Method signatures included in an input program are detected. An access analyzer sequentially analyzes the method signatures and obtains a run-time access right list based on a rule. This rule specifies method signatures and the access rights which may possibly be included in the program so that the method signatures correspond to the access rights, respectively. A comparator compares the run-time access right list with the design-time access right list in width of restriction based on another rule. This rule specifies widths related to restrictions of the access rights which may possibly be included in the program.

 
Web www.patentalert.com

< Automatic teller machine

> Detecting copyright violation via streamed extraction and signature analysis in a method, system and program

~ 00427