The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 25, 2014

Filed:

Jun. 17, 2011
Applicants:

Ryotaro Hayashi, Tokyo, JP;

Mikio Hashimoto, Tokyo, JP;

Hiroyoshi Haruki, Tokyo, JP;

Yurie Fujimatsu, Tokyo, JP;

Inventors:

Ryotaro Hayashi, Tokyo, JP;

Mikio Hashimoto, Tokyo, JP;

Hiroyoshi Haruki, Tokyo, JP;

Yurie Fujimatsu, Tokyo, JP;

Assignee:
Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 12/14 (2006.01); G06F 21/00 (2013.01); G06F 21/54 (2013.01); G06F 21/53 (2013.01);
U.S. Cl.
CPC ...
G06F 21/54 (2013.01); G06F 12/1416 (2013.01); G06F 21/53 (2013.01);
Abstract

According to one embodiment, an information processing device stores a program list and plural types of security functions each defining therein protection attributes for respective arguments related to input and output of data to be protected, and stores function argument protection attributes and dependency relations each of which is defined by a determinant set and a dependent attribute that satisfy a predetermined condition. The device detects a combination of first and second security functions in which integrity of variables included in a determinant set of one dependency relation in the first security function are verified by the second security function, generates a third security function which adds protection attributes that guarantee integrity to variables included in the dependent attribute of the dependency relation in the first security function when verification of the second security function is successful and which outputs the variables, and updates the function argument protection attribute and the dependency relation concomitantly with an addition of the third security function.


Find Patent Forward Citations

Loading…