Method and system for acquiring resource usage log and computer product
First Claim
Patent Images
1. A resource usage log acquisition program that contains instructions which when executed on a computer cause the computer to execute:
- determining whether an application is permitted to use a resource, by reading usage permission information that is stored in a protected area of a portable medium with write protection enabled, to obtain a determination result, wherein the usage permission information is information about permitting an application to use a resource; and
log acquiring/writing including acquiring usage log information based on the determination result, releasing the write protection of the portable medium, and writing the usage log information acquired into the protected area, wherein the usage log information is information about usage of the resource by the application.
2 Assignments
0 Petitions
Accused Products
Abstract
Based on user permission information read from a write-protected portable medium, it is determined whether an application is permitted to use a resource. If the application is permitted to use the resource, the write protection of the portable medium is released, usage log information is written into the medium.
-
Citations
19 Claims
-
1. A resource usage log acquisition program that contains instructions which when executed on a computer cause the computer to execute:
-
determining whether an application is permitted to use a resource, by reading usage permission information that is stored in a protected area of a portable medium with write protection enabled, to obtain a determination result, wherein the usage permission information is information about permitting an application to use a resource; and
log acquiring/writing including acquiring usage log information based on the determination result, releasing the write protection of the portable medium, and writing the usage log information acquired into the protected area, wherein the usage log information is information about usage of the resource by the application. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A resource usage log acquisition system, comprising:
-
a portable medium that stores user permission information and usage log information, in a protected area with write protection enabled, wherein the user permission information is information about permitting an application to use a resource, and the usage log information is information about usage of the resource by the application; and
a local terminal that includes a resource usage permission/prohibition determining unit that determines whether an application is permitted to use the resource based on the user permission information, by reading the user permission information stored, to thereby obtain a determination result; and
a log writing unit that acquires the usage log information based on the determination result, releases the write protection of the portable medium, and writes the usage log information acquired, into the protected area. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A usage log acquisition system, comprising:
-
a portable medium that stores user permission information and usage log information, in a protected area with write protection enabled, wherein the user permission information is information about permitting an application to use a resource, and the usage log information is information about usage of the resource by the application;
a management server including a usage permission information writing unit that writes the usage permission information in the protected area of the portable medium by releasing the write protection of the portable medium; and
a local terminal that includes a resource usage permission/prohibition determining unit that determines whether an application is permitted to use the resource based on the user permission information, by reading the user permission information stored, to thereby obtain a determination result; and
a log writing unit that acquires the usage log information based on the determination result, releases the write protection of the portable medium, and writes the usage log information acquired, into the protected area. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A resource usage log acquisition method comprising:
-
determining whether an application is permitted to use a resource, by reading usage permission information that is stored in a protected area of a portable medium with write protection enabled, to obtain a determination result, wherein the usage permission information is information about permitting an application to use a resource; and
log acquiring/writing including acquiring usage log information based on the determination result, releasing the write protection of the portable medium, and writing the usage log information acquired into the protected area, wherein the usage log information is information about usage of the resource by the application.
-
-
19. A computer-readable recording program including a resource usage log acquisition program that contains instructions which when executed on a computer cause the computer to execute:
-
determining whether an application is permitted to use a resource, by reading usage permission information that is stored in a protected area of a portable medium with write protection enabled, to obtain a determination result, wherein the usage permission information is information about permitting an application to use a resource; and
log acquiring/writing including acquiring usage log information based on the determination result, releasing the write protection of the portable medium, and writing the usage log information acquired into the protected area, wherein the usage log information is information about usage of the resource by the application.
-
Specification