Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer resource verifying method and computer resource verifying program

A technology of computer resources and verification methods, applied in the field of computer resource verification methods and computer resource verification programs, can solve the problems of heavy load and high cost of service provider devices, and achieve the effect of preventing improper verification and reducing load

Inactive Publication Date: 2009-08-12
FUJITSU LTD
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the conventional technology described above, when the number of service users increases and the number of user terminal devices to be verified in the environment increases, there is a problem that a large load is generated on the service provider device.
[0006] In other words, the service provider expects an increase in the number of service users, but when the number of users increases, the number of user terminal devices whose security is confirmed also increases. In order to cope with this, it is necessary to strengthen the confirmation security permanent service provider, resulting in high costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer resource verifying method and computer resource verifying program
  • Computer resource verifying method and computer resource verifying program
  • Computer resource verifying method and computer resource verifying program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Hereinafter, embodiments of the computer resource verification method and the computer resource verification program of the present invention will be described in detail according to the accompanying drawings. In addition, here, the case of verifying an application program installed on a user terminal device as a computer resource is described, but hardware verification may also be performed in addition to the application program.

[0048] First, the application verification system of the present invention will be described. figure 1 It is a figure explaining the application verification system of this invention. In this application verification system, the user terminal device 10 , the authentication station server device 20 , and the network company server device 30 are connected to the network 40 , and the network company server device 30 is also connected to the network 50 .

[0049] The user terminal device 10 is a terminal device such as a personal computer insta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A user terminal device (10) executes client side processing including verification of individual applications installed into the user terminal device (10) and information collection for a dependence relation between applications, an authentication station server device (20) receives information on a result of the client side processing to verify the dependence relation between applications, and the authentication station server device (20) determines whether the user terminal device (10) is normal based on the application verification result and the verification result of the dependence relation between applications.

Description

technical field [0001] The present invention relates to a computer resource verification method and a computer resource verification program for verifying computer resources imported into a client device, and particularly relates to reducing the security of a client device for verification even when the number of service users increases A computer resource verification method and a computer resource verification program for the load of a server device. Background technique [0002] Conventionally, a technique has been proposed in which, in order to ensure the security of the service when a service provider's service provider device provides a service to a user terminal device via a network, the hardware and software involved in the user terminal device Provide services after verification in other environments. [0003] For example, a technology is disclosed in which, in a service providing device, after acquiring environmental information related to the user terminal device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/20G06F21/22G06F21/00G06F21/12G06F21/57
CPCG06F21/57G06F15/16G06F11/00
Inventor 石川瑞直小谷诚刚三轮秀成
Owner FUJITSU LTD