Information processing apparatus and method for preventing unauthorized cooperation of applications
First Claim
1. An information processing apparatus, comprising:
- a network control unit configured to establish a connection to an external communications network;
an installation control unit configured to install a first application;
a process control unit configured to start up the first application and establish cooperation among a plurality of applications, the plurality of applications including the first application;
an access-history map updating unit configured to update an access-history map which represents history information on an access relationship among the plurality of applications when a request is made to start up the first application or to establish cooperation among the plurality of applications, so that the updated access-history map is a map when the requested startup is executed or when the requested cooperation is established; and
an unauthorized-cooperation-of-applications control unit configured to (i) determine whether or not an unauthorized cooperation, which is directed at sensitive information kept secret, is established among the plurality of applications with reference to information obtained from the access-history map and an application authorizing list which includes access authority information of the first application, and (ii) control execution of the first application using an application execution control technique for the unauthorized cooperation, which is directed at the sensitive information, found among the plurality of applications in the case where a result of the determination shows that the unauthorized cooperation is established.
1 Assignment
0 Petitions
Accused Products
Abstract
An information processing terminal (40) includes: a network control unit (250); an installation control unit (260); a process control unit (200) for starting up an application and establishing cooperation among applications including the application; an access-history map updating unit (290) for updating an access-history map (281) which represents history information on an access relationship among the applications when a request is made to start up the application or to establish cooperation among the applications; and an unauthorized-cooperation-of-applications control unit (220) for (i) determining whether or not an unauthorized cooperation, which is directed at sensitive information kept secret, is established among the applications with reference to information obtained from the access-history map (281) and an application authorizing list (271), and (ii) controlling execution of the application using an application execution control technique in the case where a result of the determination shows that the unauthorized cooperation is established.
-
Citations
14 Claims
-
1. An information processing apparatus, comprising:
-
a network control unit configured to establish a connection to an external communications network; an installation control unit configured to install a first application; a process control unit configured to start up the first application and establish cooperation among a plurality of applications, the plurality of applications including the first application; an access-history map updating unit configured to update an access-history map which represents history information on an access relationship among the plurality of applications when a request is made to start up the first application or to establish cooperation among the plurality of applications, so that the updated access-history map is a map when the requested startup is executed or when the requested cooperation is established; and an unauthorized-cooperation-of-applications control unit configured to (i) determine whether or not an unauthorized cooperation, which is directed at sensitive information kept secret, is established among the plurality of applications with reference to information obtained from the access-history map and an application authorizing list which includes access authority information of the first application, and (ii) control execution of the first application using an application execution control technique for the unauthorized cooperation, which is directed at the sensitive information, found among the plurality of applications in the case where a result of the determination shows that the unauthorized cooperation is established. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for preventing unauthorized cooperation of a plurality of applications, said method comprising:
-
installing a first application; starting up the plurality of applications and establishing cooperation among the plurality of applications, the plurality of applications including the first application; updating an access-history map which represents history information on an access relationship among the plurality of applications when a request is made to start up the first application or to establish cooperation among the plurality of applications, so that the updated access-history map is a map when the requested startup is executed or when the requested cooperation is established; determining whether or not an unauthorized cooperation, which is directed at sensitive information kept secret, is established among the plurality of applications with reference to information obtained from the access-history map and an application authorizing list which includes access authority information of the first application; and controlling execution of the first application using an application execution control technique for the unauthorized cooperation, which is directed at the sensitive information, found among the plurality of applications in the case where a result of the determination shows that the unauthorized cooperation is established.
-
-
13. A non-transitory computer-readable recording medium having stored thereon a program for causing a computer to execute a method for preventing unauthorized cooperation of a plurality of applications, the method comprising:
-
installing a first application; starting up the plurality of applications and establishing cooperation among the plurality of applications, the plurality of applications including the first application; updating an access-history map which represents history information on an access relationship among the plurality of applications when a request is made to start up the first application or to establish cooperation among the plurality of applications, so that the updated access-history map is a map when the requested startup is executed or when the requested cooperation is established; determining whether or not an unauthorized cooperation, which is directed at sensitive information kept secret, is established among the plurality of applications with reference to information obtained from the access-history map and an application authorizing list which includes access authority information of the first application; and controlling execution of the first application using an application execution control technique for the unauthorized cooperation, which is directed at the sensitive information, found among the plurality of applications in the case where a result of the determination shows that the unauthorized cooperation is established.
-
-
14. An integrated circuit, comprising:
-
a network control unit configured to establish a connection to an external communications network; an installation control unit configured to install a first application; a process control unit configured to start up the first application and establish cooperation among a plurality of applications, the plurality of applications including the first application; an access-history map updating unit configured to update an access-history map which represents history information on an access relationship among the plurality of applications when a request is made to start up the first application or to establish cooperation among the plurality of applications, so that the updated access-history map is a map when the requested startup is executed or when the requested cooperation is established; and an unauthorized-cooperation-of-applications control unit configured to (i) determine whether or not an unauthorized cooperation, which is directed at sensitive information kept secret, is established among the plurality of applications with reference to information obtained from the access-history map and an application authorizing list which includes access authority information of the first application, and (ii) control execution of the first application using an application execution control technique for the unauthorized cooperation, which is directed at the sensitive information, found among the plurality of applications in the case where a result of the determination shows that the unauthorized cooperation is established.
-
Specification