摘要 |
<p>A control device uses monitoring results received from an information security device to detect the presence of a normal monitoring module that has not undergone tampering. When the aforementioned detection is made, a procedure is applied successively to monitoring modules that have not been processed whereby an assumption is made that there has been tampering to one monitoring module selected by the aforementioned monitoring modules, and beginning from the aforementioned monitoring module assumed to have undergone tampering, any monitoring module that has determined that the monitoring module assumed to have undergone tampering is normal is assumed to have undergone tampering using the aforementioned received monitoring results. Whether all of the monitoring modules are assumed to have undergone tampering is determined as a result of the application of the procedure, and in the event of such a determination, the aforementioned monitoring module that was first assumed to have undergone tampering is determined to be a normal monitoring module.</p> |
申请人 |
PANASONIC CORPORATION;UNAGAMI, YUJI;MAEDA, MANABU;FUTA, YUICHI;MATSUZAKI, NATSUME;NONAKA, MASAO;SHIZUYA, HIROKI;SAKAI, MASAO;ISOBE, SHUJI;KOIZUMI, EISUKE;HASEGAWA, SHINGO;MIYAUCHI, MAKOTO CARLOS |
发明人 |
UNAGAMI, YUJI;MAEDA, MANABU;FUTA, YUICHI;MATSUZAKI, NATSUME;NONAKA, MASAO;SHIZUYA, HIROKI;SAKAI, MASAO;ISOBE, SHUJI;KOIZUMI, EISUKE;HASEGAWA, SHINGO;MIYAUCHI, MAKOTO CARLOS |