Abstract:
In a computer to support security of information, a user authentication request is received as a request of remote operation call through a network, a user using an external application program is authenticated based on the user authentication request. An authentication result capable of detecting a falsification is generated, and the authentication result is returned as a response of the remote operation call to a request originator through the network.
Abstract:
A digital measurement apparatus measures a physical measurement object, provides a digital signature of public-key cryptography to measured data of a thus-measured physical quantity, and manages the measured data. The apparatus generates at least a pair of a public key and a private key, to be used for the digital signature of the public-key cryptography, through a key generating algorithm.
Abstract:
In an access control decision system, first information indicated by an access decision request is converted into second information being higher abstract when the access decision request is received. Next, the access control for the subject information is determined by referring a security policy being abstractly regulated based on the second information and a decision result showing the access control for the subject information is sent to a request originator that sent the access decision request.