WO2006114878A1 - コンピュータ及びコンピュータリソースへのアクセス制御方法及びアクセス制御プログラム - Google Patents
コンピュータ及びコンピュータリソースへのアクセス制御方法及びアクセス制御プログラム Download PDFInfo
- Publication number
- WO2006114878A1 WO2006114878A1 PCT/JP2005/007622 JP2005007622W WO2006114878A1 WO 2006114878 A1 WO2006114878 A1 WO 2006114878A1 JP 2005007622 W JP2005007622 W JP 2005007622W WO 2006114878 A1 WO2006114878 A1 WO 2006114878A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- access authority
- access control
- java
- registered trademark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1483—Protection against unauthorised use of memory or access to memory by checking the subject access rights using an access-table, e.g. matrix or list
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Definitions
- the present invention relates to a computer having an access control function for computer resources, a method for controlling access to computer resources, and an access control program executed by the computer.
- Non-Patent Document 1 David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli, “Role-Based Access Control jARTECH HOUSE, INC., 2003, P6-16).
- the API power called for resource access is used to determine whether the application has the necessary access authority necessary for API execution.
- Use the authority authentication mechanism Specifically, in the access authority authentication mechanism, as attribute information of the application that called the API, attribute information such as the user IDZ group IDZ role of the invoker, operation attribute information such as the operation target resource name, operation content, etc. get.
- the access authority is authenticated by determining whether or not the information related to the use access authority is described as the granted access authority to be granted in the access authority management table.
- Patent Document 1 JP 2003-44297, pages 12 to 21, FIG. 2.
- a unique granted access right that is not supported by the OS is defined in advance for the access right management table. Then, when an application attempts to access a resource, it supplements the API call and performs access authority authentication using an access authority authentication mechanism (access control CTRL in the figure) prepared independently.
- This access authority authentication is performed in the same manner as the conventional technique described in Non-Patent Document 1. As a result of the access authority authentication, if it is determined that there is access authority, an API call that should be called is executed to access the resource.
- Non-Patent Document 2 ACM Transactions on Information and System Security, Vol. 7, No. 3, August 2004, Pages 392-427 “An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments]).
- Non-special literature 1 David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Cnandramouli, “Role-Based Access Control ARTECH HOUSE, INC., 2003
- Non-Patent Document 2 ACM Transactions on Information and System Security, Vol.7, No.3, August 2004, Pages 392-427 ⁇ An Integrated Approach to Engineer and Enforce Context Constraints in RBAC EnvironmentsJ
- Patent Document 1 Japanese Patent Laid-Open No. 2003-44297
- a driver can freely download and execute a Java (registered trademark) program.
- methods for unlocking car door locks, etc. are being studied from the program.
- the door lock must not be released while the rickshaw is allowed to run while the vehicle is stopped.
- it is not desired to allow the execution of a game while driving for example, a force that permits the execution of a game with many screen drawings while the vehicle is stopped.
- Non-Patent Document 2 As a solution to such a problem, there is an access control method as in Non-Patent Document 2, but the access control method disclosed in Non-Patent Document 2 has an original configuration with an accessor. For example, when trying to apply to a Java (registered trademark) car navigation system, parameters other than the attributes, resource names, and operation details are defined. The program needs to be corrected. Such correction work is very difficult, and even if it can be corrected, it requires a lot of work and cost.
- Java registered trademark
- the present invention has been made to solve the above-mentioned problems, taking into consideration the state of the PC on which the program operates and the state of the device connected thereto, and Java (registered).
- the purpose is to realize access control that is easy to maintain without modifying the main body program such as trademark) and is advantageous in terms of cost.
- a computer includes an effective state determination unit that determines an effective state of an access right based on a status of an execution environment, and an access right to a computer resource based on the effective state by the effective state determination unit. And an access control execution environment for performing access control based on the access right management table.
- An effective state determining means for determining the effective state of the access authority based on the status of the execution environment, and an access authority management table for specifying the access authority to the computer resource based on the effective state by the effective state determining means
- an access control execution environment for performing access control based on the access right management table, it is easy to maintain, is advantageous in cost, and can perform fine access control.
- FIG. 1 An explanatory diagram showing a configuration of the entire system to which an access control method of the present invention is applied.
- FIG. 2 An explanatory diagram showing a flow of monitoring / control processing.
- FIG. 3 is an explanatory diagram showing the flow of processing when the monitoring server 105 monitors the vehicle system 101.
- FIG. 4 is an explanatory diagram showing the flow of processing when the door is unlocked using the smart key 103.
- FIG. 5 is an explanatory diagram showing a configuration of a Java (registered trademark) execution environment to which the access control method of the present invention mounted on the in-vehicle PC 111 is applied.
- Java registered trademark
- FIG. 6 is an explanatory diagram showing the configuration of the access authority management table 506.
- FIG. 7 is an explanatory diagram showing the structure of a security property file 505.
- FIG. 8 is a sequence diagram showing the flow of processing in initialization of Ja Va (registered trademark) execution environment 502 and read processing of access authority management table 506.
- FIG. 9 is a sequence diagram showing a processing flow when determining a set of granted access rights to be given to an application when a class constituting the application 501 is read.
- FIG. 10 is an explanatory diagram showing how a Java (registered trademark) provided access control controller 504 is called when an application 501 calls various APIs provided by Java (registered trademark) 503 or various in-vehicle APIs 507.
- FIG. 11 is a processing flow showing details of S1004 in FIG. 10 in which access authority authentication is performed.
- Access authority list holding means [C] is a processing flow showing details of S1105 in FIG. 11 for performing access authority authentication using the access authority stored in [C].
- FIG. 13 is an explanatory diagram showing another configuration of a Java (registered trademark) execution environment to which the access control method of the present invention mounted on the in-vehicle PC 111 is applied.
- Java registered trademark
- FIG. 14 is a sequence diagram showing a flow of processing in initialization of Java (registered trademark) execution environment 502 and reading processing of access right management table 506 in the case of FIG.
- FIG. 15 is a sequence diagram showing a processing flow when determining a set of granted access rights to be given to an application when a class constituting an application 501 is read in the case of FIG. 13.
- FIG. 17 is a sequence diagram showing another processing flow when determining a set of granted access rights to be given to an application when classes constituting the application 501 are read.
- FIG. 20 is a processing flow of the external access control means 508 called from the access control controller 504 provided by Java (registered trademark).
- the state verification means 1605 for verifying whether or not the valid state 605 is satisfied is a process flow when reading an expression.
- FIG. 22 This is a processing flow for verifying whether the granted access authority is valid in the in-vehicle PCI 11 or the vehicle system 101 using the state verification means 1605—expression.
- FIG. 23 is a processing flow performed when the state verification method is called by the state verification means 1605.
- FIG. 24 is an explanatory diagram showing the configuration of the Java (registered trademark) execution environment 502 in the third embodiment.
- ⁇ 25] An explanatory diagram showing the configuration of the access authority exercise status management table 2202.
- FIG. 26 is a processing flow of the access control controller 504 provided by Java (registered trademark).
- FIG. 27 This is a processing flow when verifying the number of exercises or the exercise interval of the granted access authority in the state verification means 1605 for verifying whether it is in a valid state.
- Figure 1 shows a Java (registered trademark) execution environment (corresponding to the access control execution environment) to which the access control method of the present invention is applied is mounted on a vehicle-mounted PC to realize vehicle monitoring and control. It is a system block diagram at the time of comprising a control system.
- Java registered trademark
- a vehicle system 101 is a vehicle, and includes various in-vehicle devices such as an in-vehicle PC 111, an engine 118, and a speed meter 121.
- the in-vehicle PC 111 is an in-vehicle device mounted on the vehicle system 101, and includes an access control function of the present invention and an API (Application Programming Interface) for controlling various in-vehicle devices mounted in the vehicle system 101.
- Java registered trademark
- Java registered trademark
- a storage device 112 that stores various Java (registered trademark) programs and an access authority management table is provided.
- the display 113 is an in-vehicle device mounted on the vehicle system 101, and is provided to a driver and a passenger (hereinafter collectively referred to as a driver) at the request of an in-vehicle device such as the in-vehicle PC 111. And a display device for presenting road information and monitoring information of various in-vehicle devices.
- the input device 114 is a device for inputting an instruction such as a control command from the driver, such as a keyboard and an operation panel. Physically, there are cases where it is integrated with the display as a touch panel display.
- the mobile phone A115 is an in-vehicle device that is mounted on or connected to the vehicle system 101, and is a wireless communication device for connecting the information system LAN (Local Area Network) 117 to which the in-vehicle PC 111 is connected to the Internet 107. is there.
- LAN Local Area Network
- the wireless device 116 is an in-vehicle device mounted on the vehicle system 101, and is a communication device for performing wireless communication in a narrow area such as Bluetooth (registered trademark), IrDA (InfraRed Data Association), or wireless LAN. It is.
- the information system LAN 117 is a network for connecting various on-vehicle devices that do not directly affect the running of the vehicle as described above.
- Engine 118 is an in-vehicle device mounted on vehicle system 101, and is a device that generates power for moving the vehicle.
- the door lock 119 is an in-vehicle device mounted in the vehicle system 101, and is a device that controls the locking and unlocking of the door key of the car.
- the immobilizer 120 is an in-vehicle device mounted on the vehicle system 101, and is a device for authenticating a key such as the smart key 103 held by the driver by some means and starting the engine 118. is there.
- the speed meter 121 is an in-vehicle device mounted on the vehicle system 101, and is a device for measuring the number of revolutions of the engine 118 and the traveling speed of the vehicle.
- the headlight 122 is a vehicle-mounted device mounted on the vehicle system 101, and is a device for illuminating the front of the vehicle at night or while traveling in a tunnel.
- the control system LAN 123 is a network for connecting various in-vehicle devices that are indispensable for driving the vehicle as described above.
- the in-vehicle GW 124 is an in-vehicle device mounted in the vehicle system 101, and serves as a GW (gateway) for connecting the information system LAN 117 and the control system LAN 123 to convert communication protocols. Equipment.
- the mobile phone C102 is a device held by the driver, and is installed in the vehicle system 101. It is a device that has the function of communicating with the in-vehicle PCI 11 through the wireless device 116 and the function of transmitting and receiving monitoring / control commands.
- Smart key 103 is a device corresponding to a key held by the driver, and is a vehicle system.
- This device has a function of communicating with the in-vehicle PC 111 through 101 wireless devices 116 and a function of transmitting a door opening / closing command.
- the distribution server 104 is a device connected to the Internet 107, and is a server for distributing various contents such as a Java (registered trademark) program operating on the in-vehicle PC 111 and videos and music.
- a Java registered trademark
- the monitoring server 105 is a device connected to the Internet 107, and provides a Java (registered trademark) program that runs on the in-vehicle PC 111, and also remotely monitors and controls various devices on the vehicle system 101. It is a server for.
- the mobile phone B106 is a device connected to the Internet 107, and is a device for remotely monitoring and controlling a car. Usually held by the owner of the car.
- the Internet 107 is a general-purpose network for connecting the vehicle system 101, various servers, and the mobile phone B 106 described above.
- various in-vehicle devices connected to the information system LAN 117 and the control system LAN 123 are not limited to the above-described devices, and various in-vehicle devices may be connected depending on the vehicle components. it can.
- the network configuration of the vehicle system 101 is not limited to the above configuration, and a single network or a further divided network may be configured.
- Sano installed on the Internet 107 is also equipped with various servers and clients depending on the service provided to the vehicle, not limited to the distribution server 104, the monitoring server 105, and the mobile phone B106. May be.
- the mobile phone C102 and the smart key 103 are shown as devices connected to the wireless device, but various devices may be connected according to the service provided.
- the first usage mode is monitoring / control by a monitoring / control program operating on the in-vehicle PC.
- FIG. 2 is an explanatory diagram showing the flow of the monitoring and control process. Using Fig. 2, Explain the flow of reason.
- a monitoring / control program for performing monitoring and control is activated on the in-vehicle PC 111 (step S201 force is also step S203).
- the monitoring / control program to be started here may be installed in advance in the storage device 112 of the in-vehicle PCI 11 or the program obtained from the distribution server 104 or the monitoring server 105 via the Internet 107. In some cases.
- the program sends a monitoring command for acquiring monitoring information to various in-vehicle devices automatically or according to a driver's instruction (from step S204 to step S206). ).
- monitoring information is acquired from the in-vehicle device (step S207), and a display instruction is given to the display (step S208).
- the driver can monitor various in-vehicle devices.
- Step S210 The monitoring / control program that received the driver's instruction (Step S210) creates a control command based on the driver's instruction, sends the control command to the in-vehicle device to be controlled (Step S211), and Confirm completion (step S212). Then, the control result is displayed on the display (step S213).
- the driver can control various in-vehicle devices.
- FIG. 3 is an explanatory diagram showing the flow of processing when the monitoring sano 105 monitors the vehicle system 101. The process flow is explained below using Fig. 3.
- a remote monitoring 'control program for accepting a remote operation is activated on the in-vehicle PC 111 (step S301).
- the remote monitoring / control program started here may be installed in advance in the storage device 112 of the in-vehicle PC 111 or may be a program obtained from the monitoring server 105 via the Internet 107. .
- the start timing may be when a monitoring command from the monitoring server 105 is received.
- the monitoring server 105 sends a monitoring command to the in-vehicle PC 111 via the Internet 107 and the mobile phone A115 (step S302)
- the remote monitoring control program No. 105 Interpret the monitoring command, send the control command to the in-vehicle device (step S303), acquire the in-vehicle device information (step S304), and send the information to the monitoring server (step S304) Step S305).
- the monitoring server 105 can perform remote monitoring of the vehicle system 111.
- a control command is transmitted to the in-vehicle PC 111 (step S306).
- the remote monitoring / control program that receives the control command interprets the control command of the monitor Sano 105, converts it to a control command to be transmitted to the in-vehicle device, and transmits the control command to the in-vehicle device (step).
- S307) confirm that the control is complete (step S308).
- the result of sending the control command to the in-vehicle device is sent separately to the monitoring server (step S309).
- the monitoring server 105 can perform remote control of the vehicle system 101.
- FIG. 4 is an explanatory diagram showing the flow of processing when the door is unlocked using the smart key 103. The process flow is explained below using Fig. 4.
- a narrow-area monitoring / control program that accepts a narrow-area operation is activated on the in-vehicle PCI 11 (step S401).
- the narrow-area monitoring and control program that starts here may be installed in advance in the storage device 112 of the in-vehicle PCI 11 or obtained from the monitoring server 105 or distribution server 104 via the Internet 107. It may be a program. In addition, the start timing is good even when a control command from the smart key 103 is received.
- the narrow area monitoring 'control program interprets the door lock release command, converts it to a control command transmitted to the door lock 119, which is one of the in-vehicle devices, and converts the control command to the door lock 119. (Step S405).
- the door lock 119 interprets the control command and releases the lower lock. This allows the driver to release the door lock.
- FIG. 5 is a Java (registered trademark) execution environment installed in the in-vehicle PC 111 and is an explanatory diagram showing a functional configuration in the Java (registered trademark) execution environment to which the access control method of the present invention is applied. It is.
- the application 501 is a Java (registered trademark) program for monitoring and controlling in-vehicle devices, a Java (registered trademark) program for playing games, and a Java corresponding to each application. (Registered trademark) program.
- the provision form may be a normal Java (registered trademark) application defined in the Java (registered trademark) specification, or a Java (registered trademark) applet defined in the Java (registered trademark) specification. It may take the form of MIDlet, Xlet, framework, bundle or service defined by OSGi (The Open Services Gateway Initiative).
- Java (registered trademark) execution environment 502 is an application execution environment that is mounted on the in-vehicle PC 111 and is used to execute various applications 501.
- the Java (registered trademark) execution environment 502 includes various APIs 503 provided by Java (registered trademark), an access control controller 504 provided by Java (registered trademark), a security property file 505, and an access right management table 506.
- APIs 503 provided by Java have API specifications defined by Java (registered trademark) standard specifications, and are configured by a plurality of class cars pre-installed in Java (registered trademark) execution environment 502 .
- Java registered trademark
- it consists of a class java.io.FilelnputStream for reading files and a class java.net.Socket for socket communication.
- the access control controller 504 provided by Java is defined in the standard specification of Java (registered trademark), and a plurality of access control controllers 504 for performing access control incorporated in the Java (registered trademark) execution environment 502 in advance.
- Class power of composed For example, class java.security.Permission that represents access right, or authentication of access right? T class Consists of java.security.AccessController etc.
- This Java (registered trademark) provided access control controller 504 authenticates the use access right used by the application based on the granted access right described in the access right management table 506.
- the security property file 505 is one of the setting files held by the Java (registered trademark) execution environment 502, and is used to specify a class name in which a function for reading the access right management table 506 is implemented. Used for etc.
- the access authority management table 506 is information corresponding to a policy file provided as a standard in the Java (registered trademark) Development Kit, and is a table for designating the granted access authority to be given to the application 501 and the user. It is.
- the various in-vehicle APIs 507 are a group of classes that provide functions for transmitting / receiving control commands and transmitting / receiving monitoring information to / from various in-vehicle devices mounted in the vehicle system 101.
- This is an advance Java (registered trademark) that is stored in the storage device 112 of the in-vehicle PC111 programs and, j downloaded from via the network delivery server 104 and monitoring Sano 105 like ava (registered trademark) program, Runs in combination with application 501 on Java (registered trademark) execution environment 502 on in-vehicle PCI 11.
- various in-vehicle APIs 507 may be subject to additional Z deletion Z change after the in-vehicle PC 111 is assembled. For example, when a new in-vehicle device is connected to the vehicle system 101, the in-vehicle API capability corresponding to the in-vehicle device may be added to various in-vehicle APIs 507. Conversely, when an in-vehicle device is removed from the vehicle system 101, the in-vehicle API corresponding to the in-vehicle device may be deleted from the various in-vehicle APIs 507. Even if there is no addition or deletion of in-vehicle devices, various in-vehicle APIs 507 may be changed to add new functions. Therefore, depending on the state of the vehicle system 101, there may be cases where various in-vehicle APIs 507 do not exist.
- the external access control means 508 is a function for verifying the granted access authority that is valid according to the state of various on-vehicle devices mounted on the in-vehicle PC 111 and the vehicle system 101. This is a Java (registered trademark) program stored in the storage device 112 of the in-vehicle PC 111, and is operated in combination with the Java (registered trademark) execution environment 502 on the in-vehicle PC 111.
- the access authority determining means 509 is a use access authority for the application 501 to execute various APIs 503 provided by Java (registered trademark) and various in-vehicle APIs 507 based on information on the granted access authority described in the access authority management table 506. This function is used to determine whether or not
- the effective state determination unit 510 uses an in-vehicle state for the granted access authority determined to be effective by the access authority determination unit 509 based on the effective state (details will be described later) described in the access authority management table 506. This is a means for determining whether the state of the PC 111 or various in-vehicle devices is in a state where the granted access authority is valid.
- Access authority list holding means 511 is a Java (registered trademark) provided access control controller.
- Reference numeral 504 denotes a function for holding the granted access right read from the access right management table 506, and a function for holding the granted access right list when the granted access right list to be given to the application 501 is extracted. Furthermore, the access authority judgment means 509 included in the external access control means 508 and the validity status are used to determine whether or not the access authority is received from the outside and is included in the list of granted access authorities held internally. It also has a function of verifying using the judging means 510.
- the external access control means registration means 512 is internally connected to the external access control means 508 when the Java (registered trademark) provided access control controller 504 of the Java (registered trademark) execution environment 502 authenticates the use access authority. This is a function for registering the external access control means 508 to the Java (registered trademark) provided access control controller 504 so as to call.
- Various vehicle system resources 513 are resources such as various in-vehicle devices mounted on or connected to the vehicle system 101.
- the display 113, the mobile phone A 115, and the engine 118 that are connected to only the files and sockets on the in-vehicle PC 111.
- These various vehicle system resources 513 are monitored using various APIs 503 provided by Java (registered trademark) and various in-vehicle APIs 507. Visual control is possible.
- FIG. 6 is an explanatory diagram showing the configuration of the access authority management table 506.
- the authority grant target 601 designates conditions for the application 501 and various in-vehicle APIs 507 to which grant access authority is granted by one or a combination of a plurality of conditions.
- User IDZ group IDZ role ID etc. are specified.
- the granted access authority information 602 is one piece of information for designating what kind of granted access authority is granted to the authorization object 601. For example, file access permission information (java.io.FilePermission in the case of Java (registered trademark)) and socket access permission information (also java.net.SocketPermission) are specified. You can also specify your own access authority information defined by the user.
- file access permission information java.io.FilePermission in the case of Java (registered trademark)
- socket access permission information also java.net.SocketPermission
- the resource designation information 603 designates the resource name that is the target of the grant access authority specified in the grant access authority information 602. For example, a resource name provided on a general computer such as a file name, a directory name, or an IP address name, or a resource specific to the vehicle system 101 such as the display 113, door lock 119, or speed meter 121 is specified.
- the operation content information 604 specifies what operation is permitted or prohibited for the resource specified by the resource specification information 603. (In the current Java (registered trademark) standard specification, only permitted operation names can be specified). For example, if the resource is a file, the operation name (read) Z write (write) Z delete (delete), etc. If the resource is an IP address, the operation name such as connect (connect) / waiting (accept), door lock 119 In case of, specify the operation name such as lock / unlock.
- the valid state 605 indicates the granted access authority information 602Z resource designation information 603Z operation content information 604 designated when the various in-vehicle devices mounted on the in-vehicle PC 111 or the vehicle system 101 are in any state.
- the granted access authority information 602 the resource designation information 603, the operation content information 604, and the valid state 605 are collectively referred to as the granted access authority.
- This granting access right is given to the granting target 601 described on the same line.
- FIG. 7 is an explanatory diagram showing the configuration of the security property file 505 included in the Java (registered trademark) execution environment 502.
- the security property file 505 is composed of various information cards including a cryptographic provider setting value 701 and a policy provider setting value 702.
- the cryptographic provider setting value 701 specifies a set of master class names of providers in which cryptographic algorithms are implemented. This set value is irrelevant to the use of the present invention.
- the policy provider setting value 702 is a name of a class having a function of reading the file in which the access right management table 506 is stored and extracting the granted access right to be given to the Java (registered trademark) class.
- the setting value to be specified is a name of a class having a function of reading the file in which the access right management table 506 is stored and extracting the granted access right to be given to the Java (registered trademark) class. The setting value to be specified.
- the Java (registered trademark) execution environment 502 when the Java (registered trademark) execution environment 502 is activated, the external access control means 508 is registered in the Java (registered trademark) execution environment 502. The operation of is explained.
- the Java (registered trademark) execution environment is started, the Java (registered trademark) execution environment is first initialized and the access privilege management table is read, and then granted access is given to the application when the application is loaded. A set of authorities is determined.
- FIG. 8 is a sequence diagram showing a flow of processing in initialization of the Java (registered trademark) execution environment 502 and reading processing of the access right management table 506.
- step S801 the in-vehicle PC 111 automatically executes the Java (registered trademark) execution environment 502 when the in-vehicle PC 111 is activated automatically or when the application 502 is activated in accordance with a user instruction. Start up.
- Java registered trademark
- step S802 the Java (registered trademark) execution environment 502 reads various setting files it holds. Perform initialization and perform initialization according to the contents.
- the external access control means registration means 512 of the present invention is implemented so as to satisfy the specifications of the policy provider class, and the implemented class name is assigned to the policy provider setting value 702. I will write it.
- the initialization process of the external access control means registration means 512 set here will be described in the next step S803 and subsequent steps.
- step S803 the Java (registered trademark) execution environment 502 reads the external access control means registration means 512 described in the policy provider setting value 702 of the security property file 505, and initializes (class instance Start).
- step S804 the external access control means registration means 512 requests the Java (registered trademark) execution environment 502 to read the access authority management table 506 as part of the initialization.
- the policy pronoider setting value 702 is replaced with the external access control means registration means 512 in step S802, but this is realized by instantiating the policy provider class set before the replacement.
- step S805 the Java (registered trademark) execution environment 502 reads the access authority management table 506.
- step S806 the Java (registered trademark) execution environment 502 notifies that the access authority management table 506 has been read. Actually, notification is made when the instantiation of the policy provider class provided by the Java (registered trademark) execution environment 502 performed by the external access control means registration means 512 in step S804 is completed.
- step S807 the external access control means registration means 512 notifies the Java (registered trademark) execution environment 502 that the initialization process has been completed. This notification is made when the instantiation of the class provided by the external access control means registration means 512 started by the Java (registered trademark) execution environment 502 in step S803 is completed.
- FIG. 9 is a sequence diagram showing a processing flow when determining a set of granted access rights to be given to an application when a class constituting the application 501 is read.
- step S901 the Java (registered trademark) execution environment 502 determines a class to be read from classes required when the application 501 is executed.
- step S902 the Java (registered trademark) execution environment 502 searches the class determined in step S901 from the readable classes and the Jar file, and reads the file. Then, the URI (Uniform Resource Identifiers) of the Jar file containing the read class file or class file and the signer of the Jar file are acquired as the code source that is the attribute of the read class. If the class file to be read is not found, a read error will occur at this point and the process will be terminated.
- URI Uniform Resource Identifiers
- step S903 the Java (registered trademark) execution environment 502 designates the code source obtained in step S902 to the external access control means registration means 512, and grants access authority to be assigned to the code source. Request acquisition of list.
- step S904 the external access control means registration means 512 receives the code source received in step S903 for the policy provider class provided by the Java (registered trademark) execution environment 502 generated in step S804. Request acquisition of granted access authority list corresponding to.
- step S905 the policy provider class of the Java (registered trademark) execution environment 502 uses the authority read target 601 in the access right management table 506 based on the information read from the access right management table 506, and step S904. By comparing the code sources received in step 1, the list of granted access authority corresponding to the specified code source is extracted.
- step S906 the policy provider class of the Java (registered trademark) execution environment 502 sends the granted access authority list generated in step S905 to the external access control means registration means 512.
- step S907 the external access control means registration means 512 requests the external access control means 508 to create the access right list holding means 511 using the granted access right list received in step S906 as a parameter. . This can be realized by requesting instantiation of the class provided by the access authority list holding means 511.
- step S908 the access authority list holding unit 511 of the external access control unit 508 stores therein the access authority list holding unit 511 that holds the granted access authority list received in step S907.
- step S909 the access authority list holding means 511 of the external access control means 508
- the access right list holding means 511 generated in step S908 is sent to the external access control means registration means 512. This can be realized by returning an instance of the class provided by the access authority list holding means 511 generated in step S908.
- step S910 the external access control means registration means 512 sends the access authority list holding means 511 received from the external access control means 508 in step S909 to the Java (registered trademark) execution environment 502. .
- step S911 the Java (registered trademark) execution environment 502 generates a domain using the access authority list holding means 511 received in step S910.
- This domain is a concept that corresponds to the ProtectionDomain defined in Java (registered trademark) standard specifications, and is information that consists of a code source and a list of granted access rights. All classes used in the Java (registered trademark) execution environment 502 belong to one of the domains, and can be processed only within the scope of the granted access authority list assigned to that domain.
- the access control is performed by the access control controller 504 provided by Java (registered trademark).
- step S912 the Java (registered trademark) execution environment 502 is required to execute the application 501 from the class file read in step S902 and the domain generated in step S911. Generate a class.
- step S913 a class required for executing the application 501 executes class initialization processing.
- step S914 the class that is necessary for the execution of application 501 returns the loaded class.
- Fig. 10 shows that the application 501 has various API 503 provided by Java (registered trademark) or various in-vehicle systems.
- step S1001 the application 501 is provided by Java (registered trademark).
- step S1002 the various APIs 503 provided by Java (registered trademark) or the various in-vehicle APIs 507 specify the use access authority that should be granted to the application 501 for processing.
- step S1003 various APIs provided by Java (registered trademark) 503 or various in-vehicle APIs 507 explicitly call the access control controller 504 provided by Java (registered trademark), and application 501 grants the use access authority. Authenticating access authority is required to authenticate whether or not it is held.
- step S1004 the access control controller 504 provided by Java (registered trademark)
- Use access authority received in S1003 Application authority 501 performs access authority authentication to check whether it is included in the list of granted access authorities. The detailed flow of this process will be described later.
- step S1005 the access control controller 504 provided with Java (registered trademark) sends the result of access authority authentication to the various APIs 503 provided with Java (registered trademark) or the various in-vehicle APIs 507.
- step S1006 the various APIs 503 provided by Java (registered trademark) or the various in-vehicle APIs 507 perform the processing requested by the application 501 when it is determined as having access authority as a result of step S1005. If it is determined that there is no access authority, no processing is performed.
- step S1007 the various APIs provided by Java (registered trademark) 503 or the various in-vehicle APIs 507 return the result of processing when it is determined in step S1005 that they have access authority. If it is determined that the user does not have access authority and the process is not successful in step S1006, the process As a result, it is notified that the processing is invalid because there is no access authority.
- FIG. 11 is an explanatory diagram showing the details of S1004 in Fig. 10, which is the execution of access authority authentication.
- Fig. 12 shows access authority authentication using the access authority stored in the access authority list holding means [C].
- FIG. 12 is an explanatory diagram showing details of S1105 in FIG.
- step S1101 in Fig. 11 is called.
- the Java (registered trademark) provided access control controller 504 checks whether it is included in the list of granted access privileges granted to the application 501 from the various APIs provided by Java (registered trademark) 503 or the various in-vehicle APIs 507. Receive the authorization.
- step S1102 the access control controller 504 provided by Java (registered trademark) extracts a list of domains to be searched for whether or not the usage authority is included.
- the number of extracted search target domains is N, and each verification target domain is numbered from 0 to N-1.
- the search target domain refers to a domain that is the same as the domain created in step S911 in FIG. 9 and that is to be searched for whether or not use access authority is included.
- the domain to which each class belongs is extracted for all the classes that have passed from the application 501 until the Java (registered trademark) provided access control controller 504 is called. However, if a privileged block defined in the Java (registered trademark) specification is used, the process of extracting the domain is not performed for the class that is closer to the application than that privileged block.
- step S1103 the access control controller 504 provided by Java (registered trademark) sets the loop counter C for performing loop processing to 0.
- step S1104 the access control controller 504 provided by Java (registered trademark) acquires the C-th verification target domain from the verification target domain list extracted in step S1102, and is assigned to the verification target domain.
- the access authority list holding means 511 is acquired.
- the access right list holding means 511 acquired here is the access right list holding means 511 created in step S908 of FIG. 9, using the access right judgment means 509 and the valid state judgment means 510 of the external access control means 508. It is also important to have access authorization authentication function.
- step S1105 the access control controller 504 provided by Java (registered trademark)
- Use access authority is sent to the access authority list holding means 511 acquired in S1104, and authentication of access authority is requested.
- step S1201 the access authority list holding means 511 of the external access control means 508 is assigned from the access control controller 504 provided by the Java (registered trademark) and held by the access authority list holding means 511. Receive the usage access authority you want to verify whether it is included in the access authority list, and start processing.
- step S 1202 the access authority list holding unit 511 of the external access control unit 508 extracts a list of granted access authorities stored in the access authority list holding unit 511.
- the number of granted access privileges is M, and for each granted access privilege,
- step S1203 the access authority list holding unit 511 of the external access control unit 508 sets the loop counter D to 0.
- step S1204 the access authority list holding unit 511 of the external access control unit 508 acquires the Dth granted access authority from the list of granted access authorities acquired in step S1202.
- step S1205 the access right determination means 509 of the external access control means 508 gives granted access authority information 602, resource designation information 603, and operation content information 604, which is granted access authority, to the use access authority. Whether authority information 602, resource designation information 603, and operation content information 604 are included is compared. Note that the class representing the granted access authority belongs to the access authority list holding means 511, and since the processing method for comparison is implemented, it is realized by requesting the process to that method. [0131] In step S1206, the access authority list holding unit 511 of the external access control unit 508 determines whether the use access authority is included in the granted access authority as a result of step S1205. If included, the process proceeds to step S1207 in order to verify the valid state 605 assigned to the granted access authority. If not included, the process proceeds to step S1211 to proceed to the comparison process with the next granted access authority.
- step S1207 the access authority list holding unit 511 of the external access control unit 508 determines whether or not the condition of the valid state 605 is set for the granted access authority. If it is set, the process advances to step S1208 to determine the valid state. If it is not set, the process proceeds to step S1213, and the process is terminated as having access authority. In addition, “ALWAYS (always active)” is set as the valid state 605! Also in the case of hitting, as in the case where the valid state 605 is not set, the process proceeds to step S1213, and the process is terminated as having access authority.
- step S 1208 valid state determination means 510 of external access control means 508 acquires the state of vehicle system 101 and in-vehicle PC 111 necessary to determine valid state 605. This state is realized by calling various APIs 503 provided by Java (registered trademark) and various in-vehicle APIs 507.
- step S1209 the valid state determination unit 510 of the external access control unit 508 checks whether the valid state 605 specified by the granted access authority is satisfied based on the state acquired in step S1208. Perform verification.
- step S1210 the access authority list holding unit 511 of the external access control unit 508 determines whether the valid state 605 is satisfied in step S1209. Proceeding to step S1213, the processing ends as having access authority. If it is determined that the state is invalid, the process proceeds to step S1211 to proceed to the comparison process with the next granted access authority.
- step S1211 the access authority list holding unit 511 of the external access control unit 508 increments the value of the loop counter D by 1.
- step S1212 the access authority list holding unit 511 of the external access control unit 508 compares the loop counter D with the number M of granted access authorities. If D ⁇ M, not yet Since there is a verification grant access right, the process returns to step S1204. In the case of D ⁇ M, verification of all granted access rights has been completed and the valid granted access rights have become powerful, so proceed to step S1214, and terminate the process with no access rights. To do.
- step S1116 the access control controller 504 provided by Java (registered trademark)
- step S1107 If it is determined that there is no access authority, the process proceeds to step S1110, and the process ends with no access authority.
- step S 1107 Java (registered trademark) provided access control controller 504 increments loop counter C by one.
- step S1108 the access control controller 504 provided by Java (registered trademark) compares the loop counter C and the number N of verification target domain lists. If C ⁇ N, there is an unverified domain to be verified, and the process returns to step S1104. In the case of C ⁇ N, all the verification target domains have been verified and it has been determined that all the verification target domains have access authority, so proceed to step S1109 to end the process with access authority. To do.
- the Java (registered trademark) access control controller 504 and the external access control means 508 cooperate to authenticate the access right.
- the external access control means registration means 512 In addition, in order to start the external access control means registration means 512, the policy provider setting of the security property file 505 prepared as standard in the Java (registered trademark) execution environment 502 as shown in FIG. Just change the value 702. Therefore, the external access control means registration means 512 that does not need to modify the existing Java (registered trademark) execution environment 502 program is started, and the external access control means 508 processing that performs original access authority authentication processing is added. Is possible.
- the right grant target 601 and the granted access right information 602 and the resource designation information that can be specified in the access right management table 506 provided in the standard Java (registered trademark) execution environment 502 In addition to 603 and operation content information 604, the vehicle system A valid state 605 can be described to indicate what state the granted access authority is valid when the state of the system 101 is in any state. Therefore, it is possible to specify the access authority that is effective according to the state of the car.
- the access right list holding means 511 receives the delegation of processing when the Java (registered trademark) access control controller 504 performs access right authentication, and the access right determination means 509 and the valid state determination means there.
- the access authority determination based on the granted access authority information 602, the resource designation information 603, and the operation content information 604, it is also determined whether the effective state 605 is satisfied by acquiring the vehicle state.
- the application 501 is granted an access right that is valid according to the state of the vehicle, it is possible to correctly determine whether the granted access right is valid, and the application 501 Access authority can be authenticated correctly.
- the Java (registered trademark) specification has a feature that an application developer can freely add access authority.
- the access privilege management table 506 provided in the Java (registered trademark) standard is expanded so that the valid state 605 can be added, an application developer who only has access privileges provided by the OS can be obtained.
- the added access authority can also be specified as an access authority that is valid according to the vehicle condition.
- the granted access authority information 602, the resource designation information 603, and the operation content information 604 for using the various in-vehicle APIs 507 may be added to the access authority management table 506.
- the external access control means 508 delegates the comparison processing of the granted access authority information 602, the resource designation information 603, and the operation content information 604 to the comparison process provided for the granted access authority. Therefore, even when new granted access authority information 602 is added after product shipment, a new key that does not require modification of the external access control means 508 is used. It can correspond to access authority.
- the external access control means registration means 512 is provided so that the external access control means 508 is executed at the time of access authority authentication.
- a process for calling the access authority list holding means 511 is directly added to the source of the access control controller 504 provided by Java (registered trademark). It is also possible to do.
- the functional configuration shown in FIG. 5 is as shown in FIG. Specifically, the external access control means registration means 512 is not necessary.
- the intervention of the external access control means registration means 512 is not necessary.
- the policy provider setting value 702 shown in FIG. 12 is left as the initial setting value of the Java (registered trademark) execution environment 502.
- the Java (registered trademark) execution environment 502 reads the access right management table 506 directly without calling the external access control means registration means 512.
- the Java (registered trademark) execution environment 502 directly generates the access right list holding means 511 of the external access control means 508, and the domain is generated.
- processing flow shown in FIGS. 10, 11, and 12 is basically the same.
- the access authority management table read request may be sent directly from the external access control means registration means 512 to the access authority management table 506 as shown in FIG.
- the processing flow shown in FIG. 9 does not require the operation of acquiring the granted access authority list in the Java (registered trademark) execution environment 502.
- processing flow shown in FIGS. 10, 11, and 12 is basically the same.
- the processing of the access authority list holding unit 511 of the external access control unit 508 is completely integrated into the Java (registered trademark) provided access control controller 504 provided by the Java (registered trademark) execution environment 502. It ’s okay.
- the external access control means registration means 512 is implemented in a form satisfying the specifications of the policy provider class, and the Java (registered trademark) provided access control controller 504 is installed. A method for registering the external access control means 508 is shown.
- the implementation example of the external access control means registration means 512 is not limited to the policy provider class, but may be provided as another implementation example such as a security manager.
- the Java (registered trademark) execution environment 502 is used as the execution environment of the application program, and an embodiment that is optimal in the Java (registered trademark) execution environment 502 is shown. It was. However, the present invention is not limited to application to the Java (registered trademark) execution environment 502. For example, Windows (registered trademark), MacOS (registered trademark), Linux (registered trademark), Symbian (registered trademark), etc. It can also be applied to other application execution environments.
- the external access control table 506 used for access control by the external access control means 508 is integrated with the access control table 506 provided by the Java (registered trademark) execution environment. I explained. However, the external access right management table used by the external access control means 508 is managed separately by holding files separately from the access right management table 506 provided by the Java (registered trademark) execution environment 502. OK.
- the power applied when the access control apparatus of the present invention is applied to the in-vehicle PC 111 is not limited to the in-vehicle PC 111.
- a wired server such as a home server or a mobile phone, It can be applied to devices that connect to various devices via wireless.
- step S1202 of the processing flow shown in FIG. 12 regardless of whether or not a valid state is specified in the access authority management table 506, all granted access authorities are acquired, and from step S1203 Processing was performed in step S1212. This is divided into two steps, such as first obtaining and verifying the granted access authority for which the valid state 605 is not set, and then obtaining and verifying the granted access right for which the valid state 605 is set. You can go.
- the valid state determination unit 510 installed in the external access control unit 508 verifies whether the state of the in-vehicle PC 111 or the vehicle system 101 is in a valid state.
- the valid state determination unit 510 installed in the external access control unit 508 verifies whether the state of the in-vehicle PC 111 or the vehicle system 101 is in a valid state.
- FIG. 18 is an explanatory diagram illustrating a functional configuration of the Java (registered trademark) execution environment 502 according to the second embodiment.
- Application 501 Java (registered trademark) execution environment 502, Java (registered trademark) provided
- API 503 Java (registered trademark) provided access control controller 504, security property file 505, access authority management table 506, various in-vehicle API 507, external access control means registration means 512, and various vehicle system resources 513 are described in Example 1. The description is omitted because it is the same as shown.
- the external access control means 508 is a function that determines the granted access authority that is valid according to the state of various on-vehicle devices mounted on the in-vehicle PC 111 and the vehicle system 101.
- This is a Java (registered trademark) program stored in the storage device 112 of the in-vehicle PC 111, and is operated in combination with the Java (registered trademark) execution environment 502 on the in-vehicle PC 111.
- the access authority determining means 509 is the same as that shown in the first embodiment, and based on the information on the granted access authority described in the access authority management table 509, the application 501 power ⁇ ava (registered trademark) This function is used to determine whether the user has access authority to execute various APIs 503 and in-vehicle APIs 507.
- Access authority list holding means 511 is the same as that shown in the first embodiment, and holds the granted access authority read from the access authority management table 506 by the access control controller 504 provided by Java (registered trademark). And a function for holding the granted access authority list when the granted access authority list to be given to the application 501 is extracted. In addition, it has a function to accept whether the external access authority receives the use access authority and whether or not the use access authority is included in the granted access authority list held internally.
- this embodiment is different from the first embodiment in that an access authority determining unit 509 and a state verification unit calling unit 1801 included in the external access control unit 508 are used.
- the state verification unit calling unit 1801 acquires a set of the state verification unit 1805 from the state verification unit management unit 1802 based on the valid state 605 described in the access authority management table 506. Then, using the set of acquired status verification means 1805, the statuses of various in-vehicle devices mounted on the in-vehicle PC 111 and the vehicle system 101 for the granted access authority determined to be valid by the access authority determination means 509. This is a means for determining whether or not it is in the valid state 605 assigned to the granted access authority.
- the state verification means management means 1802 is a means newly introduced in the second embodiment, and manages the state verification means 1805 for verifying whether the valid state 605 set in the access authority management table 506 is satisfied. This is a function for dynamically reading the state verification means 1805 in response to a request from the external access control means 508.
- This is a Java (registered trademark) program that is stored in the storage device 112 of the in-vehicle PC 111 and includes a Java (registered trademark) execution environment 502 on the in-vehicle PCI 11 and an external access control means 508.
- the state verification unit management unit 1802 includes a state verification unit reading unit 1803 and a state verification unit management table 1804 as components.
- the state verification means reading means 1803 provides a function for dynamically reading one or more state verification means 1805 in response to a request from the external access control means 508. It also provides a class or interface that defines the abstract methods that the state verification means 1805 should have.
- the state verification means management table 1804 is used for managing the correspondence between the valid state 605 described in the access right management table 506 and the state verification unit 1805 for verifying whether the valid state 605 is satisfied. It is a table.
- the state verification means 1805 is a set of means for verifying whether or not the state power granting access authority of the in-vehicle PC 111 and the vehicle system 101 is valid.
- This is a Java (registered trademark) program stored in the storage device 112 of the in-vehicle PC 111, or a Java (registered trademark) program downloaded via the network, such as the maintenance server 104 or the monitoring server 105.
- the external access control means 508 and the state verification means management means 1802 are operated in combination on the Java (registered trademark) execution environment 502 on the in-vehicle PCI 11.
- This is for multiple classes compiled from a program written in Java (registered trademark). It is a set and may be provided as a normal class, but it may be provided as a Jar file defined in the Java (registered trademark) specification, or it may be provided as a framework, bundle or service defined by OSGi. Sometimes provided in form.
- the state verification means 1805 may be subject to additional Z deletion Z change after the in-vehicle PC 111 is assembled. For example, if a new Java (registered trademark) program is added to the in-vehicle PC 111 Z is deleted Z is changed, if it is necessary to add a new valid state 605 to operate the program, state verification means 1805 Added Z deleted Z may be changed.
- Java registered trademark
- the status verification means 1805 adds Z deletion Z if the conditions for enabling access authority are changed due to legal revisions, etc. May be changed. Therefore, depending on the in-vehicle PC 111, there is a case where the state verification means 1805 does not exist.
- FIG. 19 is an explanatory diagram showing the configuration of the state verification means management table 1804.
- the valid state name 1901 describes a value that can correspond to the valid state 605 described in the access authority management table 506. In the simplest case, the same value as the valid state 605 is specified. This element is used for correspondence with the state verification means 1805 for verifying whether or not the valid state 605 exists. For example, “ALWAYS (always independent of state)”, “Load ⁇ essThan50 (CPU load factor 0% or less)”, “Door.lock (door lock is locked)”, “Meter.0 It is preferable to specify a value that makes it easy to see what state the in-vehicle PC 111 and various in-vehicle devices are in, such as “the car is parked”.
- the state verification means name 1902 is a value used to specify the state verification means 1805 for verifying whether or not it is in the valid state 605.
- a class name in which the state verification unit 1805 is mounted is described as the state verification unit name 1902.
- a plurality of status verification means names 1902 can be written for each valid status name 1901.
- ⁇ jp.co.melco.Stop '' is specified as the status verification means name 1902 for verifying whether the vehicle is stopped, or ⁇ jp.co. "melco.Daytime" can be specified at the same time.
- the parameter 1903 is a parameter set at the time of initialization of the state verification unit 1805 described in the state verification unit name 1902 or after initialization. This parameter 1903 is A different value can be specified for each status verification means 1805 described in the status verification means name 1902, or can be omitted. For example, as the state verification means name 1902 for verifying that the CPU load factor is below a certain value in the state verification means name 1902, “
- the access control method of the present invention registers the external access control means 508 with the Java (registered trademark) execution environment 502.
- the operation is the same as that shown in FIGS. 8 and 9 shown in the first embodiment, and a description thereof will be omitted.
- FIG. 20 is the processing of the external access control means 508 called from the Java (registered trademark) provided access control controller 504. Since this processing flow is slightly changed from the processing flow of FIG. 12 shown in the first embodiment, the differences will be mainly described below.
- step S2001 to step S2007 is the same as the processing from step S1201 to S1207 shown in FIG.
- step S2008 the state verification means calling means 1801 of the external access control means 508 takes out the valid state 605 set in the granted access authority, and the state verification means reading means 1802 of the state verification means management means 1802 Request status verification 1805—Expression reading. Details of this processing will be described later with reference to FIG.
- step S2009 the external access control means 508 state verification means calling means 1801 uses the state verification means 1805-expression acquired in step S2008 to give state power grant access to the in-vehicle PC 111 and the vehicle system 101. Verify whether the authority is in a valid state. Details of this processing will be described later with reference to FIGS. 22 and 23.
- step S2010 to step S2014 is the same as the processing from step S1210 to step S1214 of Fig. 12 shown in the first embodiment, and thus the description thereof is omitted.
- FIG. 21 is a processing flow in the case of reading the state verification means 1805—expression for verifying whether or not the valid state 605 holds based on the valid state 605 in which the granted access authority is valid.
- step S2101 the state verification unit reading unit 1803 determines which state verification unit 1805—expression is to be generated and uses the state verification unit calling unit 1801 of the external access control unit 508 as the effective state. And start processing.
- step S2102 the state verification unit reading unit 2003 checks whether the state verification unit management table 1804 has also been read. If already read, the process jumps to step S2104. If not read, the process proceeds to step S2103.
- step S2103 the state verification unit reading unit 1803 reads the state verification unit management table 1804, interprets the information described therein, and stores it in the state verification unit reading unit 1803.
- step S2104 the state verification means reading means 1803 reads the valid state name of the state verification means management table 1804 from the copy of the state verification means management table 1804 stored in the state verification means reading means 1803. It searches for and obtains an entry that matches 1901 and the valid state 605 received in step S2101.
- step S2105 state verification means reading means 1803 determines whether or not the corresponding entry has been found in the processing of step S2104. If the entry is powerful
- step S2106 Step if the entry was not found
- step S2106 state verification means reading means 1803 acquires the number of state verification means names 1902 that have been set from the entries acquired in step S2104. Note that a number from 0 to L-1 is assigned to the status verification means name 1902 and parameter 1903.
- step S2107 state verification means reading means 1803 sets loop counter E to 0. To do.
- step S2108 state verification means reading means 1803 obtains the Eth state verification means name 1902 from among the state verification means names 1902 numbered in step S2106. Also, the E-th parameter 1903 corresponding to the state verification means name 1902 is acquired.
- the state verification means reading means 1803 is a state verification means 1805 corresponding to the state verification means name 1902 acquired in step S2108 from the classes that can be read by the Java (registered trademark) execution environment 502. Search for and read.
- the parameter 1903 acquired in step S2108 is set to the read state verification means 1805.
- step S2110 state verification means reading means 1803 determines whether or not the state verification means 1805 has been successfully read in step S2109. If the reading is successful, the process proceeds to step S2111. If reading fails, the process proceeds to step S2114, and the process ends as a process failure.
- step S 2111 state verification means reading means 1803 increments loop counter E by 1.
- step S2112 state verification means reading means 1803 compares the number L of loop counter E and state verification means name 1902. If E ⁇ L, since there is a state verification means 1805 in which reading has not been completed, the processing returns to step S2108. If E ⁇ L, all the state verification means 1805 have been read, so the process proceeds to step S2113, the state verification means 1805—expression is returned, and the process is terminated.
- step S2201 external access control means 508 state verification means calling means
- step S2202 the state verification means calling means 1801 of the external access control means 508 calculates the number L of state verification means 1805 included in the state verification means 1805—expression received in step S2201. At the same time, the state verification means 1805 is assigned a number from 0 to L-1.
- step S2203 the state verification means calling means 1801 of the external access control means 508 sets the value of the loop counter F to zero.
- step S2204 the state verification means calling means 1801 of the external access control means 508 obtains the F-th state verification means 1805 from the state verification means 1805 assigned the number in step S2202.
- step S2205 the status verification means calling means 1801 of the external access control means 508 calls the status verification method of the status verification means 1805 acquired in step S2204, and the granted access authority in the in-vehicle PC 111 or the vehicle system 101 Verify whether is in a valid state.
- the processing in FIG. 23 is a flow of processing that is performed when the state verification unit 1805 calls the state confirmation method.
- step S2301 the state verification unit 1805 starts processing by a method call from the state verification unit calling unit 1801 of the external access control unit 508.
- step S2302 the status verification means 1805 obtains status information necessary for verifying whether the granted access authority is valid among the status information of the in-vehicle PC 111 and the vehicle system 101. To do.
- This state information is acquired by calling various APIs 503 provided by Java (registered trademark) and various in-vehicle APIs 507 implemented in the Java (registered trademark) execution environment 502.
- step S2303 the state verification means 1805 uses the parameters set in the state verification unit 1805 in step S2119 in Fig. 21 and the state information acquired in step S2302 to install the vehicle PC 111 or the vehicle system. In 101, it is verified whether the granted access authority is valid.
- step S2304 the status verification means 1805 accesses as a result of executing step S2303. Check if the privilege is in a valid state. If the access authority is in a valid state, the process proceeds to step S2305, and the process ends as the valid state. If the access authority is not valid, the process proceeds to step S2306, and the process ends as invalid.
- step S2206 state verification means calling means 1801 of external access control means 508 checks the result of calling state verification means 1805 in step S2205. If the result of the processing is in an effective state, one of the conditions specified in the effective state 605 is satisfied, so that the process proceeds to step S2207 and proceeds to verification using another state verification means 1805. If it is determined that the state is invalid, the process proceeds to step S2210, and the process ends as an invalid state.
- step S2207 the state verification means calling means 1801 of the external access control means 508 increments the value of the loop counter F by one.
- step S2208 the state verification means calling means 1801 of the external access control means 508 compares the loop counter F with the number L of the state verification means 1805. If F ⁇ L, since there is a state verification unit 1805 that has not been verified, the process returns to step S2204. In the case of F ⁇ L, the state confirmation processing using all state verification means 1805 has been completed, so the process proceeds to step S2209, and the processing ends with the processing result of the valid state as the confirmation result of the valid state. To do.
- the state verification means 1805 for verifying whether the access authority is in the valid state is implemented independently of the external access control means 508, and the state verification means management means 1802 is used as necessary.
- the external access control means 508 can be implemented independently of the determination processing in the valid state 605 by setting the system so that it can be dynamically read. Therefore, it is possible to set a unique valid state 605 according to the service requirements of the monitoring company or service company that does not modify the program of the external access control means 508.
- the Java (registered trademark) execution environment 502 installed in advance on the in-vehicle PC 111 and the access control method of the present invention can set only the condition of “the vehicle is stopped”, the in-vehicle PC 111 New “Driving on general road” and “Door lock” without renovating software These conditions can be easily added by the service company or the user.
- the external access control means registration means 512 is provided so that the external access control means 508 is executed at the time of access authority authentication.
- a process for calling the access authority list holding means 511 is directly added to the source of the access control controller 504 provided by Java (registered trademark). It is also possible to do. Since the modification of the functional configuration and the flow of processing is the same as that in the first embodiment, it is omitted here.
- the external access control means registration means 512 is implemented so as to satisfy the specifications of the policy provider class, and the external access control means 508 is provided to the access control controller 504 provided by Java (registered trademark). Showed how to register.
- the implementation form of the external access control means registration means 512 is not limited to the policy provider class, but may be provided as another implementation form such as a security manager.
- the Java (registered trademark) execution environment 502 is used as the execution environment of the application program, and the embodiment that is optimal in the Java (registered trademark) execution environment 502 is shown.
- the present invention is not limited to application to the Java (registered trademark) execution environment 502.
- Windows registered trademark
- MacOS registered trademark
- Linux registered trademark
- Symbian registered trademark
- the external access authority management table used by the external access control means 508 for access control is integrated into the access authority management table 506 provided by the Java (registered trademark) execution environment 502. The case was explained. However, the external access authority management table used by the external access control means 508 is not necessarily the same file as the access authority management table 506 provided by the Java (registered trademark) execution environment 502, and is managed by holding the files individually. OK.
- the power applied to the application apparatus of the access control of the present invention as the in-vehicle PC 111 is not limited to the in-vehicle PC 111.
- a home server, a mobile phone, etc. It can be applied to devices that connect to various devices via wireless.
- step S2002 of the processing flow shown in Fig. 20 regardless of whether or not the valid state 605 is specified in the access right management table 506, all granted access rights are acquired, and the step Processing from S2003 to step S2012. First, if the valid state 605 is not set, the granted access authority is acquired and verified! Next, the valid state 605 is set and the granted access right is acquired and verified. You can go to
- the information related to the state verification unit 1805 is stored in association with the valid state name 1901 in the state verification unit management table 1804. However, information regarding the state verification unit 1805 may be directly described in the valid state 605 of the access authority management table 506.
- the state verification means management table 1804 is read for the first time when the state verification means management means 1803 is used.
- this process may be performed any time before the state verification unit management unit 1803 is used for the first time, for example, when the Java (registered trademark) execution environment 502 is activated.
- the state verification means calling means 1801 is a force that reads the state verification means 1805 using the state verification means reading means 1803.
- the state verification means 1805 may be acquired without using the state verification means reading means 1803.
- FIG. 24 is an explanatory diagram showing the configuration of the Java (registered trademark) execution environment 502 in the third embodiment.
- Application 501 Java (registered trademark) execution environment 502, Java (registered trademark) provided API503, Java (registered trademark) provided access control controller 504, security property file 505, access authority management table 506, various in-vehicle API507, external access control means 508, access authority judgment means 509, access authority list holding means 511, external Access control means registration means 512, various vehicle system resources 513, status verification means calling means 1801, status verification means management means 1802, status verification means reading means 1803, status verification means management table 1804, status verification means 1805 The description is omitted because it is the same as that shown in Example 1 and Example 2.
- Access authority exercise status management means 2401 is a means for storing the granted access authority exercised when calling various APIs 503 provided by Java (registered trademark) or various in-vehicle APIs 507.
- An authority exercise status management table 2402 is stored as a table to be stored therein.
- the authority exercise status management table 2402 shows information such as the time of the last exercise and the number of exercises so far, regarding the granted access authority exercised when calling various API 503 provided by Java (registered trademark) or various in-vehicle API 507. It is a table to store.
- the code source 2501 is an entry for storing information on the Java (registered trademark) program for which the granted access authority has been exercised.
- the code source which is the attribute of the Java (registered trademark) program generated in step S902 of FIG. 9 in the first embodiment is stored.
- the access authority information 2502 is an entry for storing information on the granted access authority exercised by the Java (registered trademark) program represented by the code source 2501.
- the granted access authority information 602 stored in the access authority management table 506 in FIG. 6 of the first embodiment is stored.
- the last exercise time 2503 is an entry that manages the time when the Java (registered trademark) program represented by the code source 2501 last exercised the granted access authority represented by the access authority information 2502. .
- the number of exercises is an entry that manages how many times the granted access authority represented by the Java (registered trademark) program power access authority information information 2502 represented by the code source 2501 has been exercised so far. is there. Next, the flow of access control in this embodiment will be described.
- the access control method of the present invention registers the external access control means 508 with the Java (registered trademark) execution environment 502.
- the operation is the same as in FIGS. 8 and 9 shown in the first embodiment, and a description thereof will be omitted.
- the difference is that a code source is also provided in addition to the granted access authority list as a parameter for creating the access authority list holding means 511 in step S907 of FIG.
- the processing flow shown in FIG. 26 is the processing of the access control controller 504 provided by Java (registered trademark). After this processing flow, since the processing flow force of FIG. 11 shown in the first embodiment is slightly changed, the difference will be mainly described below.
- step S2601 in FIG. 26 is called.
- step S2601 to step S2608 is the same as the processing from step S1101 to S1108 in Fig. 11, and a description thereof will be omitted.
- the processing shown in FIG. 20 is called inside step S2605, and the processing shown in FIG. 22 is called in step S2009 shown in FIG. 20.
- step S2205 shown in FIG. If the class is used to check the number of exercises and the interval, it is different in that the granted access authority and code source are given to the status verification means 1805 as parameters.
- step S2609 the access control controller 504 provided by Java (registered trademark)
- the access authority exercise status management means 2401 is requested to update the authority exercise status management table 2402.
- step S2610 the access control controller 504 provided by Java (registered trademark) terminates the processing as having access authority as a result of the access authority authentication process.
- FIG. 27 is a processing flow when the state verification means 1805 for verifying whether or not it is in a valid state verifies the number of exercises or the exercise interval of the granted access authority.
- step S2701 the state verification unit 1805 starts valid state confirmation processing in response to a request from the state verification unit calling unit 1801 of the external access control unit 508. At this time, the code source and grant access authority are received as input.
- step S2702 the state verification means 1805 requests the access authority exercise status management means 2401 to obtain the last access time 2503 or the number of exercises 2504 of the granted access authority.
- the processing in FIG. 28 is a processing flow when the access authority exercise status management means 2401 obtains the last access time 2503 or the number of exercises 2504 of the granted access authority.
- step S2801 the access authority exercise status management means 2401 receives a pair of code source and granted access authority as input from the state verification unit 1805, and starts processing.
- step S2802 the access authority exercise status management means 2401 searches the authority source status management table 2402 for a line element matching the code source 2501.
- step S2803 the access authority exercising status management means 2401 determines whether or not a line element with a matching code source has been found as a result of the processing in step S2802. As a result of the determination, if the result is positive, the process proceeds to step S2804. If not found, the process proceeds to S2808, and the process is terminated as it is not exercised.
- step S2804 the access authority exercise status management means 2401 gives the access authority information 2502 of the row element from the line element that matches the code source 2501 searched in step S2802. A line element that matches the access authority information 602 is searched.
- step S2805 the access right exercising status management means 2401 performs the process of step S2804. As a result, it is determined whether a line element matching the code source 2501 and the access authority information 2502 is found. As a result of the determination, if it is determined that the image has been found, the process proceeds to step S2806. If the power is too strong, the process proceeds to S2808, and the processing is terminated as it is not exercised.
- step S2806 access authority exercise status management means 2401 obtains the last exercise time 2503 and the number of exercises 2504 of the granted access authority from the row element searched in step S2805.
- access authority exercise status management means 2401 outputs the final exercise time 2503 and the number of exercises 2504 acquired in step S2806, and ends the process.
- step S2703 state verification means 1805 verifies whether unexercised is returned as a result of step S2702. If it has not been exercised, the process proceeds to step S2707, and the process ends as a valid state. If you are unexercised, go to step S2704.
- step S2704 state verification means 1805 obtains the current time. Note that this step may be skipped in the case of the status verification means 1805 without verifying the exercise interval of the granted access authority!
- step S2705 the state verification means 1805 generates the final access time 2503 and the number of exercises 2504 of the granted access authority acquired in step S2702, and the current time acquired in step S2704 and the state verification means 1805 generation. From the parameters received from time to time, verify whether the conditions for enabling the granted access authority are satisfied.
- step S2706 state verification means 1805 proceeds to step S2706 if the granted access authority satisfies the conditions for enabling as a result of the verification in step S2705, and ends the processing as an effective state. To do. If the granted access authority does not satisfy the conditions for enabling, the process advances to step S2707 to end the process as an invalid state.
- state verification means In 1805 it is possible to check whether the state is valid.
- step S2901 the access authority exercising status management means 2401 starts processing by receiving a set of domains and the granted access authority as input from step S2609 in FIG.
- step S2902 access authority exercise status management means 2401 calculates the number N of domains received in step S2901. A number from 0 to N-1 is assigned to the domain. In the subsequent processing, the history of exercising the granted access authority assigned to this domain is left.
- step S2903 access authority exercise status management means 2401 acquires the current time.
- step S2904 access authority exercise status management means 2401 initializes loop counter G to zero.
- step S2905 the access authority exercising status management means 2401 extracts the G-th domain from the domain power assigned the number in step S2902, and obtains the code source of the domain.
- step S2906 the access authority exercise status management means 2401 searches the authority source status management table 2402 for a line element matching the code source 2501.
- step S2907 the access right exercising status management means 2401 determines whether or not a line element matching the code source 2501 has been found as a result of the processing in step S2906. If it is found as a result of the determination, the process proceeds to step S2908. If not found, proceed to S2911.
- step S2908 the access authority exercise status management means 2401 obtains the row element that matches the access authority information 2502 from the line element that matches the code source 2501 searched in step S2906. Perform a search.
- step S2909 access authority exercise status management means 2401 determines whether or not a line element matching code source 2501 and access authority information 2502 has been found as a result of the processing in step S2908. As a result of the determination, if it is determined that the image is strong, the process proceeds to step S2910. If not, go to S2911. [0271] In step S2910, the access authority exercise status management means 2401 increments the element of the exercise count 2504 by 1 with respect to the row element found in step S2908. Further, the current time acquired in step S2903 is stored for the final exercise time 2503, and the process proceeds to step S2912.
- Access authority exercise status management means 2401 in step S2911 is the code source acquired in step S2905, the access authority information of the granted access authority received in step S2901, 1 as the number of exercises, and the step as the last exercise time The current time acquired in S2903 is set, and a row element is added to the authority exercise status management table 2402. Then, the process proceeds to step S2912.
- step S2912 the access right exercising status management means 2401 increments the loop counter G by one.
- step S2913 access right exercising status management means 2401 compares loop counter G with the number N of domains calculated in step S2902. If G and N, since there is a row element in the authority exercise status management table 2401 that has not been updated, the processing returns to step S2905. If G ⁇ N, updating of all row elements has been completed, so the process proceeds to step S2914 and the process is terminated.
- the exercise history can be stored in the authority exercise status management table 2202.
- the access right exercise status management table 2401. Call the process stored in 2402. Then, when verifying the granted access authority, the number of exercises and the interval of the granted access authority can be determined by verifying the number and interval of the authority exercise based on the information stored in the authority exercise status management table 2402. It is possible to use the access authority that becomes effective accordingly.
- the external access control means registration means 512 is provided so that the external access control means 508 is executed at the time of access authority authentication.
- the process of calling the access authority list holding means 511 is directly handled by Java (registered). It is also possible to add to the source of the access control controller 504 provided by the trademark. Since the modification of the functional configuration and the flow of processing is the same as that in the first embodiment, it is omitted here.
- the external access control means registration means 512 is implemented so as to satisfy the specifications of the policy provider class, and the external access control means 508 is provided for the Java (registered trademark) provided access control controller 504. Showed how to register.
- the implementation form of the external access control means registration means 512 is not limited to the policy provider class, but may be provided as another implementation form such as a security manager.
- the Java (registered trademark) execution environment 502 is used as the execution environment of the application program, and an embodiment that is optimal in the Java (registered trademark) execution environment 502 is shown.
- the present invention is not limited to application to the Java (registered trademark) execution environment 502.
- Windows registered trademark
- MacOS registered trademark
- Linux registered trademark
- Symbian registered trademark
- the external access authority management table used by the external access control means 508 for access control is integrated with the access authority management table 506 provided by the Java (registered trademark) execution environment 502. The case was explained. However, the external access authority management table used by the external access control means 508 is not necessarily the same file as the access authority management table 506 provided by the Java (registered trademark) execution environment 502, and is managed by holding the files individually. OK.
- the force applied to the case where the access control application device of the present invention is applied to the in-vehicle PC 111 is not limited to the in-vehicle PC 111.
- a home server, a mobile phone, etc. It can be applied to devices that connect to various devices via wireless.
- step S2002 of the processing flow shown in FIG. 20 regardless of whether or not the valid state 605 is specified in the access right management table 506, all granted access rights are acquired, and the step Processing from S2003 to step S2012.
- the information related to the state verification unit 1805 is stored in association with the valid state name 1901 in the state verification unit management table 1804. However, information regarding the state verification unit 1805 may be directly described in the valid state 605 of the access authority management table 506.
- the state verification means management means 1803 is read for the first time when the state verification means management table 1804 is read.
- this process may be performed any time before the state verification unit management unit 1803 is used for the first time, for example, when the Java (registered trademark) execution environment 502 is activated.
- the state verification means calling means 1801 is a force that reads the state verification means 1805 using the state verification means reading means 1803.
- the state verification means 1805 may be acquired without using the state verification means reading means 1803.
- a code source is given as a parameter in addition to the granted access authority list.
- the code source set here is actually used by the state verification unit that verifies the number of use access rights exercise or the exercise interval shown in Fig. 27, the code source is sent to this state verification unit. If so, you may be notified at any other timing.
- the access authority information of the granted access authority is saved, and when the granted access authority having the same access authority information is again used.
- the final exercise time 2503 and the number of exercises 2504 were used to check whether the granted access authority was valid.
- the information stored in the authority exercise status management table 2402 is stored not only by the access authority information of the granted access authority but also by specifying the resource designation information and operation content information, and also using that information. It may be determined whether the authority is valid.
- FIG. 29 the flow of processing is shown for a case where there is one granted access right recorded in the right exercise status management table 2402. Only However, there may be multiple granted access rights that need to keep an exercise history for the use access rights to be used, even within the same domain. In this case, the process shown in FIG. 29 needs to be repeated for all granted access authorities that need to leave an exercise history.
- the present invention can be applied to a computer that performs access control.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/918,789 US20090031418A1 (en) | 2005-04-21 | 2005-04-21 | Computer, method for controlling access to computer resource, and access control program |
| CNA2005800495395A CN101167062A (zh) | 2005-04-21 | 2005-04-21 | 计算机、对计算机资源的访问控制方法以及访问控制程序 |
| EP05734643A EP1873650A4 (en) | 2005-04-21 | 2005-04-21 | COMPUTERS, METHOD OF CONTROLLING ACCESS TO COMPUTER DEVICES AND ACCESS CONTROL PROGRAM |
| JP2007514387A JP4755181B2 (ja) | 2005-04-21 | 2005-04-21 | コンピュータ及びコンピュータリソースへのアクセス制御方法及びアクセス制御プログラム |
| PCT/JP2005/007622 WO2006114878A1 (ja) | 2005-04-21 | 2005-04-21 | コンピュータ及びコンピュータリソースへのアクセス制御方法及びアクセス制御プログラム |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2005/007622 WO2006114878A1 (ja) | 2005-04-21 | 2005-04-21 | コンピュータ及びコンピュータリソースへのアクセス制御方法及びアクセス制御プログラム |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2006114878A1 true WO2006114878A1 (ja) | 2006-11-02 |
Family
ID=37214516
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2005/007622 Ceased WO2006114878A1 (ja) | 2005-04-21 | 2005-04-21 | コンピュータ及びコンピュータリソースへのアクセス制御方法及びアクセス制御プログラム |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US20090031418A1 (ja) |
| EP (1) | EP1873650A4 (ja) |
| JP (1) | JP4755181B2 (ja) |
| CN (1) | CN101167062A (ja) |
| WO (1) | WO2006114878A1 (ja) |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2012029117A (ja) * | 2010-07-26 | 2012-02-09 | Nec Corp | 移動通信システム、加入者制御サーバ、および加入者情報操作方法 |
| JP2016027483A (ja) * | 2011-05-24 | 2016-02-18 | 日本電気株式会社 | 情報処理システム、アクセス制御方法、情報処理装置およびその制御方法と制御プログラム |
| JP2022120689A (ja) * | 2021-02-05 | 2022-08-18 | トヨタ自動車株式会社 | 車載情報処理装置、情報処理方法及びプログラム |
| JPWO2023195468A1 (ja) * | 2022-04-07 | 2023-10-12 | ||
| WO2023210290A1 (ja) * | 2022-04-28 | 2023-11-02 | 株式会社デンソー | モビリティサービス提供システム、車載システム、管理サーバ、アクセス制御方法、及びプログラム |
| JPWO2024070774A1 (ja) * | 2022-09-29 | 2024-04-04 | ||
| JPWO2024143201A1 (ja) * | 2022-12-28 | 2024-07-04 |
Families Citing this family (33)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7461071B2 (en) * | 2005-04-04 | 2008-12-02 | Younite, Inc. | Distributed management framework for personal attributes |
| US7660558B2 (en) | 2005-12-31 | 2010-02-09 | Adobe Systems Incorporated | Interrupting and resuming a media player |
| US20070155426A1 (en) * | 2005-12-31 | 2007-07-05 | Govind Balakrishnan | Application access to cellular telephone settings |
| US20130167024A1 (en) | 2006-12-05 | 2013-06-27 | Adobe Systems Incorporated | Embedded document within an application |
| US7743339B1 (en) | 2007-02-01 | 2010-06-22 | Adobe Systems Incorporated | Rendering text in a brew device |
| US8589779B2 (en) * | 2007-03-08 | 2013-11-19 | Adobe Systems Incorporated | Event-sensitive content for mobile devices |
| CA2682415A1 (en) * | 2007-03-30 | 2008-10-09 | Real Enterprise Solutions Development B.V. | Method and system for determining entitlements to resources of an organization |
| US8463813B2 (en) * | 2007-04-12 | 2013-06-11 | Younite, Inc. | Individualized data sharing |
| US10229191B2 (en) | 2009-09-09 | 2019-03-12 | Varonis Systems Ltd. | Enterprise level data management |
| US8578507B2 (en) | 2009-09-09 | 2013-11-05 | Varonis Systems, Inc. | Access permissions entitlement review |
| US20110061093A1 (en) * | 2009-09-09 | 2011-03-10 | Ohad Korkus | Time dependent access permissions |
| CN102656553B (zh) | 2009-09-09 | 2016-02-10 | 瓦欧尼斯系统有限公司 | 企业级数据管理 |
| WO2011092686A1 (en) * | 2010-01-27 | 2011-08-04 | Varonis Systems, Inc. | Time dependent access permissions |
| DE102010008816A1 (de) * | 2010-02-22 | 2011-08-25 | Continental Automotive GmbH, 30165 | Verfahren zur Online-Kommunikation |
| JP2011197903A (ja) * | 2010-03-18 | 2011-10-06 | Fujitsu Ltd | アクセス制御情報配布装置、アクセス制御情報配布プログラム、アクセス制御システム、及びアクセス制御情報配布方法 |
| WO2011135819A1 (ja) * | 2010-04-26 | 2011-11-03 | 株式会社ニコン | 構造化照明顕微鏡装置 |
| US9741006B2 (en) * | 2010-05-14 | 2017-08-22 | Oracle International Corporation | System and method for providing complex access control in workflows |
| US9852382B2 (en) | 2010-05-14 | 2017-12-26 | Oracle International Corporation | Dynamic human workflow task assignment using business rules |
| US10296596B2 (en) | 2010-05-27 | 2019-05-21 | Varonis Systems, Inc. | Data tagging |
| CN103026334A (zh) | 2010-05-27 | 2013-04-03 | 瓦欧尼斯系统有限公司 | 数据分类 |
| CN101902402A (zh) * | 2010-07-21 | 2010-12-01 | 中兴通讯股份有限公司 | 一种用户权限管理方法、装置 |
| US9680839B2 (en) | 2011-01-27 | 2017-06-13 | Varonis Systems, Inc. | Access permissions management system and method |
| EP2668563A4 (en) | 2011-01-27 | 2015-06-10 | Varonis Systems Inc | SYSTEM AND METHOD FOR MANAGING ACCESS RIGHTS |
| JP5472466B2 (ja) * | 2011-09-12 | 2014-04-16 | トヨタ自動車株式会社 | 車両用電子制御装置 |
| WO2013074901A2 (en) * | 2011-11-16 | 2013-05-23 | Flextronics Ap, Llc | Control of device features based on vehicle indications and state |
| DE102011120249A1 (de) * | 2011-12-05 | 2013-06-06 | Volkswagen Aktiengesellschaft | Verfahren zum Betreiben eines Internetprotokoll-basierten Funktionssystems und dazugehöriges Internetprotokoll-basiertes ... |
| US9251363B2 (en) | 2013-02-20 | 2016-02-02 | Varonis Systems, Inc. | Systems and methodologies for controlling access to a file system |
| TW201537458A (zh) * | 2014-03-31 | 2015-10-01 | Quanta Comp Inc | 操作多重作業系統之方法及其電子裝置 |
| US10104123B2 (en) * | 2015-09-23 | 2018-10-16 | Ca, Inc. | Fetching a policy definition library from a policy server at mobile device runtime of an application package to control access to mobile device resources |
| CN116873874A (zh) * | 2017-04-18 | 2023-10-13 | 突破技术有限责任公司 | 硫的生产 |
| US10437786B2 (en) | 2017-10-21 | 2019-10-08 | Dropbox, Inc. | Interoperability between content management system and collaborative content system |
| US10586066B2 (en) * | 2017-10-21 | 2020-03-10 | Dropbox, Inc. | Interoperability between content management system and collaborative content system |
| DE102018001558A1 (de) * | 2018-02-28 | 2019-08-29 | Daimler Ag | Fahrberechtigungssystem |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2000019326A1 (en) * | 1998-09-29 | 2000-04-06 | Fujitsu Limited | Method and device for access request processing |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5375244A (en) * | 1992-05-29 | 1994-12-20 | At&T Corp. | System and method for granting access to a resource |
| JP3659144B2 (ja) * | 2000-08-25 | 2005-06-15 | トヨタ自動車株式会社 | 入力画面の制御装置 |
| JP2003044297A (ja) * | 2000-11-20 | 2003-02-14 | Humming Heads Inc | コンピュータリソースの制御を行なう情報処理方法および装置、情報処理システム及びその制御方法並びに記憶媒体、プログラム |
| JPWO2003017159A1 (ja) * | 2001-08-10 | 2004-12-09 | 松下電器産業株式会社 | 電子機器 |
| JP2004021923A (ja) * | 2002-06-20 | 2004-01-22 | Matsushita Electric Ind Co Ltd | 情報処理装置と情報処理方法 |
| US7565533B2 (en) * | 2002-11-05 | 2009-07-21 | Sun Microsystems, Inc. | Systems and methods for providing object integrity and dynamic permission grants |
| US7444668B2 (en) * | 2003-05-29 | 2008-10-28 | Freescale Semiconductor, Inc. | Method and apparatus for determining access permission |
| US20060085852A1 (en) * | 2004-10-20 | 2006-04-20 | Caleb Sima | Enterprise assessment management |
-
2005
- 2005-04-21 WO PCT/JP2005/007622 patent/WO2006114878A1/ja not_active Ceased
- 2005-04-21 US US11/918,789 patent/US20090031418A1/en not_active Abandoned
- 2005-04-21 CN CNA2005800495395A patent/CN101167062A/zh active Pending
- 2005-04-21 EP EP05734643A patent/EP1873650A4/en not_active Withdrawn
- 2005-04-21 JP JP2007514387A patent/JP4755181B2/ja not_active Expired - Fee Related
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2000019326A1 (en) * | 1998-09-29 | 2000-04-06 | Fujitsu Limited | Method and device for access request processing |
Cited By (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2012029117A (ja) * | 2010-07-26 | 2012-02-09 | Nec Corp | 移動通信システム、加入者制御サーバ、および加入者情報操作方法 |
| JP2016027483A (ja) * | 2011-05-24 | 2016-02-18 | 日本電気株式会社 | 情報処理システム、アクセス制御方法、情報処理装置およびその制御方法と制御プログラム |
| JP2022120689A (ja) * | 2021-02-05 | 2022-08-18 | トヨタ自動車株式会社 | 車載情報処理装置、情報処理方法及びプログラム |
| JP7622456B2 (ja) | 2021-02-05 | 2025-01-28 | トヨタ自動車株式会社 | 車載情報処理装置、情報処理方法及びプログラム |
| WO2023195468A1 (ja) * | 2022-04-07 | 2023-10-12 | 株式会社デンソー | 車両制御システム、アクセス制御装置、アクセス制御方法 |
| JP7619524B2 (ja) | 2022-04-07 | 2025-01-22 | 株式会社デンソー | 車両制御システム、アクセス制御装置、アクセス制御方法 |
| JPWO2023195468A1 (ja) * | 2022-04-07 | 2023-10-12 | ||
| WO2023210290A1 (ja) * | 2022-04-28 | 2023-11-02 | 株式会社デンソー | モビリティサービス提供システム、車載システム、管理サーバ、アクセス制御方法、及びプログラム |
| JPWO2023210290A1 (ja) * | 2022-04-28 | 2023-11-02 | ||
| JP7772202B2 (ja) | 2022-04-28 | 2025-11-18 | 株式会社デンソー | モビリティサービス提供システム、車載システム、管理サーバ、アクセス制御方法、及びプログラム |
| JPWO2024070774A1 (ja) * | 2022-09-29 | 2024-04-04 | ||
| WO2024070774A1 (ja) * | 2022-09-29 | 2024-04-04 | 株式会社デンソー | アクセス制御装置、アクセス制御方法 |
| JP7790592B2 (ja) | 2022-09-29 | 2025-12-23 | 株式会社デンソー | アクセス制御装置、アクセス制御方法 |
| JPWO2024143201A1 (ja) * | 2022-12-28 | 2024-07-04 | ||
| WO2024143201A1 (ja) * | 2022-12-28 | 2024-07-04 | 株式会社デンソー | アクセス管理装置、アクセス管理システム、アクセス管理プログラム、アクセス管理方法 |
| JP7772258B2 (ja) | 2022-12-28 | 2025-11-18 | 株式会社デンソー | アクセス管理装置、アクセス管理システム、アクセス管理プログラム、アクセス管理方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP1873650A4 (en) | 2010-11-10 |
| JP4755181B2 (ja) | 2011-08-24 |
| EP1873650A1 (en) | 2008-01-02 |
| CN101167062A (zh) | 2008-04-23 |
| JPWO2006114878A1 (ja) | 2008-12-11 |
| US20090031418A1 (en) | 2009-01-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4755181B2 (ja) | コンピュータ及びコンピュータリソースへのアクセス制御方法及びアクセス制御プログラム | |
| CN101816006B (zh) | 用于web服务的安全性策略验证 | |
| US8719950B2 (en) | Access control apparatus and storage medium | |
| US8074287B2 (en) | Renewable and individualizable elements of a protected environment | |
| KR100803595B1 (ko) | 네트워크 내 콘텐츠에 대한 사용자 액세스 제어 시스템 및방법 | |
| CA2923740C (en) | Software code signing system and method | |
| US7971232B2 (en) | Setting group policy by device ownership | |
| US20120090021A1 (en) | Platform Specific Application Building | |
| EP2766839A1 (en) | System and method for creating secure applications | |
| Deubler et al. | Sound development of secure service-based systems | |
| CN113297595A (zh) | 提权处理方法、装置、存储介质与电子设备 | |
| CA2951914A1 (en) | Restricted code signing | |
| US8543997B2 (en) | Secure dynamic loading | |
| US12468786B2 (en) | Checking a license for the usage of at least one performance property in an internet-of-things (IoT) device | |
| CN101146697B (zh) | 程序提供装置、存储媒体及车载信息系统 | |
| Gansel et al. | An access control concept for novel automotive HMI systems | |
| Bernardeschi et al. | Modeling and generation of secure component communications in AUTOSAR | |
| US20090077615A1 (en) | Security Policy Validation For Web Services | |
| JP2006079223A (ja) | アプリケーションプログラム管理装置及びそれに用いる管理方法並びにそのプログラム | |
| CN101167296A (zh) | 受保护计算环境的可更新和可个性化元件 | |
| CN116991472B (zh) | 管理全局资源的方法及计算设备 | |
| JP7658574B2 (ja) | 機器制御装置、管理装置、機器管理システム、機器制御方法、及びプログラム | |
| KR101265887B1 (ko) | 보호 컴퓨팅 환경을 제공하는 방법 및 장치 내에 보호 환경을 설정하는 방법 | |
| WO2024127532A1 (ja) | アクセス許可装置、および、アクセス許可方法 | |
| MacLean et al. | Exploring Security and Permissions |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 2007514387 Country of ref document: JP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 11918789 Country of ref document: US Ref document number: 2005734643 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 200580049539.5 Country of ref document: CN |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| NENP | Non-entry into the national phase |
Ref country code: RU |
|
| WWW | Wipo information: withdrawn in national office |
Ref document number: RU |
|
| WWP | Wipo information: published in national office |
Ref document number: 2005734643 Country of ref document: EP |