摘要:
To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules 131 to 133 included in an apparatus 100 each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server 200. The monitoring patterns are restructured by the update server 200 such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.
摘要:
The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions thereof. The detection modules of the present invention perform tamper detection by verifying whether or not the correspondence between the input and output data of the application decryption process performed by the protection control module is correct. Furthermore, the present invention offers improved security against leaks of the application output data by the detection modules by having a plurality of detection modules verify different data blocks.
摘要:
There is provided a signature generation apparatus capable of preventing transcript attack on signature data. The signature generation apparatus for generating signature data for message data (i) acquires, according to a predetermined acquisition method, a private key, which is different from a private key used in a previous digital signature operation, from among a plurality of private keys generated using a key generation method of a signature scheme in which the plurality of private keys correspond to a single public key, and (ii) performs, using the acquired private key, a digital signature operation on the message data according to a signature method of the signature scheme to generate the signature data.