摘要:
A method of discriminating, for each first level partial data, whether or not saved data, one file of which is composed of a plurality of the first level partial data and each of the first level partial data is able to include a second level partial data, has been unjustifiably rewritten. The method includes the steps of at a time of saving a file, designating a first level partial data on the basis of a user instruction, receiving a password from a user, converting the received password and the designated first level partial data, which includes second level partial data, according to a predetermined procedure to generate a first code and saving the file with storing of the first code to correspond to the designated first level partial data. At a time of reading the saved file, reading the saved file, designating the first level partial data on the basis of a user instruction, receiving the password from the user, converting the received password and the designated first level partial data, which includes the second level partial data if the designated first level partial data includes the second level partial data, according to the predetermined procedure to generate a second code. The method compares the generated second code with the first code stored to correspond to the designated first level partial data, and discriminates that the designated first level partial data has been unjustifiably rewritten if comparison results in a fact that the first code is not equal to the second code.
摘要:
In storing data in one file, consisting of a plurality of blocks of data, a first code is generated by converting a password and a predetermined portion of each of the blocks of data. This portion may be, for example, the data block itself or identification information such as a name. The code is stored in correspondence to the stored data. In reading the stored data, a second code is generated by performing the same conversion on the password and the predetermined portion of the stored data. A comparison is made between the generated second code and the first code stored. Failure of the two to match indicates that an improper rewrite has occurred. In such a case, that occurrence may simply be noted, access to the data may be prohibited; more generally, what processing is performed, or is permitted, is varied according to the result of the comparison.
摘要:
A comment added to a certain portion in a first document can be automatically re-added to an equivalent position in a second document, and comment transfer processing between documents is automatically performed. Position information of a comment with respect to an old document obtained from an old document comment file is stored in a position information area, and comment contents also obtained from the old document comment file are stored in a comment content area. A character string corresponding to the position information is extracted from an old document file, and is stored in a character string area. A new document file is searched on the basis of the character string stored in the character string area, and position information of the detected character string is stored in a candidate area. One of position information stored in the candidate area is selected according to a predetermined rule, and the selected position information is stored in a new position information area. The comment contents stored in the comment content area, and the position information stored in the new position information area are written in a new document comment file.
摘要:
In storing data, a first code is generated by converting a password and some predetermined portion of the data itself (e.g., all of the data itself, or a time stamp) in a predetermined procedure. The first code is then stored in correspondence to the data. Thereafter, in reading the stored data, a second code is generated by converting the password and the same predetermined portion of the stored data, using the same predetermined procedure, and the resulting second code is compared with the first code stored in correspondence to the stored data. A determination is made that a rewrite has occurred, if the two codes do not match. Subsequent data processing may be controlled in accordance with the result of this determination.
摘要:
A communication system, includes: a node that requests a processing rule for processing a packet; and a control apparatus that notifies the node of the processing rule in response to the request. The control apparatus, upon being notified of change of a connection relationship between a communication apparatus to which a packet is addressed and the node, determines a forwarding path for a packet addressed to the communication apparatus and notifies the node of a processing rule for realizing the forwarding path.
摘要:
Provided is a system which distributes a processing load of security measures and enforce a security policy to be applicable to a large system. Policy information indicating a security measure to be executed on user information transmitted from a client to a server is stored in a policy storing section. Measure arrangement information indicating the security measure executable in each of a plurality of policy enforcement sections is stored in a measure-arrangement storing section. One or more of the policy enforcement sections are selected on the basis of the policy information and the measure arrangement information. Each of the one or more policy enforcement sections executes the security measure on the user information and outputs, on the basis of a selection result, the user information to the other policy enforcement sections among the one or more policy enforcement sections or to the server.
摘要:
The present invention relates to a novel secretory signal, a novel plasmid containing the secretory signal, a transformed anaerobic bacterium transformed with said plasmid, a gene transfer carrier consisting of said anaerobic bacterium, and a pharmaceutical composition containing said carrier.
摘要:
In a power estimator, a power coefficient-calculating section acquires an average value of the number of signal changes per unit time in each circuit range to thereby calculate a power coefficient for each circuit range or calculate a power coefficient for each circuit range when the average value of the number of signal changes per unit time is equal to 1, a correction coefficient-calculating section calculates a ratio of an average value of the number of signal changes per unit time at signal lines included in the circuit range to an average value of the number of signal changes per unit time at observing points designated in the circuit range, as a correction coefficient, and a power value-calculating section calculates a power value for each circuit range based on the correction coefficient and the power coefficient calculated for each circuit range.
摘要:
Authentication apparatus authenticates user using host connected to forwarding node. Policy management apparatus holds access control policy for identifying host under access control using identifier of forwarding node or identifier of user, and links identifier of host under access control and identifier of forwarding node to which host is connected, or identifier of host under access control and identifier of user using host. Forwarding node transmits to policy management apparatus identifier of host connected to own forwarding node and identifier of own forwarding node. Authentication apparatus transmits to policy management apparatus identifier of host connected to forwarding node and identifier of user. Policy management apparatus refers to access control policy and, if host connected to forwarding node is under access control, notifies content of access control to control apparatus as access control list. Control apparatus generates processing rule in accordance with access control list and sets generated processing rule in forwarding nodes.
摘要:
Provided are first monitoring unit 106a for monitoring whether service provision unit 102 has been called by an application, second monitoring unit 107a for monitoring whether a network access request is sent to a network, first access control unit 106b for controlling the network access request of the call detected by the first monitoring unit 106a, based on a security level assigned to the application program that has called the service provision unit, and second access control unit 107b for determining whether the first access control unit 106b has already performed access control on the network access request detected to have been sent by the second monitoring unit 107a, and, if the access control has been performed, controlling the network access request based on a security level assigned to the application program that has sent this network access request.