摘要:
A data protection program for protecting data to be processed by an application, and a computer including volatile storage means and nonvolatile storage means performs a volatile file unpack function of writing, to the nonvolatile storage means, data corresponding to a data file to be read or written by the application so that the data is associated with the data file; and a volatile file repackage function of outputting the data file corresponding to the data written to the volatile storage means.
摘要:
Exemplary embodiments include a method and system having resistance to a forced termination attack on a monitoring program for monitoring a predetermined resource. Aspects of the exemplary embodiment include a device that executes a predetermined process including a monitoring program that monitors a predetermined resource, wherein the predetermined process is a process for which the predetermined resource becomes unavailable in response to termination of the predetermined process; a program starting unit for starting the monitoring program in response to an execution of the predetermined process; and a terminator for terminating the predetermined process in the case where the monitoring program is forcibly terminated from the outside.
摘要:
A data distribution system, method and program for generating a distribution package for distribution data to a client. An environment of a requesting client requesting distribution data is detected. A determination is made of an access control execution program for implementing an access control mechanism and a loading unit on the requesting client. The access control execution program is adapted to the detected environment of the requesting client and control access to a resource from a process in the client. The loading unit loads the distribution data to a protected storage area of the client. A determination is made of a security policy specified for the distribution data. A distribution package is generated including the distribution data, the security policy, the loading unit, and the access control execution program adapted to the environment of the requesting client; and transmitting the generated distribution package to the requesting client.
摘要:
A device and method are described to create a reply message in which, even in a case where electronic messages are exchanged among a plurality of users, a past electronic message to be referred to as a desired reply message can be efficiently retrieved, and trouble in creating a reply message can be reduced. When a first electronic message that has been stored most recently has been extracted from history information, and when an instruction indicating that the body part of the first electronic message is necessary has been accepted, the body part of the first electronic message is temporarily stored. A second electronic message that has been stored next most recently is extracted from the history information. When information on a source in the header part of the second electronic message does not match information on the author of a reply message, the address of the source is set to the address of the destination of the reply message, the temporarily stored body part is added to the reply message, and history information preceding the second electronic message is added.
摘要:
A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation.
摘要:
A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation.
摘要:
An email is created that includes one or more destination email addresses, plus historical information regarding previously exchanged emails. Before sending this email, each of the destination email addresses is checked against the email addresses in the historical information and, if a destination email address (or the domain name of that destination address) is not found in the historical information, then a warning is displayed to alert the user to the fact that this historical information may be sent to an unintended recipient. In response to this warning, which may include a list of unapproved destination email address, the user may approve a previously unapproved destination email address, change the unapproved destination email address to one that has been previously approved, or enter a new distribution email to be substituted for the unapproved one. When creating the email, the user may also specify other approved email addresses.
摘要:
To allow a receiver of e-mail addressed to a plurality of destination addresses to readily specify a message of his/her interest included therein. A device for processing e-mail containing a plurality of destination addresses, contents corresponding respectively to the destination addresses, and display attributes for displaying the corresponding contents on a display device is provided. The e-mail processing device includes a unit for acquiring the degree of association between a first destination address, which is one of the plurality of destination addresses and at least one of the other destination addresses, and a unit for modifying the display attributes for the contents in accordance with the degree of association.
摘要:
An external storage device connectable to an information processing apparatus is provided. The storage device includes: an input/output interface via which data is exchanged with an information processing apparatus; a first storage region where data associated with first and second validity periods is stored; and a second storage region where a control program is stored. While the first validity period is used when the external storage device is connected to one information processing apparatus, the second validity period is used when the external storage device is connected to another information processing apparatus. The control program causes a processor to execute the steps of: establishing connection of the external storage device to an information processing apparatus; identifying any one of the validity periods as a validity period to be used for the data; and executing predetermined security protection processing on the data in accordance with the identified validity period.
摘要:
To enable a user to perform, by using an ontology, an information search utilizing a meaning given to information on a network by Semantic Web without being required to perform complicated operations for forming an inquiry sentence in conformity with the ontology.In a stage before a search engine for performing an information search by using an ontology is provided an information search supporting system having a morpheme analysis section, a syntactic and semantic analysis section, and a conversion execution section which converts a natural language sentence on which syntactic analysis and semantic analysis have been performed into an inquiry sentence described in an ontology description language by referring to a case frame ontology dictionary in which are stored information indicating to which property in an ontology does the relationship among a predicate, a subject and an object in the natural language sentence correspond and the case frame of the natural language sentence in the property. A natural language sentence is input and an inquiry sentence described in the ontology language is formed on the basis of the results of syntactic analysis and semantic analysis on the natural language sentence and is provided to the search engine.