SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, INVALIDATION METHOD, AND INVALIDATION PROGRAM
First Claim
1. A software update apparatus, comprising:
- a predetermined application;
a protection control module operable to verify whether the predetermined application has been tampered with; and
an install module group that includes a plurality of install modules each operable to receive a replacement protection control module from an external server, and update the protection control module with the received replacement protection control module, whereineach of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations, andif any of the install modules is verified as having the possibility of performing the malicious operations, any another one of the install modules that is verified as not having the possibility revokes the any install module verified as having the possibility.
1 Assignment
0 Petitions
Accused Products
Abstract
To aim provide a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server (200), a replacement protection control module (121) to be used for updating a protection control module (120) having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations. If any of the install modules is verified as having the possibility of performing the malicious operations, any another one of the install modules that is verified as not having the possibility revokes the any install module verified as having the possibility.
-
Citations
23 Claims
-
1. A software update apparatus, comprising:
-
a predetermined application; a protection control module operable to verify whether the predetermined application has been tampered with; and an install module group that includes a plurality of install modules each operable to receive a replacement protection control module from an external server, and update the protection control module with the received replacement protection control module, wherein each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations, and if any of the install modules is verified as having the possibility of performing the malicious operations, any another one of the install modules that is verified as not having the possibility revokes the any install module verified as having the possibility. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 18, 19, 20, 21, 22, 23)
-
-
15. A software update system that is composed of a software update apparatus and a server connected with the software update apparatus,
the software update apparatus comprising: -
a predetermined application; a protection control module operable to verify whether the predetermined application has been tampered with; and an install module group that includes a plurality of install modules each operable to receive a replacement protection control module from an external server, and update the protection control module with the received replacement protection control module, and the server comprising; a storage unit that stores therein a replacement protection control module to be used for updating the protection control module; and a communication unit operable to transmit the replacement protection control module to the software update apparatus, wherein each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations, and if any of the install modules is verified as having the possibility of performing the malicious operations, any another of the install modules revokes the any install module verified as having the possibility.
-
-
16. A revocation method, comprising:
-
a boot step of booting (i) a protection control module operable to verify whether a predetermined application has been tampered with and (ii) an install module group including a plurality of install modules each operable to receive a replacement protection control module to be used for updating the protection control module from an external server; and an execution step of executing the predetermined application, wherein each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations, and if any of the install modules is verified as having the possibility of performing the malicious operations, any another one of the install modules that is verified as not having the possibility revokes the any install module verified as having the possibility.
-
-
17. A revocation program, comprising:
-
a protection control module operable to verify whether a predetermined application has been tampered with; and an install module group that includes a plurality of install modules each operable to receive a replacement protection control module from an external server, and update the protection control module with the received replacement protection control module, wherein each of the install modules causes a computer to perform processing, the processing comprises; a verification procedure of performing verification on each of the install modules simultaneously running by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations; and a revocation procedure of revoking, if any of the install modules is verified as having the possibility of performing the malicious operations, the any install module verified as having the possibility.
-
Specification