooken eines von einer Anwendung im Gast-Betriebssystem ausgegebenen Bildschirmdarstellungsbefehls; undeinen Verschlüsselungsverarbeitungs-Abschnitt zum Ausführen einer Verschlüsselungsverarbeitung des vom zweiten Darstellungsbefehl-Hook-Abschnitt gehookten Bildschirmdarstellungsbefehls mit Hilfe eines Verschlüsselungssystems mit allgemeinem Schlüssel.
Abstract:
PROBLEM TO BE SOLVED: To improve security protection of data duplication using a common storage area.SOLUTION: An information processing apparatus 100 includes a copying operation monitor part 134 on which one or more applications 150a to 150c operate, and the copy-source application 150a acquires copy data commanding copying to a general common memory, sets a lifetime interpreted from an operation pattern passed through an input device (112, 114) for the copy data, and saves the copy data in a storage area (142, 144); a display part 138 which displays a paste candidate selected out of one or more copy data saved in the storage area on a display device; a pasting operation monitor part 136 which passes the paste candidate read in out of the storage area to the paste destination application 150c in response to determination operation performed through the input device; and an erasure part 140 which erases data having an expired lifetime and not permitted to remain from the storage area.
Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method for providing an optimal printer system considering environmental load, a print server used in the system for providing the optimal printer system considering the environmental load, and a computer program executable in the print server.SOLUTION: A print server acquires, in a predetermined timing, unit price calculation base information including information on at least environmental load for printer systems being operated and calculates a print unit price for each of the printer systems on the basis of the acquired unit price calculation base information. The calculated print unit price is stored in association with identification information identifying the printer systems, and the print unit price and the identification information are transmitted to a client. The client receives the print unit price and the identification information, accepts a selection of one identification information item, and generates and transmits a print job which can be executed in the printer system corresponding to the selection accepted identification information.
Abstract:
PROBLEM TO BE SOLVED: To enable a user of a wireless communication device to judge whether access to secret information by the third person should be permitted, in a mobile office quickly according to the situation. SOLUTION: A wireless communication device 101 having managed security can be connected to another wireless communication resource via a network. The wireless communication device includes: an information acquisition part for acquiring data about another wireless communication resource; an information shielding part which, when acquiring data or in accordance with the content of data, shields information being accessed by the wireless communication device; and a selection part for enabling the user of the wireless communication device to select whether the information should be kept shielded after shielding the information. A method and a computer program for managing security of information being accessed by the wireless communication device are provided. COPYRIGHT: (C)2010,JPO&INPIT