Abstract:
Tampering monitoring system 10d can detect whether protection control module is tampered with even if some of detection modules are tampered with. Tampering monitoring system 10d includes protection control module 120d, n detection modules, and management device 200d. Protection control module 120d includes: generation unit 310d generating d pieces of distribution data from computer program, n and d being positive integers, d smaller than n; selection unit 311 d selecting d detection modules; and distribution unit 302d distributing d pieces of distribution data to d detection modules. Each detection module judges whether received piece of distribution data is authentic to detect whether protection control module is tampered with, and transmits judgment result indicating whether protection control module is tampered with. Management device 200d receives judgment results from d detection modules and manages protection control module with regard to tampering by using received judgment results.
Abstract:
To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules 131 to 133 included in an apparatus 100 each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server 200. The monitoring patterns are restructured by the update server 200 such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.
Abstract:
The invention provides a recording apparatus and a reproduction apparatus that are able to prevent illegitimate use of contents. A recording medium stores therein a medium inherent number in the unrewritable area. The recording apparatus writes media key data and an encrypted content onto the recording medium. The media key data includes encrypted media keys generated by (i) for each of unrevoked reproduction apparatuses, encrypting a media key using a device key of the unrevoked reproduction apparatus respectively, and (ii) for each of revoked reproduction apparatuses, encrypting detection information using a device key of the revoked reproduction apparatus respectively. The reproduction apparatus decrypts the encrypted media key using a device key to generate a decryption media key, judges whether the decryption media key is the detection information or not, and prohibits the encrypted content recorded on the recording medium from being decrypted when having judged in the affirmative.
Abstract:
When notifying virtual machines of a change to shared data, it is impossible to realize power saving for the apparatus if always notifying a virtual machine in the power-saving state. The present invention is equipped with an inter-VM notification management unit 1242, a resuming judgment unit 1244 and a scheduled interruption time acquisition unit 1245, and when it is necessary to notify a virtual machine in the power-saving state, the resuming judgment unit 1244 judges whether to cause the virtual machine to return from the power saving state, based on the time until the interruption acquired by the scheduled interruption time acquisition unit 1245. With this structure, the present invention prevents unnecessary transitions between the states, and realizes the power saving for the apparatus.
Abstract:
There is provided a computer system which makes it difficult to analyze a calculation content. A power calculation unit (262) performs the following calculation for the input data "a" and "b": ga = g mod n, gb = g mod n. Next, a multiplication unit (264) performs the following calculation for ga and gb: gab = ga x gb mod n. Next, a discrete logarithm calculation unit (266) calculates ci mod pi - 1 which satisfies gab = g mod pi (i = 1, 2, ..., k). Next, a CRT unit (267) calculates "c" which satisfies ci = c mod pi - 1 (i = 1, 2, ..., k) by the Chinese remainder theorem (CRT).
Abstract:
The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions thereof. The detection modules of the present invention perform tamper detection by verifying whether or not the correspondence between the input and output data of the application decryption process performed by the protection control module is correct. Furthermore, the present invention offers improved security against leaks of the application output data by the detection modules by having a plurality of detection modules verify different data blocks.