Security management program, security management method, and portable terminal device
First Claim
1. A computer-readable recording medium storing a security management program for managing security of a portable terminal device, the security management program causing a computer to perform:
- authenticating, by a security manager, an authentication target with a prepared authentication method in response to a login request from the authentication target;
outputting, by an application execution unit, an authentication request in response to an application execution request which is output from the security manager after the authentication by the security manager succeeds;
authenticating, by a database access unit, the authentication target with the authentication method in response to the authentication request; and
accessing, by the database access unit, a database provided in the portable terminal device depending on the authentication performed by the database access unit, in response to a database access request from the application execution unit.
1 Assignment
0 Petitions
Accused Products
Abstract
A security management program stored in a computer-readable recording medium causes a computer to perform the following steps (1) to (4). (1) A security manager authenticates an authentication target with a prepared authentication method in response to a login request from the authentication target. (2) An application execution unit outputs an authentication request in response to an application execution request which is output from the security manager after the authentication succeeds. (3) A database access unit authenticates the authentication target with the authentication method in response to the authentication request. (4) In response to a database access request from the application execution unit, the database access unit accesses a database in a portable terminal device depending on the authentication performed by the database access unit.
-
Citations
8 Claims
-
1. A computer-readable recording medium storing a security management program for managing security of a portable terminal device, the security management program causing a computer to perform:
-
authenticating, by a security manager, an authentication target with a prepared authentication method in response to a login request from the authentication target; outputting, by an application execution unit, an authentication request in response to an application execution request which is output from the security manager after the authentication by the security manager succeeds; authenticating, by a database access unit, the authentication target with the authentication method in response to the authentication request; and accessing, by the database access unit, a database provided in the portable terminal device depending on the authentication performed by the database access unit, in response to a database access request from the application execution unit. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A security management method for managing security of a portable terminal device, the security management method comprising:
-
authenticating, by a security manager, a source of a data access with a prepared authentication method in response to a data access request; outputting, by an application execution unit, a database access request in response to the data access request from the security manager; authenticating, by a database access unit, the source of the data access with the authentication method in response to the database access request; and accessing, by the database access unit, a database depending on the authentication performed by the database access unit.
-
-
8. A portable terminal device for managing security, comprising:
-
a database; a security manager to authenticate an authentication target with a prepared authentication method in response to a login request from the authentication target; an application execution unit to output an authentication request in response to an application execution request which is output from the security manager after the authentication by the security manager succeeds; and a database access unit to authenticate the authentication target with the authentication method in response to the authentication request, wherein the database access unit accesses the database depending on the authentication performed by the database access unit in response to a database access request from the application execution unit.
-
Specification