Program execution controller and program transfer controller
First Claim
1. A program execution controller controlling an execution of a computer program in an information processing apparatus, comprising:
- an execution request monitor configured to monitor an execution request for the computer program and to acquire its program name;
a calculator configured to calculate a hash value of the program to be executed;
an execution policy storage configured to pre-store an execution policy, which determines a standard as to whether or not the execution request is to be permitted, in conjunction with the program name and the hash value; and
a execution controlling module configured to determine whether or not the execution request is permitted based on the execution policy and to control the execution of the program.
2 Assignments
0 Petitions
Accused Products
Abstract
This invention addresses to prevent executions or transfers of unauthorized programs in an information processing apparatus.
The information processing apparatus includes following modules: an execution request monitor, a download request monitor, a user name acquiring module, a hash value calculator a program execution controller, a download controller, an execution policy, and a download policy. The program execution controller and the download controller control the execution and the download of programs by referring the execution policy and the download policy in which sets of information of the program name, the hash value and the user name are pre-registered therein as to programs to be permitted of the execution or the download.
-
Citations
15 Claims
-
1. A program execution controller controlling an execution of a computer program in an information processing apparatus, comprising:
-
an execution request monitor configured to monitor an execution request for the computer program and to acquire its program name;
a calculator configured to calculate a hash value of the program to be executed;
an execution policy storage configured to pre-store an execution policy, which determines a standard as to whether or not the execution request is to be permitted, in conjunction with the program name and the hash value; and
a execution controlling module configured to determine whether or not the execution request is permitted based on the execution policy and to control the execution of the program. - View Dependent Claims (2, 3, 4)
-
-
5. A program execution controller controlling an execution of a computer program in an information processing apparatus, comprising:
-
a first information processing module executing the computer program;
a second information processing module executing processing except for executing the computer program;
a communication module configured to communicate between the first information processing module and the second information processing module;
wherein the first information processing module includes an execution request monitor configured to monitor an execution request of the computer program;
wherein the second information processing module includes;
an execution policy storage configured to pre-store an execution policy, which determines a standard as to whether or not the execution request is to be permitted; and
a execution controlling module configured to determine whether or not the execution request is permitted based on the execution policy and to control the execution of the program. - View Dependent Claims (6)
-
-
7. A program transfer controller controlling a transfer of a computer program to an information processing apparatus comprising:
-
a transfer request monitor configured to monitor a transfer request of the computer program and to acquire a program name of the computer program to be transferred;
a calculator configured to calculate a hash value of the program;
a transfer policy storage configured to pre-store a transfer policy, which determines a standard as to whether or not the transfer request is to be permitted, in conjunction with the program name and the hash value; and
a transfer controlling module is configured to determine whether or not the transfer request is permitted based on the transfer policy and to control the transfer of the program. - View Dependent Claims (8, 9)
-
-
10. A program transfer controller controlling a transfer of a computer program to an information processing apparatus comprising:
-
a first information processing module configured to control a communication with the information processing apparatus;
a second information processing module executing processing except for communicating with information processing apparatus;
a communication module configured to communicate between the first information processing module and the second information processing module;
wherein the first information processing module includes a transfer request monitor configured to monitor a transfer request of the computer program;
wherein the second information processing module includes;
a transfer policy storage configured to pre-store a transfer policy, which determines a standard as to whether or not the transfer request is to be permitted; and
a transfer controlling module configured to determine whether or not the transfer request is permitted based on the transfer policy and to control the transfer of the program. - View Dependent Claims (11, 12, 13)
-
-
14. A control method controlling an execution of a computer program in an information processing apparatus comprising:
-
a first step providing an execution policy, which determines a standard as to whether or not an execution request of the computer program is to be permitted, in conjunction with a program name and a hash value of the computer program;
a second step monitoring an execution request for the computer program and acquiring its program name;
a third step calculating the hash value of the program to be executed;
a fourth step determining whether or not the execution request is permitted based on the execution policy and controlling the execution of the program.
-
-
15. A control method controlling a transfer of a computer program to an information processing apparatus comprising:
-
a first step providing a transfer policy, which determines a standard as to whether or not a transfer request of the computer program is to be permitted, in conjunction with a program name and a hash value of the computer program;
a second step monitoring a transfer request for the computer program and acquiring its program name;
a third step calculating the hash value of the program to be transferred;
a fourth step determining whether or not the transfer request is permitted based on the transfer policy and controlling the transfer of the program.
-
Specification