WO2005111825A1 - 情報保全プログラム、情報保全方法及び情報保全システム - Google Patents
情報保全プログラム、情報保全方法及び情報保全システム Download PDFInfo
- Publication number
- WO2005111825A1 WO2005111825A1 PCT/JP2004/005670 JP2004005670W WO2005111825A1 WO 2005111825 A1 WO2005111825 A1 WO 2005111825A1 JP 2004005670 W JP2004005670 W JP 2004005670W WO 2005111825 A1 WO2005111825 A1 WO 2005111825A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- network environment
- password
- information
- network
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Definitions
- the present invention determines an environment of a network to which a computer is connected, and an information maintenance program and an information security method for preserving information that can be acquired from the computer, and determines an environment of a network to which the computer is connected. It relates to an information security system consisting of a computer for securing information that can be obtained from the computer and an authentication server.
- Firewalls and anti-virus software are widely used as means for preventing unauthorized access of the external power of the network and the entry of computer viruses. These are a means to prevent fraud from the outside, but as seen in cases such as the leakage of personal information from customers etc. in particular, measures against taking out fraudulent information from inside are also important issues. ing.
- rule-based judgment is generally used in which an operation pattern highly likely to be an unauthorized operation is registered as a norail, and the operation accepted by the computer is compared with a rule to determine the possibility of the unauthorized operation. For example, for data to be sent to the network, it is detected that there is a risk of fraud, referring to predetermined rules regarding access rights, senders, types of documents to be sent, etc. And disconnecting communication A technique is disclosed (see Patent Document 1 below).
- Patent Document 1 Japanese Patent Application Laid-Open No. 2002-232451
- Patent Document 2 Japanese Patent Application Laid-Open No. 2002-135248
- Patent Document 3 Japanese Patent Application Laid-Open No. 2002-258972
- Patent Documents 1 to 4 and Non-Patent Document 1 described above it is expected to detect an unauthorized operation on a computer by performing a check using a rule base, a user profile, and a node profile. it can. It is not a problem that is limited to rule bases and profiles, but it is not easy to completely respond to all frauds in one way no matter what method security measures are used. In order to increase security strength, it is preferable to use a combination of methods with different incisions so that fraud can be checked from various accuracies.
- the data number of the data is the most useful. It is one of the methods used. If encryption is performed, it is possible that information can not be deciphered by anyone other than the authorized authority, the advantage is the strength S, if it takes time, there is a possibility that the third party may decipher the information, and the authorized authority It has limitations such as being unable to cope with fraud.
- the present invention has been made to address such problems, and preserves important information when a computer is brought into a different environment from a normal environment, and temporarily for a justifiable reason.
- An information security program and method for determining the environment of a network connected to a computer and maintaining information that can be acquired from the computer, which can cope with taking out, and a network connected to a computer An object of the present invention is to provide an information security system comprising a computer and an authentication server for determining the environment and preserving information that can be acquired from the computer.
- a first invention for solving such a problem is an information security program for judging an environment of a network to which a computer is connected and for preserving information which can be acquired from the computer.
- a step of acquiring, on a computer, first network environment information on a network environment to which the computer is connected when the computer is started, and storing the first network environment information in advance on the computer. Comparing with the second network environment information related to the identified normal network environment, and if the first network environment information does not match the second network environment information, the method for the computer operator A step of displaying a password entry request screen, and a step of determining whether the password matches the password stored in the computer or the password generated by the logic stored in the computer when accepting the password entry.
- a network environment including network connection and network connection
- a legitimate network stored in the computer is stored.
- Determine the usage environment of the computer by comparing it with the environment. If the usage environment is different from usual, password input is required, and whether or not the usage has the proper authority is determined by matching the password. If it is determined that the usage is not authorized, legitimate information can be prevented from leaking by performing information protection such as computer shutdown processing.
- the password used here is determined by the logic stored in the computer, which is preferably a one-time password, in order to cope with temporary take-out such as claims.
- a second invention determines the environment of a network to which a computer is connected and determines the combination.
- An information maintenance program for maintaining information that can be acquired from a user, the computer comprising, when the computer is started, acquiring first network environment information on a network environment to which the computer is connected; The first network environment information, the first network environment information stored in the computer;
- a step of displaying a password input request screen for the operator of the computer, and an input of the password, the password stored in the computer or the computer is stored.
- the use environment of the computer when the use environment of the computer is different from usual, the input of a password is requested, and whether the use is authorized or not is judged by matching the password, and the use with authorized authority is used. If it is not determined that the information protection such as the shutdown process of the computer is performed, the same power as in the first invention S. If the network environment initially connected is different from the original network environment, the password is immediately requested. After confirming the difference in the network environment, request a password after a predetermined time has elapsed.
- a predetermined time can be used without a password, for example, it is possible to cope with simple operations such as confirmation of a schedule and transmission / reception of mail. become.
- the predetermined time is limited Depending on the usage of the computer, it is possible to set it in units of several days.
- a third invention is an information security program for determining an environment of a network to which a computer is connected and preserving information that can be acquired from the computer.
- Detecting a third network environment information related to the network environment to which the computer is connected comparing the third network environment information with the second network environment information, and The first network environment information is before If the second network environment information does not match and the third network environment information does not match the second network environment information, a screen for requesting a password input to the computer operator is displayed.
- the use environment of the computer when the use environment of the computer is different from usual, the input of the password is required, and whether or not the use with the proper authority is judged by the matching of the password, the use with the proper authority If it is determined that the information is not determined, it is similar to the first invention and the second invention about performing the information preservation such as the stop process of the computer, but the network connected at the beginning is connected. If the network environment differs from the original network environment, the password is not immediately requested, but after confirming the difference in network environment, confirmation is performed again after a predetermined time has elapsed, and the network environment continues to differ. Detect an error and request a password.
- the third invention also allows the use of the computer without a password for a predetermined time, in consideration of the convenience of the user. If it is a fixed type computer, as in the first invention, it is preferable to immediately request a password, but if a certain degree of movement is routinely performed as in a notebook PC, the daily usage situation should be taken into consideration. And set the time until reconfirmation. For example, it can be set in units of several hours if it is frequently used for in-house meetings, or several days if it is often used for business trips.
- a domain name, an IP address, a MAC address, and a subnet mask acquired by the network interface of the computer at least one of a gateway IP address, a DNS server IP address, and a DHCP setting may be acquired as the first network environment information.
- a gateway IP address, a DNS server IP address, and a DHCP setting may be acquired as the first network environment information.
- at least one of a domain name acquired by the operation system of the computer, an IP address, a MAC address, a subnet mask, a gateway IP address, a DNS server IP address, and a DHCP setting It is also possible to obtain one as the first network environment information.
- the first to third inventions it is necessary to grasp the environment of the network to which the computer is connected.
- a method of grasping the network environment it is possible to use the network interface as described above or information for identifying the network to which the computer acquired by the operation system is connected.
- a step of requesting the computer to transmit the first network environment information to an authentication server connected to the computer via a network is further included.
- the step of executing and acquiring the first network environment information based on the information received from the authentication server, domain name, IP address, MAC address, subnet mask, gateway IP address, DNS server IP address, DHC. It is possible to obtain at least one of the P settings as the first network environment information.
- the authentication server uses a network server that can manage the network to which the computer is connected.
- a fourth invention is an information security program for judging an environment of a network to which a computer is connected and preserving information which can be acquired from the computer, wherein a computer is started with the computer. At this time, in the steps of sending a ping to the authentication server connected via the computer and the network, determining the presence or absence of a reply to the ping from the authentication server, and determining the presence or absence of the reply.
- a regular network environment in which the computer acquires the network environment acquired from the network interface or the like is stored in the computer.
- a computer connected mainly to a LAN is assumed, and when the computer is started, a ping is sent to a predetermined authentication server, and if it is normally returned, a legitimate network is sent. It is determined to be connected to the 4th
- the input of a password is requested immediately.
- a fifth invention is an information security program for judging an environment of a network to which a computer is connected and preserving information which can be acquired from the computer, the computer comprising: At this time, in the steps of sending a ping to the authentication server connected via the computer and the network, determining the presence or absence of a reply to the ping from the authentication server, and determining the presence or absence of the reply. If it is determined that there is no reply to the user, the step of starting the time counting, and if it is detected that a predetermined time has elapsed since the start of the time counting, a screen for requesting the computer operator to enter a password is displayed. And the password stored in the computer.
- Processing for stopping the computer if it is determined that the passwords do not match in the step of determining whether the passwords match the password generated by the password stored in the computer, and the step of determining the matching of the passwords;
- a process of inhibiting activation of at least a part of an operation system or application program stored in a computer a process of erasing at least a part of data stored in the computer, an instruction for an external device connected to the computer And a step of activating at least one of the processing to be prohibited.
- the fifth invention sends a ping to the authentication server to determine whether or not it is connected to a regular network.
- the network is not a legitimate network, and the entry of a password is requested after a predetermined time has elapsed.
- a sixth invention is an information security program for judging an environment of a network to which a computer is connected and preserving information that can be acquired from the computer, the computer comprising: And transmitting the first ping to the authentication server connected to the computer and the network, determining the presence or absence of a reply to the first ping from the authentication server, and presence or absence of the reply in the step.
- a process of prohibiting storage in the computer at least one of the processing stored in the computer Processing of erasing the data is information preservation program characterized by executing the steps of: launching process, at least one of processing for prohibiting an instruction for external devices connected to the computer.
- the sixth invention sends a ping to the authentication server to determine whether or not the network is connected to a regular network.
- the sixth aspect of the invention as in the third aspect of the invention, it is determined that the network is not a legitimate network, and after a predetermined time has elapsed, the determination is again made, and if it is determined that the network is not regular. Prompt for input.
- the above-described first to sixth inventions can also be grasped as an information security method by executing each information security program.
- a seventh invention is an information security system comprising the computer and an authentication server for determining the environment of a network to which the computer is connected, and maintaining information obtainable from the computer.
- the computer adds, when the computer is started, first network environment information on the network environment to which the computer is connected, and makes a request for determination as to whether the network environment is a legitimate network environment through the network.
- transmission means for transmitting to the authentication server; determination result reception means for receiving the determination result for the determination request from the authentication server; If the determination result is not received after the predetermined time has elapsed, the operation of the computer is performed.
- the password for the author A display means for displaying an input request screen; a determination means for determining whether the password stored in the computer or the password generated by the logic stored in the computer matches the received password when the input of the password is received; When the judging means judges that the passwords do not match, the processing for stopping the computer, the processing for prohibiting the storage in the computer, the processing for erasing at least part of the data stored in the computer, the processing is connected to the computer And a start means for starting at least one process of prohibiting an instruction to the external device, and the authentication server receives the determination request attached with the first network environment information. Means, and the first network environment information in advance to the authentication server.
- Determining means for determining whether or not the first network environment is a normal network environment as compared to the second network environment information related to the normal network environment received; And a transmitting means for transmitting a determination result as to whether the first network environment is a normal network environment to the computer through a network.
- the network environment to which the computer is connected is a legitimate network environment, including the case where an authentication server is used, the computer side which is the client Determined by
- the network environment recognized by the computer is sent to the authentication server, and the result of the determination made by the authentication server is sent back to the computer. If the determination result is not returned, the password input operation is requested as in the first aspect of the invention.
- An eighth invention is an information security system comprising the computer and an authentication server for determining an environment of a network to which the computer is connected, and maintaining information obtainable from the computer.
- the computer adds, when the computer is started, first network environment information on the network environment to which the computer is connected, and makes a request for determination as to whether the network environment is a legitimate network environment through the network.
- Transmission means for transmitting to the authentication server, and the authentication server If a determination result receiving unit that receives the determination result for the determination request and the determination result indicating that the network environment is not normal is detected, or if the determination result is not received after a predetermined time has elapsed, A counting means for starting counting time, a display means for displaying a password input request screen for an operator of the computer upon detection of a lapse of a predetermined time from the start of the counting of time, and a password input are received. If it is determined that the password matches the password stored in the computer or the password generated by the logic stored in the computer, and if the password does not match in the determination unit.
- Stop processing of the computer, an operation system or an application stored in the computer At least one process of prohibiting activation of at least part of the application program, process of erasing at least part of data stored in the computer, and process of prohibiting an instruction to an external device connected to the computer
- the authentication server receives the determination request to which the first network environment information is attached, and the authorized network in which the first network environment information is stored in the authentication server in advance.
- a determination unit that determines whether the first network environment is a normal network environment as compared to second network environment information related to the environment; a network in which the first network environment according to the determination unit is a normal network
- a transmitting unit configured to transmit the determination result as to whether the environment is or not to the computer through the network.
- the eighth invention is the same as the seventh invention in that the network environment recognized by the computer is transmitted to the authentication server, and the result determined by the authentication server is returned to the computer, and the determination result is regular. If not, or if there is no reply of the determination result, as in the second aspect of the invention, a password input is requested after a predetermined time has elapsed.
- a ninth invention is an information security system comprising the computer and an authentication server for determining an environment of a network to which the computer is connected and for securing information obtainable from the computer.
- the computer adds, when the computer is started, first network environment information on the network environment to which the computer is connected to determine whether the network environment is a legitimate network environment or not.
- the counting means for starting the time counting and the elapse of the predetermined time from the start of the counting of the time
- the third network environment information on the network environment to which the computer is connected is attached, and a second determination request of whether the network environment is a legitimate network environment is sent over the network for authentication.
- Transmission means for transmitting to a server; and determination result receiving means for receiving a second determination result for the second determination request from the authentication server If the first determination result and the second determination result are detected and it is determined that neither of them is a legitimate network environment, a screen for requesting a password input to the computer operator is displayed.
- Displaying means determining means for determining whether the password stored in the computer or the password generated by the logic stored in the computer matches the input of the password, and the determining means for determining the password If it is determined that they do not match, processing for stopping the computer, processing for inhibiting activation of at least part of the operating system or application program stored in the computer, processing at least part of the data stored in the computer Erase process, external connected to the computer And a start means for starting at least one process of prohibiting an instruction to a device, wherein the authentication server receives the determination request with the first network environment information.
- the receiving means and the first network environment information with the second network environment information on the normal network environment stored in advance in the authentication server it may be determined whether the first network environment is a normal network environment Determining means for determining whether the first network environment is a normal network environment by the determining means, transmitting means for transmitting the first determination result of whether the first network environment is a normal network environment to the computer through the network, Receiving means for receiving the determination request with the third network environment information, and the third network environment information, the authentication server Compared with the second network environment information on the regular network environment stored in advance in the And transmission means for transmitting a second determination result as to whether or not the third network environment is a normal network environment by the determination means to the computer through the network.
- An information security system characterized by
- the ninth invention is also the same as the seventh invention in that the network environment recognized by the computer is transmitted to the authentication server, and the result judged by the authentication server is sent back to the computer, and the judgment result is regular. If not, or if there is no reply of the judgment result, it is judged that the network is not a regular network as in the third invention, and after a predetermined time has passed, the judgment is again made, and the network is not regular. If it is determined that the password is required, the password is required to be entered.
- the above-described seventh to ninth inventions may also be grasped as an information security method by operating each information security system.
- the possibility that information that can be obtained from the computer may be illegally extracted is quickly detected. Can perform actions to preserve information.
- FIG. 1 is a block diagram showing a configuration of an information security system according to the present invention.
- FIGS. 2 and 3 are first and second diagrams showing an outline of the operation of the information security program according to the present invention, respectively.
- 4, 5, 6, and 7 are first, second, third, and fourth diagrams, respectively, showing storage locations of the information security program of the present invention.
- 8, 9, and 10 show the first flow (when starting earlier than the OS) and the second flow (starting on the SS) of the information security program according to the first embodiment of the present invention.
- the third flow starting before the OS
- FIG. 11 is a flowchart showing the flow of the information security program in the second embodiment of the present invention.
- 12, 13 and 14 show the first flow (first operation on the terminal side) and the second flow (authentication server side) of the information security system according to the third embodiment of the present invention, respectively. Operation) and the third flow (second operation on the terminal side).
- FIG. 1 shows the configuration of an information security system including an information security program according to the present invention.
- the information security program 13 is provided in the terminal device 10 to secure that information that can be acquired from the terminal device 10 is read out illegally.
- the information maintenance program 13 acquires information on the network environment to which the terminal device 10 is connected from the network interface 11 or the OS (operating system) 14 and is a normal network environment. If it is determined that the network environment is not legitimate, the operator is required to enter a password.
- the terminal device 10 can be operated without restriction as it is, but if the password does not match, stop processing of the terminal device 10 , Processing to prohibit the activation of the OS 14 and the application program 15, processing to delete data stored in the storage device in the terminal device 10, processing to prohibit an instruction to an external device connected to the terminal device 10, etc.
- a process for preserving information that can be acquired from 10 is executed.
- the password verification is performed without immediately performing the information protection process. This is because the case where the terminal device 10 is used in an unusual environment is considered. Therefore, it is preferable to use a one-time password, which is issued as required, although the password may be fixed.
- the logic for issuing the one-time password provided in the information security program 13 has the same logic as that of the manager's computer, etc., and when used in an environment different from normal, the manager gives the operator one-time Password is issued.
- the validity period of the one-time password may be set arbitrarily in accordance with the time used in a different environment.
- the password input request is determined not to be in a regular network environment.
- it may be determined that the network environment is not the correct one and then the input request may be made after waiting for the predetermined time to elapse. It is also possible to make an input request when it is determined that the network environment is not regular. If it is a terminal device that is unlikely to be taken out of a fixed type, the input request may be made immediately, but if it is a terminal device that is often taken out, such as a laptop PC, as described above, it takes some time. It is practical to allow use without a password.
- the information network protection program 13 In the determination of whether or not the information network protection program 13 is the normal network environment, in the above example, the case of acquiring the information on the network environment to which the terminal device 10 is connected from the network interface 11 or the OS 14 has been described. . In the following, such an embodiment will be described as a first embodiment.
- acquisition of information related to the network environment is also possible as using the authentication server 20 connected to the same network such as a LAN in a normal state. That is, when the terminal device 10 is activated, a ping may be sent to the authentication server 20, and it may be determined from the response from the authentication server 20 that the terminal device 10 is connected to a legitimate network environment.
- the connection status to the network known by the authentication server 20 may be received by using a network server that manages the network.
- the information on the network environment is grasped by the authentication server 20 connected to the same network such as LAN in a normal state, and the authentication server 20
- the terminal device 10 may receive the result of determining whether or not it is connected to the normal network environment. In this case, the terminal device 10 does not compare with the normal environment, and when receiving the determination result, the information security program starts processing for information security such as stopping of the terminal device 10.
- the authentication server 20 connected to the same network such as LAN in a normal state
- the authentication server 20 may receive the result of determining whether or not it is connected to the normal network environment. In this case, the terminal device 10 does not compare with the normal environment, and when receiving the determination result, the information security program starts processing for information security such as stopping of the terminal device 10.
- the authentication server 20 connected to the same network such as LAN in a normal state
- the authentication server 20 may receive the result of determining whether or not it is connected to the normal network environment. In this case, the terminal device 10 does not compare with the normal environment, and when receiving the determination result, the
- the information maintenance program according to the present invention is connected to the network to which the terminal device 10 is connected in order to determine the network environment.
- the operation of acquiring information related to FIG. 2 shows a case where the information security program 13 directly acquires the network environment to which the terminal device 10 is connected by starting the information security program 13 before the OS 14.
- the information security program 13 is read before the OS 14, and the domain name, IP address, MAC address, subnet mask, gateway IP address, DNS server IP address acquired by the network interface 11 Get network environment information such as DHCP settings.
- This network environment information determines whether or not the network environment information matches the registered regular network environment information. If the network environment information matches, the start process of the OS 14 is executed, and if it does not match, the password is Make an input request.
- FIG. 3 shows that the information maintenance program 13 is activated as a part of the OS 14, or the information maintenance program 13 is activated before the OS 14 and the information maintenance program 13 is activated as a part of the OS 14, The case where the program 13 acquires the network environment to which the terminal device 10 is connected from the OS 14 is shown.
- the OS 14 When the terminal device 10 is powered on, the OS 14 is read and the terminal device 10 is activated, and the information maintenance program 13 is activated as a part of the OS 14 from the network interface 11 specified by the OS 14 Obtain network environment information such as the acquired domain name, IP address, MAC address, subnet mask, gateway IP address, DNS server IP address, and DHCP settings from the OS 14 application interface. It is determined whether this network environment information matches the regular network environment information registered in advance, and if it matches, the processing of the OS 14 is continued, and if it does not match, a password input request is made.
- network environment information such as the acquired domain name, IP address, MAC address, subnet mask, gateway IP address, DNS server IP address, and DHCP settings from the OS 14 application interface. It is determined whether this network environment information matches the regular network environment information registered in advance, and if it matches, the processing of the OS 14 is continued, and if it does not match, a password input request is made.
- the information maintenance program 13 may be executed concurrently with the activation of the OS 14.
- the computer when the computer is started, information on the network environment is obtained from the network interface 11 to make a determination, and after the OS 14 is started, the information on the network specified by the OS is obtained to make the determination. If an abnormality is detected in any of the cases, or if an abnormality is detected and a predetermined time has elapsed, a password input request is made.
- the monitoring of the network environment is not limited to when the terminal device 10 and the OS 14 are activated, and it is preferable to continuously monitor the network environment, such as determining the network environment at predetermined intervals. This is to cope with the case where the network is disconnected and the terminal is taken out illegally even if the terminal environment 10 is powered on and started up, even in a normal environment.
- the terminal device 10 is provided with a CPU 121, a RAM 122, and a ROM 123 in order to execute computations associated with processing of programs, and the application program 15 and the like to be executed by the terminal device 10 are stored in the HD D124.
- the ROM 123 stores various basic programs for hardware control such as input control and output control. These programs and application programs stored in the HDD 124 use the RAMI 22 as a work area. While operating, the CPU 121 executes arithmetic processing.
- the operation of various application programs 15 is executed by the terminal device 10, and the connection abnormality is promptly detected before the information that can be acquired from the terminal device 10 is illegally taken out.
- the power of the terminal device 10 is turned on, it is necessary to read out the information security program 13.
- the information security program 13 is stored in the ROM 123 and executed as a program independent of the OS 14.
- the basic various programs for hardware control such as input control and output control are read out from the ROM 123 and the power-on processing of the computer is performed S, information maintenance program 13
- information about the network environment to which the terminal device 10 is connected is acquired from the network interface 11 before the OS is activated, and compared with the network environment information stored in the ROM 123 or the HD D 124 in advance. And determine whether the connected environment is legitimate.
- the information security program 13 is stored in the boot sector of the HDD 124, and is read out to the RAM 122 and executed before the process of S14 is started.
- the basic information program for hardware control such as input control and output control is read out from the ROM 123, and the power information maintenance program 13 is executed to start the computer. Thereafter, it is read from the boot sector, and it is judged whether or not the environment connected before the process by the OS 14 is activated is normal.
- the information security program 13 is stored in the HD D 124 as a program operating on the OS 14, and is read out to the RAM 122 and executed as part of the process when the OS 14 is activated.
- the information maintenance program 13 is stored in the ROM 123 and is also stored in the HDD 124 as a program operating on the OS 14, and the programs stored in each are read out to the RAM 122 before and after activation of the OS 14. And, while exchanging information, execute processing to determine whether the connected environment is legitimate.
- FIGS. 8 to 10 show the case where the information maintenance program is started earlier than the OS
- Fig. 9 shows the case where the information maintenance program is started on the OS
- Fig. 10 shows the information maintenance program earlier than the OS and also started on the OS. It is a flowchart of the case.
- the information maintenance program is read from the boot sector of the ROM or HDD and activated. (S102).
- the information security program acquires information related to the network environment to which the terminal detected by the network interface is connected, such as an IP address or MAC address (S 103), and the regular network environment stored in advance in the HDD of the terminal or the like.
- connection to the originally designated network is in progress (S104). If it is determined that connection to the specified network is in progress, if ⁇ S is not activated, execute ⁇ S activation (Sllll, S112), and then allow normal use of the terminal ( S 113).
- the lapse of a previously designated time is counted (S 105).
- the designated time is elapsed, information on the network environment to which the terminal detected by the network interface is connected is acquired again (S106), and the information is originally designated in comparison with the regular network environment stored in advance in the terminal. It is checked whether or not connection to the selected network is in progress (S107). If it is determined that the connection to the specified network is in progress, the OS is started and the system is activated, in which case the OS is started (S 111, S 112), and then the normal use of the terminal is permitted. (S113).
- Such a reconfirmation process may be omitted, and the process may immediately proceed from S104 to a one-time password request (S108) or, after counting the elapse of a designated time in S105, a one-time password request (S108). You may proceed to
- a screen for requesting the operator of the terminal to input a password is displayed (S 108).
- the password inputted by the operator is accepted, it is judged in advance from the match with the password stored in the HDD of the terminal etc. whether the password is correct or not (S109), and if it is judged that the password is not valid, Information such as stop processing of the terminal, processing of prohibiting activation of the OS or application program stored in the terminal, processing of erasing data stored in the terminal, processing of prohibiting an instruction to an external device connected to the computer A process for maintenance is performed (S110).
- the password used here is preferably a one-time password, in order to manage temporary removal of the terminal, etc.
- the one-time password has the same password generation logic as the terminal in a computer operated by the administrator, a small password generator held by the operator, etc.
- the password generated by the similar logic provided in the terminal is compared to confirm whether or not the operator is authorized to take out the right. it can.
- the terminal is subsequently moved or handed over to another operator. As it may be used in the environment, it is preferable to reconfirm the network environment at predetermined intervals even after the normal use is permitted. Operation of such a terminal starts If it is determined that the connection is still connected to the specified network in the confirmation after being executed, and if it is determined that the password is valid, the OS is already started, and normal use is permitted as it is. The processing is continued (S111, S113).
- S is read from the HDD and activated (S 202) .
- the information maintenance program is also read from the HDD as a part of S and activated (S203), and uses the application interface to obtain information about the network environment such as the domain name and IP address specified by the OS.
- S204 It is checked whether connection to the originally designated network is in progress in comparison with the normal network environment stored in advance in the HDD or the like of the terminal (S205). If it is determined that connection to the designated network is in progress, the normal use of the terminal is permitted (S 212).
- the lapse of a previously designated time is counted (S 206).
- information about the network environment such as the domain name and IP address specified by the OS is acquired again using the application interface (S207), and the normal network environment stored in advance in the terminal is used.
- it checks whether it is currently connected to the originally designated network (S208). If it is determined that connection to the designated network is in progress, the normal use of the terminal is permitted (S212).
- Such a reconfirmation process may be omitted, and the process may immediately proceed from S205 to a one-time password request (S209) or, after counting the elapse of a designated time in S206, a one-time password request (S209). You may proceed to
- a screen for requesting the operator of the terminal to input a password is displayed (S 209).
- the password inputted by the operator is accepted, it is judged in advance from the match with the password stored in the HDD of the terminal etc. whether the password is correct or not (S210), and if it is judged that the password is not valid, Information such as stop processing of the terminal, processing of prohibiting activation of the OS or application program stored in the terminal, processing of erasing data stored in the terminal, processing of prohibiting an instruction to an external device connected to the computer Processing for maintenance is executed (S211). Meanwhile, the accepted pass ⁇ If the code is valid, the normal use of the terminal is permitted (S212). It is preferable to use a one-time password as the password, and it is preferable to reconfirm the network environment at predetermined intervals even after permitting normal use, as in the case of FIG. .
- the information maintenance program is read from the boot sector of the ROM or the HD D and activated (S302).
- the information security program acquires information on the network environment to which the terminal detected by the network interface is connected (S303), and is originally designated in comparison with the normal network environment stored in advance in the HDD of the terminal or the like. Whether it is connected to the network or not is confirmed (S304). If it is determined that connection to the designated network is in progress, the OS is activated (S311).
- the lapse of a previously designated time is counted (S 305).
- the designated time is counted (S306)
- the information on the network environment to which the terminal detected by the network interface has been connected is acquired again (S306), and the information is originally designated in comparison with the normal network environment stored in advance in the terminal. It checks whether it is connected to the network (S307). If it is determined that connection to the designated network is in progress, the OS is activated (S311).
- Such a reconfirmation step may be omitted, and the process may immediately proceed from S304 to a one-time password request (S308), or after the elapse of a designated time is counted in S305, a one-time password request may be made (S308). You may go ahead.
- a screen for requesting the operator of the terminal to input a password is displayed (S 308).
- the password inputted by the operator is accepted, it is judged from the match with the password stored in advance in the terminal whether the password is correct or not (S309). If it is judged that the password is not correct, the terminal is stopped. Processing, OS or application stored in the terminal Processing for information protection such as processing for prohibiting activation of the case program, processing for deleting data stored in the terminal, processing for prohibiting an instruction to an external device connected to the computer, and the like is executed (S310) ). If the accepted password is valid, the OS is activated (S311, S112).
- the information maintenance program is read from the HDD as a part of the OS and booted (S 312), and the application interface is used to obtain information on the network environment specified by S. Then (S313), in comparison with the normal network environment stored in advance in the HDD or the like of the terminal, it is checked whether or not connection to the originally designated network is in progress (S314). If it is determined that connection to the designated network is in progress, use of the normal terminal is permitted (S 321).
- the application interface is used to acquire information on the network environment specified by the OS again (S316), and the network originally designated in comparison with the normal network environment stored in advance in the terminal is obtained. It is checked whether or not connection is in progress (S317). If it is determined that connection to the designated network is in progress, the normal use of the terminal is permitted (S 321). Such a reconfirmation process may be omitted, and the process may immediately proceed from S314 to a one-time password request (S318), or after counting the elapse of a designated time in S315, a one-time password request (S318). You may proceed to).
- a screen for requesting the operator of the terminal to input a password is displayed (S 318) .
- the password input by the operator is accepted, it is determined from the match with the password stored in advance in the terminal whether the password is correct or not (S319). If it is determined that the password is not correct, the terminal is stopped. Information security such as processing, processing that prohibits activation of OS or application program stored in the terminal, processing that deletes data stored in the terminal, processing that prohibits an instruction to an external device connected to the computer The process for S is performed (S320).
- the accepted password is correct, the normal use of the terminal is permitted (S 321).
- the network environment identified from the information in the terminal is communicated with the authentication server connected to the network such as the same LAN in a normal state. To confirm.
- the information maintenance program is read from the ROM or the flash sector of the HDD and activated (S 402).
- the information security program sends pings to the authentication server connected to the same network such as LAN in the normal status (S403). Whether the terminal is connected to the normal network is authenticated. It is determined whether or not there is a reply to ping from the server (S404). If there is a reply, it is determined that the network is connected, and if the OS is not activated, the OS is activated (S409, S410), and then the normal use of the terminal is permitted (S412) )
- a terminal with a large number of cases taken out as a notebook PC or the like is adopted in the flow of FIG. 8 to FIG. 10 in consideration of the convenience of the operator.
- re-pin Send g After judging that there is no reply of ping and counting the elapsed time of specified time, re-pin Send g, and if it is determined that there is no reply to ping again, you may proceed to the one-time password request (S405), or it may be determined that there is no reply to ping, and then the designated time will elapse. After counting, you can proceed to the one-time password request (S405).
- the terminal side determines whether or not the network is connected to the normal network, while in the third embodiment, the normal mode is used.
- the authentication server connected to the same LAN or other network understands the network environment and sends the result of the judgment to the terminal.
- 12 shows the first operation on the terminal side requesting the determination from the authentication server
- FIG. 13 shows the operation on the authentication server side performing the determination
- FIG. 14 shows the flow of the second operation on the terminal side receiving the determination result. It shows.
- the information maintenance program is read from the ROM or the flash sector of the HDD and activated (S502).
- the information security program acquires information on the connected network environment from the network interface, and transmits a determination request with such network environment information to the authentication server (S 503).
- the authentication server When the authentication server receives the determination request (S 504), the authentication server detects the information related to the network environment together with the information for specifying the terminal (S 505), and the authentication server pre-registered with the authentication server. It checks whether it matches with the environment of (S506). The determination result as to whether or not there is a match is transmitted specifying the corresponding terminal (S507).
- the terminal When the terminal receives the determination result from the authentication server (S 508), the terminal confirms whether the determination result indicates that it matches the regular environment of the terminal registered in advance (S 5 09). ), It is judged that it is connected to the regular network if it shows that it matches, and if S is not activated, the OS is activated (S514, S515), and then the terminal as usual Permit use of (S516).
- a screen for requesting entry of a password is displayed (S510). operation
- the password inputted by the person is accepted (S511)
- the matching strength with the password stored in advance in the HDD of the terminal etc. is judged whether the password is correct (S512) and it is judged that the password is not correct.
- the accepted password is correct
- the OS is not activated
- the activation of SS is executed (S514, S515), and then the normal use of the terminal is permitted. (S516).
- the terminal is not a legitimate network from the authentication server, as adopted in the flow of FIG. 8 to FIG.
- the authentication request is sent again, and if it is determined that the received authentication result is not a legitimate network, a request for a one-time password (S510). It is also possible to proceed to step S510 after counting the lapse of the designated time after receiving the result of determination that the network is legitimate and not having received a normal network.
- FIG. 1 is a block diagram showing a configuration of an information security system according to the present invention.
- FIG. 2 is a first diagram showing an outline of the operation of the information security program according to the present invention.
- FIG. 3 is a second diagram showing an outline of the operation of the information security program according to the present invention.
- FIG. 4 is a first diagram showing a storage location of an information security program according to the present invention.
- FIG. 5 is a second diagram showing the storage location of the information security program according to the present invention.
- FIG. 6 is a third diagram showing the storage location of the information security program according to the present invention.
- FIG. 7 is a fourth diagram showing the storage location of the information security program according to the present invention.
- FIG. 8 is a flowchart showing a first flow of the information security program according to the first embodiment of the present invention (in the case of starting earlier than the OS).
- FIG. 9 is a flow chart showing a second flow (when activated on the OS) of the information security program in the first embodiment of the present invention.
- FIG. 10 Third flow of the information security program according to the first embodiment of the present invention (from the OS It is a flowchart showing the case of starting up first and also starting up on the OS).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/005670 WO2005111825A1 (ja) | 2004-04-28 | 2004-04-28 | 情報保全プログラム、情報保全方法及び情報保全システム |
JP2005512252A JPWO2005111825A1 (ja) | 2004-04-28 | 2004-04-28 | 情報保全プログラム、情報保全方法及び情報保全システム |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/005670 WO2005111825A1 (ja) | 2004-04-28 | 2004-04-28 | 情報保全プログラム、情報保全方法及び情報保全システム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005111825A1 true WO2005111825A1 (ja) | 2005-11-24 |
Family
ID=35394326
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/005670 WO2005111825A1 (ja) | 2004-04-28 | 2004-04-28 | 情報保全プログラム、情報保全方法及び情報保全システム |
Country Status (2)
Country | Link |
---|---|
JP (1) | JPWO2005111825A1 (ja) |
WO (1) | WO2005111825A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009110098A (ja) * | 2007-10-26 | 2009-05-21 | Nec Biglobe Ltd | 認証システム |
CN104573434A (zh) * | 2013-10-12 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | 帐户保护方法、装置及系统 |
US11062031B2 (en) | 2018-03-16 | 2021-07-13 | Toshiba Client Solutions CO., LTD. | Electronic device, control method, and computer-readable nonvolatile storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002278932A (ja) * | 2001-03-22 | 2002-09-27 | Hitachi Ltd | 情報処理装置および起動制御方法 |
JP2002368763A (ja) * | 2001-06-08 | 2002-12-20 | Teac Corp | ネットワーク装置及びサーバ装置及びクライアント装置及びネットワークのipアドレス付与方法及びプログラム |
JP2004070593A (ja) * | 2002-08-05 | 2004-03-04 | Matsushita Electric Ind Co Ltd | 認証システムと認証方法と装置 |
-
2004
- 2004-04-28 WO PCT/JP2004/005670 patent/WO2005111825A1/ja active Application Filing
- 2004-04-28 JP JP2005512252A patent/JPWO2005111825A1/ja active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002278932A (ja) * | 2001-03-22 | 2002-09-27 | Hitachi Ltd | 情報処理装置および起動制御方法 |
JP2002368763A (ja) * | 2001-06-08 | 2002-12-20 | Teac Corp | ネットワーク装置及びサーバ装置及びクライアント装置及びネットワークのipアドレス付与方法及びプログラム |
JP2004070593A (ja) * | 2002-08-05 | 2004-03-04 | Matsushita Electric Ind Co Ltd | 認証システムと認証方法と装置 |
Non-Patent Citations (1)
Title |
---|
"Computer & LAN (Nichi) Ohmsha Ltd", vol. 15, no. 2, 1 February 1997 (1997-02-01), pages 106 - 108, XP002994244 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009110098A (ja) * | 2007-10-26 | 2009-05-21 | Nec Biglobe Ltd | 認証システム |
CN104573434A (zh) * | 2013-10-12 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | 帐户保护方法、装置及系统 |
CN104573434B (zh) * | 2013-10-12 | 2018-09-04 | 深圳市腾讯计算机系统有限公司 | 帐户保护方法、装置及系统 |
US11062031B2 (en) | 2018-03-16 | 2021-07-13 | Toshiba Client Solutions CO., LTD. | Electronic device, control method, and computer-readable nonvolatile storage medium |
Also Published As
Publication number | Publication date |
---|---|
JPWO2005111825A1 (ja) | 2008-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5619007B2 (ja) | サーバ・オペレーションの認可を行うための装置、システムおよびコンピュータ・プログラム | |
CN110149328B (zh) | 接口鉴权方法、装置、设备及计算机可读存储介质 | |
US9386009B1 (en) | Secure identification string | |
JP4656161B2 (ja) | 認証装置、印刷装置、認証印刷システム、認証データ入力装置およびそれらの方法 | |
WO2010076987A2 (ko) | 펌웨어의 원격 업데이트 방법 | |
JP2010165111A (ja) | セキュリティシステム | |
EP2436164B1 (en) | Method and equipment for establishing secure connection on a communication network | |
KR101206854B1 (ko) | 고유식별자 기반 인증시스템 및 방법 | |
JP4862551B2 (ja) | 認証制御プログラムおよび認証装置 | |
WO2001073533A1 (en) | System and method for safeguarding electronic files and digital information in a network environment | |
WO2005111825A1 (ja) | 情報保全プログラム、情報保全方法及び情報保全システム | |
KR101223649B1 (ko) | Uip를 이용한 사용자 인증 방법 및 인증 시스템 | |
KR20100085459A (ko) | 네트워크 전송 데이터의 필터링을 이용하는 개인 정보 보호장치 및 개인 정보 보호 방법 | |
JP2001282739A (ja) | コンピュータシステムの不正ログイン防御方法およびコンピュータシステム | |
JP2009251656A (ja) | ユーザ認証システム、ユーザ認証方法及びプログラム | |
JP2008075419A (ja) | 錠制御装置および錠制御システム | |
CN112541168A (zh) | 一种数据的防窃取方法、系统及存储介质 | |
JP6611249B2 (ja) | 認証サーバ及び認証サーバプログラム | |
JPWO2009041387A1 (ja) | 認証装置、機器認証システムおよびプログラム | |
JP2007172176A (ja) | 認証装置 | |
KR101195027B1 (ko) | 서비스 보안시스템 및 그 방법 | |
WO2012121497A2 (ko) | 고유식별자 기반 인증시스템 및 방법 | |
JP6497841B2 (ja) | ネットワーク接続方法および電子機器 | |
JP2009093222A (ja) | 情報処理装置、情報管理装置、情報管理システム、情報処理プログラムおよび情報管理プログラム | |
EP2479696A1 (en) | Data security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2005512252 Country of ref document: JP |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |