| CPC G06F 21/577 (2013.01) [G06F 2221/033 (2013.01)] | 12 Claims |

|
1. A system comprising:
a plurality of backdoor inspection devices;
a plurality of databases; and
a user device, wherein
each of the plurality of the backdoor inspection devices includes:
at least one backdoor-memory storing backdoor-instructions, and
at least one backdoor-processor configured to execute the backdoor-instructions to;
perform backdoor inspection on a prescribed software installed in a counterpart device that communicates with the user device and presume whether or not there is a backdoor in the prescribed software; and
issue a backdoor inspection certificate including a result of the backdoor inspection,
each of the plurality of the databases includes:
at least one database-memory storing database-instructions, and
at least one database-processor configured to execute the database-instructions to;
register the backdoor inspection certificate; and
transmit the backdoor inspection certificate, and
the user device includes
at least one user-memory storing user-instructions, and
at least one user-processor configured to execute the user-instructions to;
acquire the backdoor inspection certificate from each of the plurality of the databases and determining, based on a plurality of the backdoor inspection certificates, whether or not communication with the counterpart device is permitted,
wherein
among the plurality of the backdoor inspection devices, a first backdoor inspection device performs the backdoor inspection on a part of the prescribed software,
among the plurality of the backdoor inspection devices, a second backdoor inspection device performs the backdoor inspection on a part of the prescribed software different from the part of the prescribed software on which the first backdoor inspection device performed the backdoor inspection, and
the second backdoor inspection device adds, to the result of inspection performed by the first backdoor inspection device on the part of the prescribed software, a result of inspection performed by the second backdoor inspection device, which is a result of the backdoor inspection performed on a part of the prescribed software different from the part of the prescribed software on which the first backdoor inspection device performed the backdoor inspection, and issues a second backdoor inspection certificate.
|