摘要:
A method executed in an information processing apparatus for controlling resource access by an application program running on the information processing apparatus is provided. A change in connection statuses or operating statuses of a device connected to the information processing apparatus is first detected. In response to the detection, a resource access condition to be applied to the information processing apparatus is selected based on certain criterion. The selected resource access condition is stored in a condition storage unit. Then, in response to capture of a function call for resource access issued to an operating system by the application program, the resource access condition is read from the condition storage unit, and it is determined on the basis of the resource access condition whether the captured function call is allowed. If it is determined that the captured function call is not allowed, the function call is rejected.
摘要:
A method executed in an information processing apparatus for controlling resource access by an application program running on the information processing apparatus is provided. A change in connection statuses or operating statuses of a device connected to the information processing apparatus is first detected. In response to the detection, a resource access condition to be applied to the information processing apparatus is selected based on certain criterion. The selected resource access condition is stored in a condition storage unit. Then, in response to capture of a function call for resource access issued to an operating system by the application program, the resource access condition is read from the condition storage unit, and it is determined on the basis of the resource access condition whether the captured function call is allowed. If it is determined that the captured function call is not allowed, the function call is rejected.
摘要:
It is one object of the present invention to prevent embedded verification information from being lost even when a quantization process is performed after verification information has been embedded. A pre-embedding portion 32 converts a image data value so that quantized values not changing by error introduced through the embedding process. A hash value calculator 300 calculates a hash value using image data and key information, and a hash value embedding portion 302 embeds the hash value in the image data. An output format converter 304 quantizes the image data in which the hash value is embedded, and generates JPEG data.
摘要:
Content data is judged to determine whether data prepared by a digital device were altered by performing an authentication process using a medium on which content data are recorded; reading the content data from the medium; embedding, in the content data, data for verifying the pertinent content; extracting, from the content data, the data for verifying the pertinent contents; using the results of the extraction to determine whether the content data were altered. Preferably, the means includes means for identifying any portion containing altered data.
摘要:
The present invention is to support the retrieval of an ambiguous file stored on a computer. Desktop space images are generated at predetermined time intervals, and metadata for each desktop space image is created from internally used data and externally input data existing at the time. The metadata consists of multiple pieces of tag data, and part of tag data is a target file to be searched for. Upon searching for the target file, a user selects a desktop space image that evokes the target file from among the multiple desktop space images initially displayed. The selected desktop space image is displayed and the target file is selected from the metadata associated with the desktop space image displayed. The desktop space image can refresh a user's recollection about the target file, and hence allows the user to narrow down the scope of search.
摘要:
The present invention is to support the retrieval of an ambiguous file stored on a computer. Desktop space images are generated at predetermined time intervals, and metadata for each desktop space image is created from internally used data and externally input data existing at the time. The metadata consists of multiple pieces of tag data, and part of tag data is a target file to be searched for. Upon searching for the target file, a user selects a desktop space image that evokes the target file from among the multiple desktop space images initially displayed. The selected desktop space image is displayed and the target file is selected from the metadata associated with the desktop space image displayed. The desktop space image can refresh a user's recollection about the target file, and hence allows the user to narrow down the scope of search.
摘要:
It is an object of the present invention to send information accurately to a target person having a plurality of e-mail addresses or contact points. A delivery server 10 is provided for sending an e-mail selectively to a target person having a plurality of e-mail addresses. The delivery server 10 predicts a target person's condition when sending the e-mail, orders the plurality of e-mail addresses in descending order of likelihood that the target person will receive the e-mail, and sends the e-mail according to the ordering. Furthermore, it is configured so that the next ordering reflects the e-mail address where the target person has received the message as a result of sending the e-mail.
摘要:
The present invention is directed to the detection of what part of an image alteration was added to by embedding an electronic watermark in the image. More particularly, embedding part 30 renders as pairs two each of DCT blocks of luminance component Y of an image, randomly selects, by using a random number, mutually corresponding DCT coefficients from each DCT block contained in the pairs, and manipulates so that the relationship among these DCT coefficients represent data according to a certain rule, and then embeds the data. If alteration is added to this image, the DCT coefficients contained in the pairs in the altered part do not observe the above rule and represent different values from the original data. Extraction part 40 extracts data from the image, and makes decision by majority to estimate the initially embedded data to detect and display the pairs from which different data form the estimated data was extracted as those to which alteration was added.