摘要:
An information processing system includes a first process, a second process, a management process and a relay process. The first process executes a predetermined process and communicates with other processes. The second process is started in response to a start request sent from the first process and executes a predetermined process. The management process manages communication between the first process and the second process. The relay process receives, from the first process, the start request to the second process and usage data used in the first process and the second process. The relay process further starts the second process by proxy, transfers the usage data to the second process, and notifies the management process of the start of the second process.
摘要:
An adhesive composition comprised of a nitrile rubber having carboxyl groups and a polyamide resin derived from polymeric fatty acids and alkylene polyamines. Such adhesive compositions are useful upon sheet members of plasticized polyvinylchloride, among other possible uses.
摘要:
When a client transmits an HTML request to a server (step S5), the server generates HTML texts (step S7), and transmits the generated texts to the client (step S8). A control unit obtains information displayed by a browser (step S11), and determines whether or not confidential information like personal information is displayed by the browser and it is necessary to create a log, and creates the log if necessary (step S12). When creating the log, the control unit transmits the created log to the WWW server (step S13).
摘要:
When a screen capture operation is monitored and a screen capture operation for instructing acquisition of an image displayed on a display device (13) is conducted, it is determined whether to hide the windows (31, 32, 33) for each application or process. Consequently, the windows (31, 32) requiring an information leak countermeasure are hidden by shading or mosaic-patterning. On the other hand, the window (33) not requiring an information leak countermeasure is displayed normally.
摘要:
Recently, as a process for manufacturing cyclopentadiene resin-shaped articles, an attention has been given to reaction injection molding (RIM). To conduct RIM, it is necessary to use high purity dicyclopentadiene (DCPD) as the raw material. Vapor-phase thermal cracking of DCPD is usually used as a step of process for manufacturing high purity DCPD. Hithertofore, when conducting thermal cracking of DCPD, coke formation within cracking tubes is the most serious and troublesome problem. A vapor-phase thermal cracking process for resolving the problem by a very simple procedure is described herein. Further, a process for manufacturing high purity DCPD suitable as a raw material for use in RIM utilizing the vapor-phase thermal cracking process just mentioned above is also described.
摘要:
An information processing system includes a first process, a second process, a management process and a relay process. The first process executes a predetermined process and communicates with other processes. The second process is started in response to a start request sent from the first process and executes a predetermined process. The management process manages communication between the first process and the second process. The relay process receives, from the first process, the start request to the second process and usage data used in the first process and the second process. The relay process further starts the second process by proxy, transfers the usage data to the second process, and notifies the management process of the start of the second process.
摘要:
There is provided a confidential information leak prevention system in which confidential information and normal information can be simultaneously used without switching an execution environment, and which can prevent information from being leaked. An application behavior controlling unit (103) which is a function of performing behavior control of an application is added to a confidential application (102) activated by using a launcher program (101), and behavior such as printing, copying and pasting, network transmission, communication with a normal application, or a path of file access is controlled. At the same time, an access controlling unit (105) which is a function of controlling file access is introduced, and access from a normal application (104) to a confidential information storing area (116) which is stored by the confidential application (102) is blocked.