WO2007052342A1 - Information preserving program, information preserving method, and information preserving system - Google Patents

Information preserving program, information preserving method, and information preserving system Download PDF

Info

Publication number
WO2007052342A1
WO2007052342A1 PCT/JP2005/020143 JP2005020143W WO2007052342A1 WO 2007052342 A1 WO2007052342 A1 WO 2007052342A1 JP 2005020143 W JP2005020143 W JP 2005020143W WO 2007052342 A1 WO2007052342 A1 WO 2007052342A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
approval
application
period
information
Prior art date
Application number
PCT/JP2005/020143
Other languages
French (fr)
Japanese (ja)
Inventor
Osamu Aoki
Kenichi Koide
Original Assignee
Intelligent Wave Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intelligent Wave Inc. filed Critical Intelligent Wave Inc.
Priority to PCT/JP2005/020143 priority Critical patent/WO2007052342A1/en
Priority to JP2007542189A priority patent/JPWO2007052342A1/en
Publication of WO2007052342A1 publication Critical patent/WO2007052342A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Definitions

  • the present invention when a computer is used in an environment different from a regular network environment, in order to preserve the information that can be obtained from the computer, the computer is only obtained when it is approved in advance by the approver.
  • the present invention relates to an information security program, an information security method, and an information security system that make it possible to operate.
  • Patent Document 1 JP 2002-278932 A
  • the computer can be used without a password input operation during normal use, in view of being able to handle unauthorized computer removal due to theft or the like. Can do.
  • a password is issued in advance. The password must be entered each time the computer is started or the power-saving state is restored.
  • an approval authority such as a supervisor It is preferable to provide a mechanism that enables the use of the computer in an unusual network environment after confirming the circumstances.
  • the present invention has been made to cope with such a problem, and in order to maintain information that can be acquired from a computer when the computer is used in an environment different from a normal network environment,
  • This is an information security program, information security method, and information security system that enables the computer to operate only when approval from the approver is obtained in advance. Password issuing and input operations are required. The purpose is to provide something that is not bad.
  • a first invention for solving the problems that are important to the present application is an information maintenance program for protecting information that can also acquire computer power when the computer is used in an environment different from a regular network environment. While the computer is being used in a regular network environment, the computer is designated as the destination for the approver stored in the computer, and the borrowing period during which the computer is used outside the regular environment is designated. Transmitting an application notification for approval for taking out the application with an application ID for identifying the application notification, and application information including at least the application ID, the approver, and the export period to the computer. And storing the application ID and the approval result for the application notification transmitted by the approver who has received the application notification.
  • the export period included in the application information is set as the export approval period. Storing the setting information in the computer, and at the time of starting the computer, the step of determining whether the computer is connected to a normal network environment when the computer is started up; and If it is determined that the computer is not connected to the environment, check whether the export approval period is stored in the setting information of the computer.
  • the step of determining whether the startup time of the computer is within the period of the take-out approval period, and the take-out approval period When it is confirmed that the computer is not stored, or when it is determined that the startup time of the computer is not within the period of the export approval period, the computer is stopped, and the operation system stored in the computer Or at least one of a process for prohibiting activation of at least a part of the application program, a process for erasing at least a part of data stored in the computer, and a process for prohibiting an instruction to an external device connected to the computer.
  • An information storage program characterized by executing a step of starting two processes. .
  • a second invention for solving the problems that are relevant to the present application is that a computer is connected to a regular network environment.
  • An information security program for protecting information that can also be obtained by a computer when used in an environment different from the above, wherein the address of the approver is given to the computer while the computer is being used in a regular network environment.
  • a step of receiving an approval notification including: a sender power of the approval notification; and determining whether the approval notification is stored in the computer. And when the sender corresponds to the approver and the approval result approves the export, the application information corresponding to the application ID included in the approval notification is specified, and Storing the take-out period included in the application information in the setting information of the computer as a take-out approval period.
  • the computer is started, the computer is connected to a regular network.
  • the take-out period is specified for using the computer outside the regular environment by e-mail or the like to the authorized person. Sent the application notification and returned from the approval authority.
  • the take-out approval period approved by the approval notification is a computer setting information.
  • the computer is used outside the normal environment, it is checked whether the export approval period is stored in the setting information, and if it is within the export approval period, the computer can be used as it is. In other cases, predetermined processing for preserving computer information is performed.
  • the address of the application notification is designated in advance from an approver list having approval authority, whereas in the second invention, the sender of the approval notification is added to the approver list having approval authority. Judge whether or not applicable.
  • the time of starting the computer for determining the connection environment is not limited to the time of starting the computer after the power is turned off, but includes the time of restarting the computer, the time of power recovery from the power saving state, and the like. It may be.
  • the determination of the connection environment is not limited to the startup of the computer. In addition to the startup, if the check is performed at a predetermined timing such as every hour even during startup, it is taken out during startup. It becomes possible to cope with such cases.
  • the step of determining whether or not the computer is connected to a regular network environment the step of acquiring, in the computer, first environment information related to the network environment to which the computer is connected. And comparing the first network environment information with second environment information related to a regular network environment stored in advance in the computer, wherein the first environment information is the second environment information. If the information does not match, it may be characterized that the computer is connected to a regular network environment and is judged to be! /!
  • the present invention provides a step of determining whether or not the computer is connected to a regular network environment by transmitting a ping to the computer and an authentication server connected to the computer through a network; And confirming whether or not there is a reply to the ping from the authentication server, and confirming that there is no reply to the ping, the computer is connected to a regular network environment and V, It is characterized by judging.
  • the method for determining whether or not the environment in which the computer is started is a regular network environment is not particularly limited. It is possible to judge the network environment.
  • the information maintenance program according to the present invention having such features can be specified as an information maintenance method for maintaining information that can be acquired by a computer, which is executed by these information maintenance programs. It can also be configured as an information maintenance system equipped with these information maintenance programs.
  • the information maintenance system corresponding to the first invention is provided in the computer to maintain information that can be acquired from the computer when the computer is used in an environment different from the regular network environment. It is a blueprint maintenance system, and is used in an authorized network environment, and an approver storage means for storing an address of an approver who has the authority to carry out export approval when the computer is used outside the authorized environment.
  • the approver stored in the approver storage means is designated as the destination, and the application notification for the export approval for which the export period is specified is assigned to the application ID for identifying the application notification.
  • An approval notification receiving means for receiving an approval notification including at least the application ID and an approval result for the application notification transmitted by the approver, and application information corresponding to the application ID included in the approval notification is stored in the application information.
  • approver determination means for determining whether or not the sender of the approval notification is an approver included in the application information, and the sender corresponds to the approver and the approval result has.
  • the take-out approval period storage that reads out the take-out period included in the application information from the application information storage means and stores it in the setting information of the computer as the take-out approval period Means, a connection environment determination means for determining whether the computer is connected to a normal network environment at the time of starting the computer, and a connection to a normal network environment.
  • a take-out approval period determination means for determining whether the start-up time of the computer is within the period of the take-out approval period, and when it is confirmed that the take-out approval period is not stored, or the computer If it is determined that the activation time is not within the period of the export approval period, Computer stop processing, processing for prohibiting activation of at least part of an operation system or application program stored in the computer, processing for erasing at least part of data stored in the computer, connection to the computer And an information maintenance means for starting at least one of the processes for prohibiting a command to the external device.
  • the information maintenance system corresponding to the second invention is a blueprint maintenance system provided in a computer for maintaining information that can also be obtained by a computer when the computer is used in an environment different from a normal network environment.
  • An approver storage means for storing an approver who has the authority to perform a take-out approval to use the computer outside the normal environment, and an approver as a destination while being used in a normal network environment.
  • An application notification transmission means for transmitting an application notification for approval of the export with a specified export period, with an application ID for identifying the application notification, and at least the application ID and the export period
  • the application information storage means for storing the application information including the application ID and the approval result transmitted by the approver who has received the application notification are displayed.
  • An approval notification receiving means for receiving at least an approval notification, and an approver for judging whether the approver who has transmitted the approval notification is an approver having the authority to carry out take-out approval stored in the approver storage means
  • the take-out period included in the application information is Read out from the application information storage means and store it in the setting information of the computer as a take-out approval period, and whether the computer is connected to a regular network environment when the computer is started.
  • a connection environment determination means for determining whether or not it is not connected to a regular network environment.
  • a confirmation period confirmation means and if it is confirmed that the take-out approval period is stored, a take-out approval period determination means for determining whether the startup time of the computer is within the period of the take-out approval period; If the export approval period is memorized and it is confirmed that the computer is not active, or if it is determined that the startup time of the computer is not within the export approval period, the computer is stopped. Processing, operation system or application stored in the computer At least one process of prohibiting activation of at least a part of a program, erasing at least a part of data stored in the computer, and prohibiting an instruction to an external device connected to the computer And an information storage means for activating the information storage system.
  • the computer when a computer is used in an environment different from a regular network environment, the computer can be used only when it has been approved by the approver in advance. If the information is not received, it is possible to maintain the information that can be acquired by the computer by suppressing the information leakage from the inside by configuring the information maintenance process. Since no password issuance or input operation is required, the operational burden when using a computer is reduced.
  • FIG. 1 is a diagram showing an outline of an embodiment of an information maintenance system according to the present invention.
  • FIG. 2 is a block diagram showing a configuration of an information maintenance system that is effective in the present invention.
  • FIGS. 3 to 7 are FIGS. 1 to 5 showing a first operation flow of the information maintenance system according to the present invention, respectively.
  • FIGS. 8 to 12 are FIGS. 1 to 5 showing a second operation flow of the information maintenance system according to the present invention, respectively.
  • FIG. 13 and FIG. 14 are flowcharts showing the first and second flows for setting the export approval period according to the information maintenance program according to the present invention, respectively.
  • FIGS. 15 to 18 are flowcharts showing first to fourth flows, respectively, for checking whether or not information maintenance is possible by checking the connection environment of the computer by the information maintenance program according to the present invention.
  • the information maintenance system according to the present invention is provided in terminal A that is used by connecting to an in-house LAN.
  • Terminal B which is operated by an approver who has the authorization to approve temporary take-out of A, is also connected to the same corporate LAN.
  • Terminal A checks the connection environment to the network at startup, and if it is detected that the connection environment is not normal, the operation of terminal A is stopped and the operation system and application program of terminal A are stopped.
  • a program is installed in advance to execute processing for information protection, such as prohibition of activation, erasure of data in terminal A, and prohibition of a write command to an external device connected to terminal A.
  • processing for information protection such as prohibition of activation, erasure of data in terminal A, and prohibition of a write command to an external device connected to terminal A.
  • processing for information protection such as prohibition of activation, erasure of data in terminal A, and prohibition of a write command to an external device connected to terminal A.
  • the applicant when an applicant who uses terminal A wants to take terminal A out of the office on a business trip or the like, the applicant transmits an application mail specifying a take-out period to the approver. After confirming the application mail, the approver determines whether it can be taken out and sends an approval mail from terminal B to the applicant.
  • the take-out approval period is set as the setting information for terminal A, and the applicant must take terminal A with the take-out approval period set off from the internal LAN and take it outside. become.
  • terminal A is taken out with the export approval period set as the setting information. Therefore, when the use time falls under the export approval period, it differs from the normal environment. Even if it is a connection environment, it is possible to configure the information security processing to be performed only in the case of illegal take-out by setting the information security processing to be permitted in advance so that the information security processing is not performed.
  • Fig. 2 shows the configuration of an information maintenance system according to the present invention. The operation of the information maintenance system according to the present invention will be described in detail below, together with an example of the operation flow shown in FIGS. 3 to 7 and FIGS. 8 to 12.
  • the information maintenance system is provided in the applicant terminal 10, and a predetermined function is executed by a program or the like stored in the applicant terminal 10.
  • a predetermined function is executed by a program or the like stored in the applicant terminal 10.
  • various basic programs for hardware control such as input control and output control stored in the ROM 13 are started.
  • the CPU 11 executes arithmetic processing while the RAM 12 functions as the work area of the program that also reads the HDD 14 power.
  • data transmission / reception to / from other computers such as the approver terminal 20 and the monitoring server 30 through the company LAN is performed via the NIC 15.
  • the HDD 14 of the applicant terminal 10 needs to store an information maintenance program 142.
  • the information maintenance program 142 detects the network environment to which the applicant terminal 10 is connected from the NIC 15 and compares it with the regular network environment information stored in the ROM 13 or HDD 14 in advance, so that the environment is different from the regular network environment information. If it is determined that it is connected, the operation of the applicant terminal 10 is stopped, the operation system or application program is prohibited from starting, the predetermined data stored in the HDD 14 or RAM 12 is deleted, and the applicant terminal 10 is connected. Processing power for information protection such as prohibition of writing commands to external devices, etc.
  • the information conservation program that is relevant to the present invention is confirmed by the approval application program 141 that sets the export approval period after receiving approval from the approver, and the information environment is confirmed by checking the network environment at the time of startup.
  • the information maintenance program according to the present invention includes both the approval application program 141 and the information maintenance program 142.
  • the timing for starting the information maintenance program 142 and the timing for confirming the network environment are not particularly limited.
  • the information protection program 142 is normally started when the applicant terminal 10 is started up after the power is turned off, but is started when the applicant terminal 10 is restarted or when power is restored from the power saving state. It may be moved.
  • the timing to check the network environment it is normal to check at the time of starting the information protection program 142. Considering temporary movement within the company, etc. After the elapse of time, re-checking may be performed, and information integrity processing may be performed when it is confirmed that the network environment is not normal. Even if it is confirmed that the network environment is legitimate at the time of activation, it is taken out while the applicant terminal 10 is activated by re-checking at a predetermined timing such as every hour. It is possible to cope with the case.
  • the information maintenance program 142 is read at the timing when the applicant terminal 10 is started up, and is started in synchronism with the operating system (OS) of the computer.
  • OS operating system
  • several patterns can be set as follows.
  • the first is a pattern in which the information maintenance program 142 is stored not in the HDD 14 but in the ROM 13 and executed as a program independent of the OS.
  • the basic program for hardware control such as input control and output control is read from the ROM 13 and the computer is started.
  • Program 142 is also started before the OS is started as part of it, acquires information about the network environment to which applicant terminal 10 is connected from NIC 15, and stores the network environment information stored in ROM 13 or HDD 14 in advance. In contrast to this, it is determined whether or not the connected environment is normal.
  • the second is a pattern in which the information integrity program 142 is stored in the boot sector of the HDD 14 and read and executed by the RAM 12 before the OS is started.
  • various programs for hardware control such as input control and output control are read from the ROM 13 and the computer is started up.
  • the boot sector force is also read, and a determination is made as to whether or not the connected environment is normal before the processing by the OS is started.
  • the information maintenance program 142 is stored in the HDD 14 as a program operating on the OS, and when the OS is started, it is read out and executed as a part of the processing in the RAM 12. Pattern.
  • various basic programs for hardware control such as input control and output control are read from the ROM 13, the computer is started, the OS is started, and the domain is started.
  • the information maintenance program 142 uses the powerful information to determine whether or not the connected environment is normal.
  • the information maintenance program 142 is stored in the ROM 13 and also stored in the HDD 14 as a program operating on the OS, and the program stored in each is read out to the RAM 12 before and after the OS is started. In this pattern, information is exchanged while determining whether or not the connected environment is normal.
  • the method for determining whether the connected environment is valid or not is based on the current network environment information acquired from the NIC 15 and the regular network environment information stored in the ROM 13 or HDD 14. For example, it may be possible to judge the network environment by sending a ping from the applicant terminal 10 to the monitoring server 30 that can be accessed via the corporate LAN, and whether or not there is a reply to the ping. .
  • the applicant terminal 10 determines whether or not the connected environment is normal, and is not a normal environment! An information maintenance program 142 for executing processing is stored. Therefore, when the applicant terminal 10 is disconnected from the corporate LAN, taken outside and used in a different environment, the operation of the applicant terminal 10 is restricted by the information protection program 142.
  • the applicant terminal 10 can be operated as usual even when used in an environment other than a regular network environment.
  • the approval application program 141 is read into the RAM 12 and started on the applicant terminal 10.
  • the applicant terminal 10 displays a predetermined application e-mail form and is given an application ID that is automatically assigned by application unit to identify the application content (1001 in the example of Fig. 3). -Numbered 01).
  • the applicant inputs the take-out period etc. for which he / she wants to take out the terminal, and selects the approver such as the supervisor and designates it as the destination in the approval authority list stored in the approver information storage unit 143 (see FIG. 3).
  • employee code A001 is specified).
  • the format of the approval authority list is not particularly limited.
  • the presence / absence of export approval authority is registered as one item of a general-purpose employee list.
  • a list of authorized users registered as authorized from the employee list may be created and displayed in the pull-down menu.
  • the number of approvers to be specified is not particularly limited. When multiple approvers are designated as recipients and approval is obtained from all approvers, or when approval is obtained from at least one approver. In the meantime, it would be possible to take it out.
  • the address of the application mail including the person having the approval authority in the approval authority list is registered in advance.
  • the approver does not check the approval authority in the application mail, and after the approval mail of the approver is replied, the approver It is also possible to confirm whether the person has the approval authority registered in.
  • the application mail is sent in the format shown in the example of FIG.
  • the address of the approver (A001) is specified as the destination, and the sender (applicant: A101), application ID (1001-01) , At least information about the export period (October 1, 2005 to October 11, 2005) will be included. In addition, it is good also as adding the information regarding a take-out reason etc.
  • the application information storage unit 144 of the applicant terminal 10 stores the application information capability regarding the application contents for the export approval as shown in the example of FIG. In the example of Figure 4, the application information includes information on the application ID, approver, and the requested export period, but the second approver confirms the approver's approval authority after the approval email is returned.
  • the application information storage unit 144 may use a mailer's sent folder if application mail or approval mail is sent and received using a mailer. As an area setting, too.
  • the approver terminal 20 that has received the application mail the approver having the authorization authority confirms the application content and determines whether or not the application can be taken out.
  • an approval email as shown in the example of Fig. 5 is created and sent back to the applicant.
  • the address of the applicant (A1 01) is specified as the destination, the sender (approver: A001), the application ID that identifies the application mail and the application contents (1001-01), and the approval result (OK or NG) at least.
  • the sender approver: A001
  • the application ID that identifies the application mail and the application contents (1001-01)
  • the approval result OK or NG
  • information on the take-out period after the change may be added, and information on the reason for approval, incidental conditions of take-out, etc. may be added.
  • the approval mail in the second method also has the same format as shown in the example of FIG.
  • the application information includes information about the approver who has the authorization authority specified by the applicant, so if you confirm that it matches the sender of the approval mail, It can be confirmed that this is the result of approval. If it does not match the sender of the approval email, error processing such as displaying an error message is performed.
  • the approver who sent the approval mail at this stage will see the approval authority list. Check if it falls under the registered approval authority. In other words, as shown in the example of FIG. 11, it is confirmed whether the sender of the approval mail is registered as an authorized person in the approval authority list stored in the approver information storage unit 143. .
  • the export approval period is set in the registry setting information
  • the network environment is not confirmed in the normal network environment in the confirmation of the network environment at the time of starting the applicant terminal 10 described above. If it is confirmed that there is a problem, the information preservation process is not performed immediately.
  • the setting information in the registry is checked and the export approval period is set, the activation time is included in the export approval period. Determine whether or not. If it is included in the take-out approval period, it means that it has been approved for take-out, so information security processing is not performed. If the export approval period is not set, or if it is not included in the export approval period, information security processing will be performed in principle. It is also possible to use authentication or the like together.
  • FIG. 13 shows the flow in the first embodiment for confirming the approval authority of the approver when sending the application mail.
  • FIG. 14 shows a flow in the second embodiment in which the approval authority of the approver is confirmed when the approval mail is received.
  • the approval authority of the approver is confirmed when the application email is sent, and information on the approver with the approval authority is stored in the application information. It is confirmed whether the sender is an approver included in the application information (S04). If it does not match the approver, the approval mail from the approver with the approval authority is not accepted, so an error message is displayed (S08).
  • the approval authority of the approver is confirmed when the application mail is sent. Therefore, the sender of the application mail is registered as an authorized person in the approver list here. (S14). If the user does not have approval authority, an error message is displayed (S18).
  • the user has approval authority, it is confirmed whether the approval result in the approval mail is OK (S15). If it is NG, an NG message is displayed (S19), assuming that the computer is not allowed to be taken out. If the export is OK, read the export period specified when sending the application email included in the application information (S16), and record the read export period in the computer registry setting information as the export approval period. (S 17).
  • FIGS. Figures 15 to 17 show the case where the network environment is determined based on whether the network environment acquired by the computer matches the pre-registered environment information.
  • Figure 15 shows the pattern and diagram for starting the information maintenance program before the OS.
  • Figure 16 shows the pattern of starting the information integrity program on the OS, and
  • Fig. 17 shows the flow of the pattern in which the information integrity program is activated before the OS and also on the OS.
  • Figure 18 shows the flow for determining the network environment by sending a ping to the monitoring server.
  • the setting information power of the registry is also read out the export approval period (S25). Check if the export approval period is recorded and the current time falls within the period specified as the export approval period (S26), and if it falls within the export approval period, If the OS has been started and is in a bad state, the OS startup process is executed (S28, S30), and then the normal use of the terminal is permitted (S29).
  • the terminal Even if it is determined that the terminal is connected to the specified network, the terminal may be moved afterwards to be used in an unauthorized environment. It is preferable to reconfirm the network environment at a predetermined timing. If it is determined that the terminal is still connected to the specified network in the confirmation after the operation of such a terminal is started, or if it is confirmed that it falls within the export approval period, the OS is already started. Therefore, normal use is permitted as it is, and processing continues (S28, S29).
  • the OS when it is confirmed that the network is connected to the specified network in step 24, the OS is booted as it is. Even if it exists, the presence or absence of the export approval period may be confirmed, and if it falls within the export approval period, a predetermined information maintenance process may be performed.
  • information preservation processing Processing to stop the terminal, processing to prohibit startup of the OS or application program stored in the terminal, processing to erase data stored in the terminal, instructions to the external device connected to the terminal (printout or to external disk) In addition to the process of prohibiting the writing of data, etc.), the process of stopping the terminal's connection to the network is performed.
  • the order of confirming whether it is connected to the specified network and confirming whether or not the export approval period is set is not particularly limited. After confirmation, in any case, it may be possible to confirm whether or not a take-out approval period has been set, or first check whether a take-out approval period has been set and set a take-out approval period. If it is confirmed that it is not connected and connected to a legitimate network, OS startup processing etc. may be performed.
  • the OS when the terminal is turned on (S31), the OS also reads the HDD power and executes the startup process (S32). .
  • the information maintenance program is also read and started by the HDD as part of the OS (S33), and the application interface (API) also acquires information about the network environment such as the domain name and IP address specified by the OS. (S34), it is checked whether or not it is connected to the originally designated network in comparison with the regular network environment stored in advance in the HDD of the terminal (S35). If it is determined that it is connected to the specified network, use of the terminal as usual is permitted (S39).
  • the setting information power of the registry is also read out the export approval period (S36). Check if the export approval period is recorded and the current time falls within the period specified as the export approval period (S37). Use of the terminal is permitted (S39).
  • Information preservation processing includes terminal termination processing, processing for prohibiting startup of the OS or application program stored in the terminal, processing for erasing data stored in the terminal, and instructions for external devices connected to the terminal ( In addition to the process of prohibiting printout and writing to an external disk, etc., the process of stopping the terminal's connection to the network is performed.
  • the information maintenance program when the terminal is turned on (S41), the information maintenance program is activated by reading out the boot sector power of the ROM or HDD (S42).
  • the information maintenance program acquires information related to the network environment to which the terminal detected by the network interface is connected (S43), and is originally specified in comparison with the regular network environment stored in advance in the HDD of the terminal. It is confirmed whether or not it is connected to the network (S44). If it is determined that it is connected to the specified network, OS startup processing is executed (S47).
  • the setting information power of the registry is also read out the export approval period (S45). Check if the export approval period is recorded and the current time falls within the period specified as the export approval period (S46), and if it falls within the export approval period, start the OS Processing is executed (S47).
  • the information integrity program is read and started as a part of the OS (S48), and the application interface is used to obtain information about the network environment specified by the OS. (S49), it is checked whether or not it is connected to the originally designated network in comparison with the regular network environment stored in advance in the HDD of the terminal (S50). If it is determined that it is connected to the specified network, use of the terminal as usual is permitted (S53).
  • the setting information power of the registry is also read out the export approval period (S51). Check if the export approval period is recorded and the current time falls within the period specified as the export approval period (S52). Use of terminal is allowed (S53).
  • Step 44 when it is confirmed that the network is connected to the specified network in Step 44, the OS is started as it is, and it is confirmed that the network is connected to the specified network in Step 50. Normal use is allowed as it is. However, even when connected to a regular environment, the presence / absence of a take-out approval period may be confirmed, and if it falls within the take-out approval period, predetermined information maintenance processing may be performed.
  • Information preservation processing includes terminal stop processing, processing for prohibiting activation of the OS or application program stored in the terminal, processing for erasing data stored in the terminal, instructions for external devices connected to the terminal ( In addition to processing that prohibits printouts and export to external disks, etc., processing to stop the terminal's connection to the network is performed.
  • a flow for determining a network environment by sending a ping to the monitoring server will be described with reference to FIG.
  • a ping is sent to a monitoring server that can send and receive data in a legitimate network environment, and it is checked whether the power is a legitimate environment based on the presence or absence of a reply.
  • the information integrity program When the terminal is turned on (S61), the information integrity program is read and activated by the boot sector power of the ROM or HDD (S62). The information integrity program sends a ping to the monitoring server connected to the same network such as the LAN in the normal environment (S63). Whether the terminal is connected to the normal network environment is checked. Whether or not there is a response to the ping from the monitoring server (S64) is judged from this. If there is a reply, it is determined that the device is connected to the regular network environment, and the OS is started. If not, the OS is started (S68, S70), and then the normal terminal Use is permitted (S69).
  • the terminal is determined to be in an environment different from the normal network environment, and the setting information capability take-out approval period in the registry is read (S65).
  • the export approval period is recorded, and the current time is within the period specified as the export approval period. (S66), if it falls within the export approval period, if the OS has not been started, execute OS startup processing (S68, S70), and then continue normally Use of the terminal is permitted (S69).
  • step 64 when it is confirmed in step 64 that a ping reply has been received, the OS is started as it is, but this is a case where a normal environment is connected. Therefore, it is also possible to check whether or not a take-out approval period is set, and to perform predetermined information maintenance processing if it falls within the take-out approval period.
  • Information preservation processing includes terminal stop processing, processing for prohibiting activation of the OS or application program stored in the terminal, processing for erasing data stored on the terminal, and instructions for external devices connected to the terminal. In addition to the process of prohibiting printouts, writing to external disks, etc., the process of stopping the terminal's connection to the network is performed.
  • FIG. 18 describes the pattern in which the information maintenance program is started before the OS. In the same way, it is possible to apply either the pattern for starting the information maintenance program on the OS, the information protection program starting before the OS, and the pattern for starting on the OS.
  • FIG. 1 is a diagram showing an outline of an embodiment of an information maintenance system according to the present invention.
  • FIG. 2 is a block diagram showing a configuration of an information maintenance system according to the present invention.
  • FIG. 3 is a first diagram showing a first operational flow of the information maintenance system according to the present invention.
  • FIG. 4 is a second diagram showing a first operational flow of the information maintenance system according to the present invention.
  • FIG. 5 is a third diagram showing a first operational flow of the information maintenance system according to the present invention.
  • FIG. 6 is a fourth diagram showing a first operational flow of the information maintenance system according to the present invention.
  • FIG. 7 is a fifth diagram showing a first operational flow of the information maintenance system according to the present invention.
  • FIG. 8 is a first diagram showing a second operational flow of the information maintenance system according to the present invention.
  • FIG. 9 is a second diagram showing a second operational flow of the information maintenance system according to the present invention.
  • FIG. 10 is a third diagram showing a second operational flow of the information maintenance system according to the present invention.
  • FIG. 11 is a fourth diagram showing a second operational flow of the information maintenance system according to the present invention.
  • FIG. 12 is a fifth diagram showing a second operational flow of the information maintenance system according to the present invention.
  • FIG. 13 is a flowchart showing a first flow for setting a take-out approval period by the information maintenance program according to the present invention.
  • FIG. 14 is a flowchart showing a second flow for setting a take-out approval period by the information maintenance program according to the present invention.
  • FIG. 15 is a flowchart showing a first flow of determining whether or not information maintenance is possible by checking a computer connection environment by the information maintenance program according to the present invention.
  • FIG. 16 is a flowchart showing a second flow of determining whether or not information maintenance is possible by checking the connection environment of the computer by the information maintenance program according to the present invention.
  • FIG. 17 is a flowchart showing a third flow in which the information maintenance program according to the present invention checks the computer connection environment and determines whether or not information maintenance is possible.
  • FIG. 18 is a flowchart showing a fourth flow in which the information maintenance program according to the present invention checks the connection environment of the computer and determines whether or not information maintenance is possible.

Abstract

Provided is an information preserving program, which authorizes a computer to act only in case the carrying-out of information to be acquired from a computer is approved in advance, so that the information may be preserved in case the computer is used in an environment different from the normal network environment. When the operator of a computer is connected with the normal network environment, an application notice designating the carrying-out term on the use of the computer in an environment other than the normal one is sent to an approval authority by an electronic mail or the like, and the carrying-out approval term approved by an approval notice or a return from the approval authority is stored as the set information of the computer. When the computer is used in an environment other than the normal one, it is checked whether or not the carrying-out approval term is stored in the set information. Within the carrying-out approval term, the use of the computer is authorized as it is. Otherwise, a predetermined operation is performed to preserve the information of the computer.

Description

明 細 書  Specification
情報保全プログラム、情報保全方法及び情報保全システム  Information preservation program, information preservation method and information preservation system
技術分野  Technical field
[0001] 本発明は、コンピュータを正規のネットワーク環境と異なる環境において使用する 場合に、コンピュータから取得し得る情報を保全するために、事前に承認者の持出 承認を受けた場合にのみコンピュータが動作することを可能にする情報保全プロダラ ム、情報保全方法、及び情報保全システムに関するものである。  [0001] In the present invention, when a computer is used in an environment different from a regular network environment, in order to preserve the information that can be obtained from the computer, the computer is only obtained when it is approved in advance by the approver. The present invention relates to an information security program, an information security method, and an information security system that make it possible to operate.
背景技術  Background art
[0002] コンピュータやネットワークの利用の拡大が進むにつれて、様々な重要情報がネッ トワークに接続されたコンピュータにおいて取扱われるようになつている。そのため、 重要情報を保護するためのコンピュータやネットワークのセキュリティ対策は、コンビ ユータシステムを利用する上での重要な課題となって 、る。ファイアウォールやウィル ス対策ソフトといったネットワーク外部からの不正アクセスやコンピュータウィルスの侵 入を防御するための手段が広く利用されているが、顧客等の個人情報の流出などの 事件に見られるように、近年は内部からの不正な情報の持ち出しに対する対策が重 要な課題となっている。  [0002] As the use of computers and networks expands, various important information is handled by computers connected to the network. Therefore, security measures for computers and networks to protect important information are important issues in using computer systems. Means to prevent unauthorized access from outside the network and the invasion of computer viruses, such as firewalls and anti-virus software, are widely used. However, as seen in incidents such as leakage of personal information of customers, etc. Therefore, measures against taking out illegal information from inside are an important issue.
[0003] 内部におけるコンピュータの不正操作による情報漏洩を防止する方法としては、 ID  [0003] As a method for preventing information leakage due to unauthorized computer operations inside,
'パスワード等によりコンピュータの操作権限を認証する方法が広く用いられている他 、一般的に不正操作である可能性が高い操作パターンをルールとして登録し、コンビ ユータが受け付けた操作をルールと対比して不正操作である可能性を判定するルー ルベースによる判定、コンピュータに対する操作の履歴力 ユーザの行動パターンを 設定したプロファイルを作成し、コンピュータが受け付けた操作をプロファイルと対比 する判定なども行われて 、る。  'In addition to the widely used method of authenticating computer operation authority using passwords, etc., register operation patterns that are generally likely to be unauthorized operations as rules, and compare operations accepted by the computer with rules. It is also possible to determine the possibility of an unauthorized operation by rule base, the history of computer operations, create a profile that sets the user's behavior pattern, and compare the operations accepted by the computer with the profile. The
[0004] また、コンピュータからの情報漏洩が盗難等によるコンピュータの不正な持ち出しに よって生じやすいことに着目し、コンピュータに通常使用時における接続環境を記憶 させてぉ 、て、再起動された際の接続環境が通常使用時の接続環境である力否か を判定して、通常使用時の接続環境と異なる場合には、パスワードの入力を要求す る発明が開示されている (特許文献 1参照。 ) o [0004] In addition, paying attention to the fact that information leakage from a computer is likely to occur due to unauthorized removal of the computer due to theft, etc., store the connection environment during normal use in the computer, and then restart the computer. Judgment is made whether the connection environment is a normal connection environment. If the connection environment is different from the normal connection environment, a password must be entered. (See Patent Document 1.) o
[0005] 特許文献 1:特開 2002— 278932号公報  [0005] Patent Document 1: JP 2002-278932 A
発明の開示  Disclosure of the invention
発明が解決しょうとする課題  Problems to be solved by the invention
[0006] 上記の特許文献 1記載の発明によれば、盗難等によるコンピュータの不正な持ち出 しに対応できることにカ卩えて、通常使用時においてはパスワードの入力操作なしにコ ンピュータを使用することができる。この発明によると、例えば出張でコンピュータを持 ち出す場合のように、正規の利用者が通常使用時とは異なる接続環境にぉ 、てコン ピュータを使用する場合には、予めパスワードの発行を受けておいて、コンピュータ を起動したり、節電状態力 復帰したりするたびにパスワードの入力操作を行わなけ ればならない。 [0006] According to the invention described in Patent Document 1, the computer can be used without a password input operation during normal use, in view of being able to handle unauthorized computer removal due to theft or the like. Can do. According to the present invention, when a regular user uses a computer in a connection environment different from that during normal use, for example, when taking out the computer on a business trip, a password is issued in advance. The password must be entered each time the computer is started or the power-saving state is restored.
[0007] また、認証用にパスワードを使用するため、このパスワードが何らかの理由で漏洩し てしまった場合には、悪意の操作者によってコンピュータの不正操作が行われてしま うリスクがある。さらに、パスワードの発行を受けた利用者は常に通常使用時とは異な る接続環境であってもコンピュータを使用することができるため、ー且パスワードを与 えてしまうつた利用者にっ 、ては、利用者自身が不正操作を行うことを防止すること ができな!/、と 、う問題を有して!/、る。  [0007] Further, since a password is used for authentication, if this password is leaked for some reason, there is a risk that an unauthorized operation of the computer will be performed by a malicious operator. Furthermore, users who have been issued passwords can always use the computer even in a connection environment different from that during normal use, so for users who have given passwords, Users cannot prevent unauthorized operations! /, And have problems!
[0008] これらの課題に対応するためには、パスワードの発行や入力操作を伴うことなぐ正 規の利用者の出張等によってコンピュータの持ち出しが必要になるたびに、上司等 の承認権限者がその事情を確認して通常と異なるネットワーク環境におけるコンビュ ータの使用が可能となる仕組みが提供されることが好ま 、。  [0008] In order to deal with these issues, every time an authorized user takes out a computer due to a regular user's business trip without issuing a password or an input operation, an approval authority such as a supervisor It is preferable to provide a mechanism that enables the use of the computer in an unusual network environment after confirming the circumstances.
[0009] 本発明は、このような課題に対応するためになされたものであり、コンピュータを正 規のネットワーク環境と異なる環境において使用する場合に、コンピュータから取得し 得る情報を保全するために、事前に承認者の持出承認を受けた場合にのみコンビュ ータが動作することを可能にする情報保全プログラム、情報保全方法、及び情報保 全システムであって、パスワードの発行や入力操作を必要としな ヽものを提供するこ とを目的とするものである。  [0009] The present invention has been made to cope with such a problem, and in order to maintain information that can be acquired from a computer when the computer is used in an environment different from a normal network environment, This is an information security program, information security method, and information security system that enables the computer to operate only when approval from the approver is obtained in advance. Password issuing and input operations are required. The purpose is to provide something that is not bad.
課題を解決するための手段 [0010] 本願に力かる課題を解決する第 1の発明は、コンピュータを正規のネットワーク環境 と異なる環境において使用する場合に、コンピュータ力も取得し得る情報を保全する ための情報保全プログラムであって、コンピュータが正規のネットワーク環境において 使用されている間に、前記コンピュータに、前記コンピュータに記憶された承認者を 宛先に指定して、前記コンピュータを正規の環境以外で使用する持出期間が指定さ れた持出承認のための申請通知を、前記申請通知を識別する申請 IDを付して送信 するステップと、前記申請 ID、前記承認者、前記持出期間を少なくとも含む申請情報 を、前記コンピュータに記憶させるステップと、前記申請通知を受信した承認者が送 信した、前記申請 ID、前記申請通知に対する承認結果を少なくとも含む承認通知を 受信するステップと、前記承認通知に含まれる申請 IDに対応する申請情報を特定し 、前記承認通知の送信者が、前記申請情報に含まれる承認者であるかを判定するス テツプと、前記送信者が前記承認者に該当し、かつ前記承認結果が持出を承認する ものである場合には、前記申請情報に含まれる持出期間を、持出承認期間として前 記コンピュータの設定情報に記憶させるステップと、を実行させ、前記コンピュータの 起動時においては、前記コンピュータに、前記コンピュータが正規のネットワーク環境 に接続されているかを判定するステップと、前記コンピュータが正規のネットワーク環 境に接続されていないと判定された場合には、前記コンピュータの設定情報に持出 承認期間が記憶されて 、るかを確認するステップと、前記持出承認期間が記憶され ていると確認された場合には、前記コンピュータの起動時間が前記持出承認期間の 期間内であるかを判定するステップと、前記持出承認期間が記憶されていないと確 認された場合、又は前記コンピュータの起動時間が前記持出承認期間の期間内で ないと判定された場合には、前記コンピュータの停止処理、前記コンピュータに格納 されたオペレーションシステム又はアプリケーションプログラムの少なくとも一部の起 動を禁止する処理、前記コンピュータに格納された少なくとも一部のデータを消去す る処理、前記コンピュータに接続された外部デバイスに対する命令を禁止する処理、 の少なくとも一つの処理を起動するステップと、を実行させることを特徴とする情報保 全プログラムである。 Means for solving the problem [0010] A first invention for solving the problems that are important to the present application is an information maintenance program for protecting information that can also acquire computer power when the computer is used in an environment different from a regular network environment. While the computer is being used in a regular network environment, the computer is designated as the destination for the approver stored in the computer, and the borrowing period during which the computer is used outside the regular environment is designated. Transmitting an application notification for approval for taking out the application with an application ID for identifying the application notification, and application information including at least the application ID, the approver, and the export period to the computer. And storing the application ID and the approval result for the application notification transmitted by the approver who has received the application notification. Receiving an approval notification including at least one, identifying application information corresponding to an application ID included in the approval notification, and determining whether a sender of the approval notification is an approver included in the application information When the step and the sender correspond to the approver and the approval result approves the export, the export period included in the application information is set as the export approval period. Storing the setting information in the computer, and at the time of starting the computer, the step of determining whether the computer is connected to a normal network environment when the computer is started up; and If it is determined that the computer is not connected to the environment, check whether the export approval period is stored in the setting information of the computer. And if it is confirmed that the take-out approval period is stored, the step of determining whether the startup time of the computer is within the period of the take-out approval period, and the take-out approval period When it is confirmed that the computer is not stored, or when it is determined that the startup time of the computer is not within the period of the export approval period, the computer is stopped, and the operation system stored in the computer Or at least one of a process for prohibiting activation of at least a part of the application program, a process for erasing at least a part of data stored in the computer, and a process for prohibiting an instruction to an external device connected to the computer. An information storage program characterized by executing a step of starting two processes. .
[0011] 本願に力かる課題を解決する第 2の発明は、コンピュータを正規のネットワーク環境 と異なる環境において使用する場合に、コンピュータ力も取得し得る情報を保全する ための情報保全プログラムであって、コンピュータが正規のネットワーク環境において 使用されている間に、前記コンピュータに、承認者の宛先を指定して、前記コンビュ ータを正規の環境以外で使用する持出期間が指定された持出承認のための申請通 知を、前記申請通知を識別する申請 IDを付して送信するステップと、前記申請 ID、 前記持出期間を少なくとも含む申請情報を、前記コンピュータに記憶させるステップ と、前記申請通知を受信した承認者が送信した、前記申請 ID、前記申請通知に対 する承認結果を少なくとも含む承認通知を受信するステップと、前記承認通知の送 信者力 前記コンピュータに記憶された所定の承認者であるかを判定するステップと 、前記送信者が前記承認者に該当し、かつ前記承認結果が持出を承認するもので ある場合には、前記承認通知に含まれる申請 IDに対応する申請情報を特定し、前 記申請情報に含まれる持出期間を、持出承認期間として前記コンピュータの設定情 報に記憶させるステップと、を実行させ、前記コンピュータの起動時においては、前 記コンピュータに、前記コンピュータが正規のネットワーク環境に接続されているかを 判定するステップと、前記コンピュータが正規のネットワーク環境に接続されて 、な ヽ と判定された場合には、前記コンピュータの設定情報に持出承認期間が記憶されて Vヽるかを確認するステップと、前記持出承認期間が記憶されて ヽると確認された場合 には、前記コンピュータの起動時間が前記持出承認期間の期間内であるかを判定す るステップと、前記持出承認期間が記憶されていないと確認された場合、又は前記コ ンピュータの起動時間が前記持出承認期間の期間内でないと判定された場合には、 前記コンピュータの停止処理、前記コンピュータに格納されたオペレーションシステ ム又はアプリケーションプログラムの少なくとも一部の起動を禁止する処理、前記コン ピュータに格納された少なくとも一部のデータを消去する処理、前記コンピュータに 接続された外部デバイスに対する命令を禁止する処理、の少なくとも一つの処理を 起動するステップと、を実行させることを特徴とする情報保全プログラムである。 [0011] A second invention for solving the problems that are relevant to the present application is that a computer is connected to a regular network environment. An information security program for protecting information that can also be obtained by a computer when used in an environment different from the above, wherein the address of the approver is given to the computer while the computer is being used in a regular network environment. Designating and sending an application notification for export approval with a specified export period in which the computer is used outside the normal environment, with an application ID identifying the application notification; Storing at least the application information including at least the application ID and the export period in the computer, and the approval result for the application ID and the application notification transmitted by the approver who has received the application notification. A step of receiving an approval notification including: a sender power of the approval notification; and determining whether the approval notification is stored in the computer. And when the sender corresponds to the approver and the approval result approves the export, the application information corresponding to the application ID included in the approval notification is specified, and Storing the take-out period included in the application information in the setting information of the computer as a take-out approval period. When the computer is started, the computer is connected to a regular network. A step of determining whether the computer is connected to the environment, and if it is determined that the computer is connected to a normal network environment and the computer is determined to be non-compliant, the export approval period is stored in the setting information of the computer and V ヽAnd if it is confirmed that the export approval period is stored, the startup time of the computer is the export approval time. A step of determining whether or not the export approval period is not stored, or it is determined that the startup time of the computer is not within the period of the export approval period. In the event of a failure, the computer is stopped, the operation system or application program stored in the computer is prohibited from starting, or the data stored in the computer is deleted. And a step of starting at least one process of prohibiting an instruction to an external device connected to the computer.
本発明においては、コンピュータの操作者が正規のネットワーク環境に接続されて いる際に、承認権限者に対して電子メール等で正規の環境以外でコンピュータを使 用することについて、持出期間を指定した申請通知を送信し、承認権限者からの返 信である承認通知により承認された持出承認期間をコンピュータの設定情報として記 憶させる。コンピュータを正規の環境以外で使用する際には、設定情報に持出承認 期間が記憶されているかをチェックして、持出承認期間の期間内である場合にはそ のままコンピュータの使用が許可され、それ以外の場合にはコンピュータの情報を保 全するための所定の処理が行われる。第 1の発明においては、予め承認権限のある 承認者リストから申請通知の宛先を指定するのに対して、第 2の発明においては、承 認通知の送信者が承認権限のある承認者リストに該当するカゝ否かを判断する。 In the present invention, when a computer operator is connected to a regular network environment, the take-out period is specified for using the computer outside the regular environment by e-mail or the like to the authorized person. Sent the application notification and returned from the approval authority. The take-out approval period approved by the approval notification is a computer setting information. When the computer is used outside the normal environment, it is checked whether the export approval period is stored in the setting information, and if it is within the export approval period, the computer can be used as it is. In other cases, predetermined processing for preserving computer information is performed. In the first invention, the address of the application notification is designated in advance from an approver list having approval authority, whereas in the second invention, the sender of the approval notification is added to the approver list having approval authority. Judge whether or not applicable.
[0013] 尚、本発明において接続環境を判定するコンピュータの起動時とは、電源オフから のコンピュータの起動時に限られず、コンピュータの再起動時や、省電力状態からの 復電時等を含むものであってもよい。また、接続環境の判定はコンピュータの起動時 に限られるものではなぐ起動時に加えて例えば起動中であっても 1時間毎等の所定 のタイミングでチェックを行うこととすれば、起動中に持ち出された場合などにも対応 することが可能になる。 In the present invention, the time of starting the computer for determining the connection environment is not limited to the time of starting the computer after the power is turned off, but includes the time of restarting the computer, the time of power recovery from the power saving state, and the like. It may be. In addition, the determination of the connection environment is not limited to the startup of the computer. In addition to the startup, if the check is performed at a predetermined timing such as every hour even during startup, it is taken out during startup. It becomes possible to cope with such cases.
[0014] また、本発明は、前記コンピュータが正規のネットワーク環境に接続されているかを 判定するステップにおいて、前記コンピュータに、前記コンピュータが接続されたネッ トワーク環境に関する第 1の環境情報を取得するステップと、前記第 1のネットワーク 環境情報を、前記コンピュータに予め記憶された正規のネットワーク環境に関する第 2の環境情報と比較するステップと、を実行させ、前記第 1の環境情報が前記第 2の 環境情報と一致しない場合に、前記コンピュータが正規のネットワーク環境に接続さ れて 、な!/、と判定することを特徴としてもよ!、。  [0014] In the present invention, in the step of determining whether or not the computer is connected to a regular network environment, the step of acquiring, in the computer, first environment information related to the network environment to which the computer is connected. And comparing the first network environment information with second environment information related to a regular network environment stored in advance in the computer, wherein the first environment information is the second environment information. If the information does not match, it may be characterized that the computer is connected to a regular network environment and is judged to be! /!
[0015] さらに、本発明は、前記コンピュータが正規のネットワーク環境に接続されているか を判定するステップにおいて、前記コンピュータに、前記コンピュータとネットワークを 通じて接続された認証サーバに pingを送信するステップと、前記認証サーバから前 記 pingに対する返信の有無を確認するステップと、を実行させ、前記 pingに対する 返信がな ヽと確認されると、前記コンピュータが正規のネットワーク環境に接続されて V、な 、と判定することを特徴としてもょ 、。  [0015] Further, the present invention provides a step of determining whether or not the computer is connected to a regular network environment by transmitting a ping to the computer and an authentication server connected to the computer through a network; And confirming whether or not there is a reply to the ping from the authentication server, and confirming that there is no reply to the ping, the computer is connected to a regular network environment and V, It is characterized by judging.
[0016] 本発明において、コンピュータが起動された環境が正規のネットワーク環境である か否かを判定する方法は特に限定されるものではないが、これらの方法によると、速 やかなネットワーク環境の判定が可能になる。 In the present invention, the method for determining whether or not the environment in which the computer is started is a regular network environment is not particularly limited. It is possible to judge the network environment.
[0017] このような特徴を備える本発明にかかる情報保全プログラムは、これらの情報保全 プログラムによって実行される、コンピュータ力も取得し得る情報を保全するための情 報保全方法として特定することもできる。また、これらの情報保全プログラムを備えた 情報保全システムとして構成することもできる。  [0017] The information maintenance program according to the present invention having such features can be specified as an information maintenance method for maintaining information that can be acquired by a computer, which is executed by these information maintenance programs. It can also be configured as an information maintenance system equipped with these information maintenance programs.
[0018] つまり、第 1の発明に対応する情報保全システムは、コンピュータを正規のネットヮ ーク環境と異なる環境において使用する場合に、コンピュータから取得し得る情報を 保全するためにコンピュータに備えられる†青報保全システムであって、前記コンビュ ータを正規の環境以外で使用する持出承認を行う権限を有する承認者の宛先を記 憶する承認者記憶手段と、正規のネットワーク環境において使用されている間に、前 記承認者記憶手段に記憶された承認者を宛先に指定して、持出期間が指定された 前記持出承認のための申請通知を、前記申請通知を識別する申請 IDを付して送信 する申請通知送信手段と、前記申請 ID、前記承認者、前記持出期間を少なくとも含 む申請情報を記憶する申請情報記憶手段と、前記申請通知を受信した承認者が送 信した、前記申請 ID、前記申請通知に対する承認結果を少なくとも含む承認通知を 受信する承認通知受信手段と、前記承認通知に含まれる申請 IDに対応する申請情 報を前記申請情報記憶手段から読み出して、前記承認通知の送信者が、前記申請 情報に含まれる承認者であるかを判定する承認者判定手段と、前記送信者が前記 承認者に該当し、かつ前記承認結果が持出を承認するものである場合には、前記申 請情報に含まれる持出期間を前記申請情報記憶手段から読み出して、持出承認期 間として前記コンピュータの設定情報に記憶する持出承認期間記憶手段と、前記コ ンピュータの起動時にお 、て、正規のネットワーク環境に接続されて 、るかを判定す る接続環境判定手段と、正規のネットワーク環境に接続されて 、な 、と判定された場 合には、前記設定情報に持出承認期間が記憶されているかを確認する持出承認期 間確認手段と、前記持出承認期間が記憶されていると確認された場合には、前記コ ンピュータの起動時間が前記持出承認期間の期間内であるかを持出承認期間判定 手段と、前記持出承認期間が記憶されていないと確認された場合、又は前記コンビ ユータの起動時間が前記持出承認期間の期間内でないと判定された場合には、前 記コンピュータの停止処理、前記コンピュータに格納されたオペレーションシステム 又はアプリケーションプログラムの少なくとも一部の起動を禁止する処理、前記コンビ ユータに格納された少なくとも一部のデータを消去する処理、前記コンピュータに接 続された外部デバイスに対する命令を禁止する処理、の少なくとも一つの処理を起 動する情報保全手段と、を備えることを特徴とする情報保全システムである。 [0018] That is, the information maintenance system corresponding to the first invention is provided in the computer to maintain information that can be acquired from the computer when the computer is used in an environment different from the regular network environment. It is a blueprint maintenance system, and is used in an authorized network environment, and an approver storage means for storing an address of an approver who has the authority to carry out export approval when the computer is used outside the authorized environment. The approver stored in the approver storage means is designated as the destination, and the application notification for the export approval for which the export period is specified is assigned to the application ID for identifying the application notification. An application notification transmitting means for transmitting the application information, an application information storage means for storing application information including at least the application ID, the approver, and the export period, and the application notification. An approval notification receiving means for receiving an approval notification including at least the application ID and an approval result for the application notification transmitted by the approver, and application information corresponding to the application ID included in the approval notification is stored in the application information. And approver determination means for determining whether or not the sender of the approval notification is an approver included in the application information, and the sender corresponds to the approver and the approval result has. In the case of approving the delivery, the take-out approval period storage that reads out the take-out period included in the application information from the application information storage means and stores it in the setting information of the computer as the take-out approval period Means, a connection environment determination means for determining whether the computer is connected to a normal network environment at the time of starting the computer, and a connection to a normal network environment. If it is determined that the export approval period is stored in the setting information, it is confirmed that the export approval period is stored in the setting information. Is a take-out approval period determination means for determining whether the start-up time of the computer is within the period of the take-out approval period, and when it is confirmed that the take-out approval period is not stored, or the computer If it is determined that the activation time is not within the period of the export approval period, Computer stop processing, processing for prohibiting activation of at least part of an operation system or application program stored in the computer, processing for erasing at least part of data stored in the computer, connection to the computer And an information maintenance means for starting at least one of the processes for prohibiting a command to the external device.
第 2の発明に対応する情報保全システムは、コンピュータを正規のネットワーク環境 と異なる環境において使用する場合に、コンピュータ力も取得し得る情報を保全する ためにコンピュータに備えられる†青報保全システムであって、前記コンピュータを正規 の環境以外で使用する持出承認を行う権限を有する承認者を記憶する承認者記憶 手段と、正規のネットワーク環境において使用されている間に、承認者を宛先に指定 して、持出期間が指定された前記持出承認のための申請通知を、前記申請通知を 識別する申請 IDを付して送信する申請通知送信手段と、前記申請 ID、前記持出期 間を少なくとも含む申請情報を記憶する申請情報記憶手段と、前記申請通知を受信 した承認者が送信した、前記申請 ID、前記申請通知に対する承認結果を少なくとも 含む承認通知を受信する承認通知受信手段と、前記承認通知を送信した承認者が 、前記承認者記憶手段に記憶された持出承認を行う権限を有する承認者であるかを 判定する承認者判定手段と、前記承認者が持出承認を行う権限を有する承認者に 該当し、かつ前記承認結果が持出を承認するものである場合には、前記申請情報に 含まれる持出期間を前記申請情報記憶手段から読み出して、持出承認期間として前 記コンピュータの設定情報に記憶する持出承認期間記憶手段と、前記コンピュータ の起動時にぉ 、て、正規のネットワーク環境に接続されて 、るかを判定する接続環 境判定手段と、正規のネットワーク環境に接続されていないと判定された場合には、 前記設定情報に持出承認期間が記憶されているかを確認する持出承認期間確認手 段と、前記持出承認期間が記憶されていると確認された場合には、前記コンピュータ の起動時間が前記持出承認期間の期間内であるかを持出承認期間判定手段と、前 記持出承認期間が記憶されて ヽな ヽと確認された場合、又は前記コンピュータの起 動時間が前記持出承認期間の期間内でないと判定された場合には、前記コンビユー タの停止処理、前記コンピュータに格納されたオペレーションシステム又はアプリケ ーシヨンプログラムの少なくとも一部の起動を禁止する処理、前記コンピュータに格納 された少なくとも一部のデータを消去する処理、前記コンピュータに接続された外部 デバイスに対する命令を禁止する処理、の少なくとも一つの処理を起動する情報保 全手段と、を備えることを特徴とする情報保全システムである。 The information maintenance system corresponding to the second invention is a blueprint maintenance system provided in a computer for maintaining information that can also be obtained by a computer when the computer is used in an environment different from a normal network environment. An approver storage means for storing an approver who has the authority to perform a take-out approval to use the computer outside the normal environment, and an approver as a destination while being used in a normal network environment. An application notification transmission means for transmitting an application notification for approval of the export with a specified export period, with an application ID for identifying the application notification, and at least the application ID and the export period The application information storage means for storing the application information including the application ID and the approval result transmitted by the approver who has received the application notification are displayed. An approval notification receiving means for receiving at least an approval notification, and an approver for judging whether the approver who has transmitted the approval notification is an approver having the authority to carry out take-out approval stored in the approver storage means In the case where the determination means corresponds to an approver having the authority of the approver to carry out take-out approval, and the approval result approves take-out, the take-out period included in the application information is Read out from the application information storage means and store it in the setting information of the computer as a take-out approval period, and whether the computer is connected to a regular network environment when the computer is started. A connection environment determination means for determining whether or not it is not connected to a regular network environment. A confirmation period confirmation means, and if it is confirmed that the take-out approval period is stored, a take-out approval period determination means for determining whether the startup time of the computer is within the period of the take-out approval period; If the export approval period is memorized and it is confirmed that the computer is not active, or if it is determined that the startup time of the computer is not within the export approval period, the computer is stopped. Processing, operation system or application stored in the computer At least one process of prohibiting activation of at least a part of a program, erasing at least a part of data stored in the computer, and prohibiting an instruction to an external device connected to the computer And an information storage means for activating the information storage system.
発明の効果  The invention's effect
[0020] 本発明によって、コンピュータを正規のネットワーク環境と異なる環境にぉ 、て使用 する場合に、事前に承認者の持出承認を受けておいた場合にのみコンピュータの使 用を可能とし、承認を受けていない場合には情報保全の処理を行うよう構成すること によって、コンピュータ力 取得し得る情報を保全して、内部からの情報漏洩を抑制 することが可能になる。パスワードの発行や入力操作を必要としないため、コンビユー タの利用時における操作負担も軽減される。  [0020] According to the present invention, when a computer is used in an environment different from a regular network environment, the computer can be used only when it has been approved by the approver in advance. If the information is not received, it is possible to maintain the information that can be acquired by the computer by suppressing the information leakage from the inside by configuring the information maintenance process. Since no password issuance or input operation is required, the operational burden when using a computer is reduced.
発明を実施するための最良の形態  BEST MODE FOR CARRYING OUT THE INVENTION
[0021] 本発明を実施するための最良の形態について、図面を用いて以下に詳細に説明 する。尚、以下の説明における申請メール等の様式、接続環境の判定方法、情報保 全の方法等にっ ヽては、 、ずれも本発明を実施する形態の一例を示したものであつ て、本発明は力かる実施形態に限定されるものではない。  [0021] The best mode for carrying out the present invention will be described below in detail with reference to the drawings. In addition, regarding the format of the application email, etc., the method for determining the connection environment, the method for storing information, etc. in the following explanation, these deviations are examples of embodiments for carrying out the present invention. The invention is not limited to the powerful embodiments.
[0022] 図 1は、本発明にかかる情報保全システムの実施形態の概要を示す図である。図 2 は、本発明に力かる情報保全システムの構成を示すブロック図である。図 3〜図 7は、 本発明にかかる情報保全システムの第 1の運用フローを示す、それぞれ第 1図〜第 5 図である。図 8〜図 12は、本発明にかかる情報保全システムの第 2の運用フローを示 す、それぞれ第 1図〜第 5図である。図 13、図 14は、本発明にかかる情報保全プロ グラムによる、持出承認期間設定の、それぞれ第 1、第 2のフローを示すフローチヤ一 トである。図 15〜図 18は、本発明に力かる情報保全プログラムによる、コンピュータ の接続環境をチェックして情報保全の可否を判定する、それぞれ第 1〜第 4のフロー を示すフローチャートである。  FIG. 1 is a diagram showing an outline of an embodiment of an information maintenance system according to the present invention. FIG. 2 is a block diagram showing a configuration of an information maintenance system that is effective in the present invention. FIGS. 3 to 7 are FIGS. 1 to 5 showing a first operation flow of the information maintenance system according to the present invention, respectively. FIGS. 8 to 12 are FIGS. 1 to 5 showing a second operation flow of the information maintenance system according to the present invention, respectively. FIG. 13 and FIG. 14 are flowcharts showing the first and second flows for setting the export approval period according to the information maintenance program according to the present invention, respectively. FIGS. 15 to 18 are flowcharts showing first to fourth flows, respectively, for checking whether or not information maintenance is possible by checking the connection environment of the computer by the information maintenance program according to the present invention.
[0023] 図 1を用いて、本発明にかかる情報保全システムの実施形態の概要について説明 する。図 1において、本発明にカゝかる情報保全システムは、社内 LANに接続して使 用される端末 Aに備えられている。端末 Aを使用する申請者の上司等であって、端末 Aの一時的な持ち出しについての承認権限を有する承認者が操作する端末 Bも、同 じ社内 LANに接続されて 、る。 An outline of an embodiment of the information maintenance system according to the present invention will be described with reference to FIG. In FIG. 1, the information maintenance system according to the present invention is provided in terminal A that is used by connecting to an in-house LAN. The boss, etc. of the applicant who uses terminal A, Terminal B, which is operated by an approver who has the authorization to approve temporary take-out of A, is also connected to the same corporate LAN.
[0024] 端末 Aには、起動時にネットワークへの接続環境を確認し、正規の接続環境でな ヽ ことが検出されると、端末 Aの動作の停止、端末 Aのオペレーションシステムやアプリ ケーシヨンプログラムの起動禁止、端末 A内のデータ消去、端末 Aに接続された外部 デバイスへの書出命令等の禁止などの情報保全のための処理を実行するプログラム が予め設けられている。端末 Aを正規の環境である社内 LANに接続して使用する限 りにおいて、これらの処理は行われないため、端末 Aを通常どおり使用することができ る力 社外に持ち出して使用する場合には、正規の接続環境でないことが検出され て情報保全処理が実行され、端末 Aを通常どおり使用することができなくなる。  [0024] Terminal A checks the connection environment to the network at startup, and if it is detected that the connection environment is not normal, the operation of terminal A is stopped and the operation system and application program of terminal A are stopped. A program is installed in advance to execute processing for information protection, such as prohibition of activation, erasure of data in terminal A, and prohibition of a write command to an external device connected to terminal A. As long as terminal A is connected to the corporate LAN, which is a legitimate environment, these processes are not performed, so it is possible to use terminal A as usual. If it is detected that the connection environment is not legitimate, information security processing is executed and terminal A cannot be used normally.
[0025] ここで、端末 Aを使用する申請者が出張等で端末 Aを社外に持ち出して使用したい 場合、申請者は持出期間を指定した申請メールを承認者宛に送信する。承認者は 申請メールを確認した上で、持ち出しの可否を判断して端末 Bから承認メールを申請 者に送信する。持ち出しの申請が承認された場合には、持出承認期間が端末 Aの設 定情報としてセットされ、申請者は持出承認期間がセットされた端末 Aを社内 LANか ら切り離して社外に持ち出すことになる。  [0025] Here, when an applicant who uses terminal A wants to take terminal A out of the office on a business trip or the like, the applicant transmits an application mail specifying a take-out period to the approver. After confirming the application mail, the approver determines whether it can be taken out and sends an approval mail from terminal B to the applicant. When a take-out application is approved, the take-out approval period is set as the setting information for terminal A, and the applicant must take terminal A with the take-out approval period set off from the internal LAN and take it outside. become.
[0026] 上記のように端末 Aは持出承認期間が設定情報としてセットされた状態で持ち出さ れることになるため、使用時が持出承認期間に該当する場合には、正規の環境とは 異なる接続環境であっても予め使用が許可されて 、るものとして情報保全処理を行 わないよう設定することにより、不正な持ち出しの場合に限って情報保全処理を行う よう構成することができる。  [0026] As described above, terminal A is taken out with the export approval period set as the setting information. Therefore, when the use time falls under the export approval period, it differs from the normal environment. Even if it is a connection environment, it is possible to configure the information security processing to be performed only in the case of illegal take-out by setting the information security processing to be permitted in advance so that the information security processing is not performed.
[0027] 尚、端末 Aに持出承認期間が設定情報としてセットされた状態で、持出承認期間に 該当する時間内において正規の環境である社内 LANに接続された場合には、申請 とは異なる不正挙動である可能性が検知される。つまり、正規の環境での起動時に おいても持出承認期間の設定の有無と持出承認期間に該当するかのチェックを行う こととして、持出承認期間内において社内 LANに接続されたことが検出された場合 には、社内 LANへの接続を確立させないように構成することによって、さらに情報保 全の安全性を高めることができる。 [0028] 図 2は、本発明にカゝかる情報保全システムの構成を示している。図 3〜図 7と、図 8 〜図 12に示した運用フローの一例と併せて、本発明に力かる情報保全システムの動 作について、以下に詳細に説明する。 [0027] If the export approval period is set as the setting information on terminal A and it is connected to the corporate LAN, which is the normal environment, within the time corresponding to the export approval period, The possibility of different incorrect behavior is detected. In other words, even when starting up in a regular environment, it is checked whether the export approval period is set and whether it corresponds to the export approval period. If it is detected, it is possible to further enhance the security of information storage by configuring it so that connection to the corporate LAN is not established. [0028] Fig. 2 shows the configuration of an information maintenance system according to the present invention. The operation of the information maintenance system according to the present invention will be described in detail below, together with an example of the operation flow shown in FIGS. 3 to 7 and FIGS. 8 to 12.
[0029] 図 2において、本発明に力かる情報保全システムは申請者端末 10に備えられてい て、申請者端末 10に格納されたプログラム等により所定の機能が実行される。申請 者端末 10において、 HDD14に格納されたプログラムによって所定の処理を実行す るためには、 ROM13に記憶された入力制御や出力制御などのハードウェア制御の ための基本的な各種プログラムを起動し、 RAM12を HDD14力も読み出したプログ ラムのワークエリアとして機能させながら、 CPU 11が演算処理を実行する。また、社 内 LANを通じた承認者端末 20、監視サーバ 30等の他のコンピュータとのデータの 送受信は、 NIC 15を介して行われる。  In FIG. 2, the information maintenance system according to the present invention is provided in the applicant terminal 10, and a predetermined function is executed by a program or the like stored in the applicant terminal 10. In the applicant terminal 10, in order to execute a predetermined process by a program stored in the HDD 14, various basic programs for hardware control such as input control and output control stored in the ROM 13 are started. The CPU 11 executes arithmetic processing while the RAM 12 functions as the work area of the program that also reads the HDD 14 power. In addition, data transmission / reception to / from other computers such as the approver terminal 20 and the monitoring server 30 through the company LAN is performed via the NIC 15.
[0030] 本発明に力かる情報保全システムを備える前提として、申請者端末 10の HDD14 には、情報保全プログラム 142が格納されていることが必要である。情報保全プログ ラム 142は申請者端末 10が接続されているネットワーク環境を NIC15から検出し、 予め ROM13や HDD14に格納された正規のネットワーク環境情報と比較して、正規 のネットワーク環境情報と異なる環境に接続されていると判断されると、申請者端末 1 0の動作の停止、オペレーションシステムやアプリケーションプログラムの起動禁止、 HDD14や RAM12に記憶された所定のデータの消去、申請者端末 10に接続され た外部デバイスへの書出命令等の禁止などの情報保全のための処理力 情報保全 プログラム 142によって実行される。尚、以下においては、本発明に力かる情報保全 プログラムを、承認者力 の承認を受けて持出承認期間をセットする承認申請プログ ラム 141と、起動時等にネットワーク環境を確認して情報保全処理を行う情報保全プ ログラム 142に分けて説明する力 本発明にかかる情報保全プログラムは承認申請 プログラム 141と情報保全プログラム 142の双方を含んで構成されるものである。  [0030] As a premise of providing an information maintenance system that is relevant to the present invention, the HDD 14 of the applicant terminal 10 needs to store an information maintenance program 142. The information maintenance program 142 detects the network environment to which the applicant terminal 10 is connected from the NIC 15 and compares it with the regular network environment information stored in the ROM 13 or HDD 14 in advance, so that the environment is different from the regular network environment information. If it is determined that it is connected, the operation of the applicant terminal 10 is stopped, the operation system or application program is prohibited from starting, the predetermined data stored in the HDD 14 or RAM 12 is deleted, and the applicant terminal 10 is connected. Processing power for information protection such as prohibition of writing commands to external devices, etc. In the following, the information conservation program that is relevant to the present invention is confirmed by the approval application program 141 that sets the export approval period after receiving approval from the approver, and the information environment is confirmed by checking the network environment at the time of startup. Ability to explain by dividing into information maintenance program 142 for processing The information maintenance program according to the present invention includes both the approval application program 141 and the information maintenance program 142.
[0031] 情報保全プログラム 142を起動するタイミング、ネットワーク環境を確認するタイミン グゃ正規のネットワーク環境との比較方法については、特に限定されるものではない 。情報保全プログラム 142は、通常は電源オフから申請者端末 10を立ち上げるタイミ ングで起動するが、申請者端末 10の再起動時や、省電力状態からの復電時等に起 動されるものであってもよい。ネットワーク環境を確認するタイミングについては、情報 保全プログラム 142の起動時に確認を行うのが通常である力 一時的な会社内での 移動等を考慮して、起動時にチェックを行った後に所定の時間が経過した後に再チ エックを行 ヽ、継続して正規のネットワーク環境でな ヽことが確認された場合に情報 保全処理を行うこととしてもよい。また、起動時には正規のネットワーク環境と確認さ れた場合であっても、例えば 1時間毎等の所定のタイミングで再チヱックを行うことに よって、申請者端末 10が起動されている間に持ち出された場合にも対応することが 可會 になる。 [0031] The timing for starting the information maintenance program 142 and the timing for confirming the network environment are not particularly limited. The information protection program 142 is normally started when the applicant terminal 10 is started up after the power is turned off, but is started when the applicant terminal 10 is restarted or when power is restored from the power saving state. It may be moved. Regarding the timing to check the network environment, it is normal to check at the time of starting the information protection program 142. Considering temporary movement within the company, etc. After the elapse of time, re-checking may be performed, and information integrity processing may be performed when it is confirmed that the network environment is not normal. Even if it is confirmed that the network environment is legitimate at the time of activation, it is taken out while the applicant terminal 10 is activated by re-checking at a predetermined timing such as every hour. It is possible to cope with the case.
[0032] また、情報保全プログラム 142は申請者端末 10を立ち上げるタイミングで読み出さ れるものであり、コンピュータのオペレーティングシステム(OS)と相前後して起動され るものである。情報保全プログラム 142と OSの関係については、以下のようにいくつ かのパターンを設定することができる。  [0032] Further, the information maintenance program 142 is read at the timing when the applicant terminal 10 is started up, and is started in synchronism with the operating system (OS) of the computer. Regarding the relationship between the information integrity program 142 and the OS, several patterns can be set as follows.
[0033] 第 1には、情報保全プログラム 142を HDD14ではなく ROM13に格納し、 OSとは 独立したプログラムとして実行するパターンである。申請者端末 10の電源がオンにな ると、 ROM13から入力制御や出力制御などのハードウェア制御のための基本的な 各種プログラムが読み出されてコンピュータの起動処理が行われる力 S、情報保全プロ グラム 142もその一部として OSが起動される前に起動されて、 NIC15から申請者端 末 10が接続されたネットワーク環境に関する情報を取得し、予め ROM13や HDD1 4に格納されたネットワーク環境情報と対比して、接続された環境が正規のものである か否かの判定を実行する。  [0033] The first is a pattern in which the information maintenance program 142 is stored not in the HDD 14 but in the ROM 13 and executed as a program independent of the OS. When the applicant terminal 10 is turned on, the basic program for hardware control such as input control and output control is read from the ROM 13 and the computer is started. Program 142 is also started before the OS is started as part of it, acquires information about the network environment to which applicant terminal 10 is connected from NIC 15, and stores the network environment information stored in ROM 13 or HDD 14 in advance. In contrast to this, it is determined whether or not the connected environment is normal.
[0034] 第 2には、情報保全プログラム 142を HDD14のブートセクタに格納し、 OSが起動 される前に RAM12に読み出されて実行されるパターンである。申請者端末 10の電 源がオンになると、 ROM13から入力制御や出力制御などのハードウェア制御のため の基本的な各種プログラムが読み出されてコンピュータの起動処理が行われるが、 情報保全プログラム 142はその後にブートセクタ力も読み出されて、 OSによる処理が 起動される前に接続された環境が正規のものである力否かの判定を実行する。  The second is a pattern in which the information integrity program 142 is stored in the boot sector of the HDD 14 and read and executed by the RAM 12 before the OS is started. When the power of the applicant terminal 10 is turned on, various programs for hardware control such as input control and output control are read from the ROM 13 and the computer is started up. After that, the boot sector force is also read, and a determination is made as to whether or not the connected environment is normal before the processing by the OS is started.
[0035] 第 3には、情報保全プログラム 142を OS上で動作するプログラムとして HDD14に 格納し、 OSが起動されるとその処理の一部として RAM12に読み出されて実行され るパターンである。申請者端末 10の電源がオンになると、 ROM13から入力制御や 出力制御などのハードウェア制御のための基本的な各種プログラムが読み出されて コンピュータの起動処理が行われ、 OSが起動されてドメイン名等のネットワーク環境 情報を特定すると、情報保全プログラム 142は力かる情報を用いて接続された環境 が正規のものである力否かの判定を実行する。 [0035] Third, the information maintenance program 142 is stored in the HDD 14 as a program operating on the OS, and when the OS is started, it is read out and executed as a part of the processing in the RAM 12. Pattern. When the power of the applicant terminal 10 is turned on, various basic programs for hardware control such as input control and output control are read from the ROM 13, the computer is started, the OS is started, and the domain is started. When the network environment information such as the name is specified, the information maintenance program 142 uses the powerful information to determine whether or not the connected environment is normal.
[0036] 第 4には、情報保全プログラム 142を ROM13に格納するとともに OS上で動作する プログラムとしても HDD14に格納し、各々に格納されたプログラムが OSの起動と前 後して RAM12に読み出され、情報のやりとりを行ないながら、接続された環境が正 規のものである力否かの判定を実行するパターンである。  [0036] Fourthly, the information maintenance program 142 is stored in the ROM 13 and also stored in the HDD 14 as a program operating on the OS, and the program stored in each is read out to the RAM 12 before and after the OS is started. In this pattern, information is exchanged while determining whether or not the connected environment is normal.
[0037] また、接続された環境が正規のものであるカゝ否かを判定する方法は、 NIC 15から 取得した現在のネットワーク環境情報と ROM13や HDD14に格納された正規のネッ トワーク環境情報とを対比する方法に限られるものではなぐ例えば申請者端末 10か ら社内 LANを通じてアクセス可能な監視サーバ 30に pingを送信して、 pingに対す る返信の有無力 ネットワーク環境を判断することとしてもよい。  [0037] In addition, the method for determining whether the connected environment is valid or not is based on the current network environment information acquired from the NIC 15 and the regular network environment information stored in the ROM 13 or HDD 14. For example, it may be possible to judge the network environment by sending a ping from the applicant terminal 10 to the monitoring server 30 that can be accessed via the corporate LAN, and whether or not there is a reply to the ping. .
[0038] これまで説明したように、申請者端末 10には接続された環境が正規のものであるか 否かを判定し、正規の環境でな!、場合には情報保全のための所定の処理を実行す る情報保全プログラム 142が格納されている。従って、申請者端末 10を社内 LANか ら切り離し、外部に持ち出して通常とは異なる環境において使用する場合には、情報 保全プログラム 142によって申請者端末 10の動作は制限を受けることになる。  [0038] As described above, the applicant terminal 10 determines whether or not the connected environment is normal, and is not a normal environment! An information maintenance program 142 for executing processing is stored. Therefore, when the applicant terminal 10 is disconnected from the corporate LAN, taken outside and used in a different environment, the operation of the applicant terminal 10 is restricted by the information protection program 142.
[0039] ここで、本発明にお!/、ては、正規のネットワーク環境である社内 LANへの接続時に おいて、第 1の方式である図 3〜図 7、又は第 2の方式である図 8〜図 12に沿って説 明する処理を行うことによって、正規のネットワーク環境ではない環境において使用 する場合においても、申請者端末 10を通常どおり動作させることが可能になる。  [0039] Here, the present invention! / Is the first method shown in FIGS. 3 to 7 or the second method when connected to an in-house LAN which is a regular network environment. By performing the processing described with reference to FIGS. 8 to 12, the applicant terminal 10 can be operated as usual even when used in an environment other than a regular network environment.
[0040] 申請者(図 3の例では社員コード A101)が自らの使用する端末を出張等で社外に 持ち出した 、場合、社外への持出承認の権限を有する承認者力 の承認を得るため に、申請者端末 10において承認申請プログラム 141を RAM12に読み出して起動 する。申請者端末 10には、所定の申請メールのフォームが表示され、申請内容を識 別するために申請単位で自動採番される申請 IDが付与される(図 3の例では 1001 —01を採番)。申請者は端末を持ち出したい持出期間等を入力するとともに、承認 者情報記憶部 143に記憶された承認権限者リストの中力も上司等の承認者を選択し て宛先に指定する(図 3の例では社員コード A001を指定)。 [0040] If the applicant (employee code A101 in the example of Fig. 3) takes his / her terminal out of the office on a business trip, etc., in order to obtain approval from the approver who has authority to take out Then, the approval application program 141 is read into the RAM 12 and started on the applicant terminal 10. The applicant terminal 10 displays a predetermined application e-mail form and is given an application ID that is automatically assigned by application unit to identify the application content (1001 in the example of Fig. 3). -Numbered 01). The applicant inputs the take-out period etc. for which he / she wants to take out the terminal, and selects the approver such as the supervisor and designates it as the destination in the approval authority list stored in the approver information storage unit 143 (see FIG. 3). In the example, employee code A001 is specified).
[0041] 承認権限者リストの形式は特に限定されるものでなぐ例えば図 3に示したように、 汎用的な社員リストの一項目として持出承認の権限の有無を登録しておき、申請メー ルの宛先を指定する際には、社員リストから権限有りと登録された承認権限者のリスト を作成して、プルダウンメニュー等で表示できるように設定してもよい。指定する承認 者の数も特に限定されず、複数の承認者を宛先に指定して、全ての承認者から承認 を得た場合、又は少なくとも一人の承認者カゝら承認を得た場合の ヽずれかにお 、て 持ち出しを可能にすることとしてもょ 、。  [0041] The format of the approval authority list is not particularly limited. For example, as shown in Fig. 3, the presence / absence of export approval authority is registered as one item of a general-purpose employee list. When specifying the address of the user, a list of authorized users registered as authorized from the employee list may be created and displayed in the pull-down menu. The number of approvers to be specified is not particularly limited. When multiple approvers are designated as recipients and approval is obtained from all approvers, or when approval is obtained from at least one approver. In the meantime, it would be possible to take it out.
[0042] 尚、承認権限を有する者の承認を得ることを確保するためには、上記のように予め 承認権限者リストに承認権限を有する者と登録された承認者カゝら申請メールの宛先 を指定することとすればよいが、第 2の方式として、申請メールにおいては承認権限 の確認を行わず、承認者力ゝらの承認メールが返信された後において、承認者が承認 権限者リストに登録された承認権限を有する者に該当するかを確認することとしても よい。この場合、申請メールは図 8の例に示した形式で送信される。  [0042] In order to ensure that the approval of the person having the approval authority is obtained, as described above, the address of the application mail including the person having the approval authority in the approval authority list is registered in advance. However, as a second method, the approver does not check the approval authority in the application mail, and after the approval mail of the approver is replied, the approver It is also possible to confirm whether the person has the approval authority registered in. In this case, the application mail is sent in the format shown in the example of FIG.
[0043] 以上のように、承認者に対して送信される申請メールには、宛先に承認者 (A001) のアドレスが指定され、送信者(申請者: A101)、申請 ID (1001— 01)、持出期間( 2005年 10月 1日〜 2005年 10月 11日)に関する情報が少なくとも含まれることにな る。この他に、持出理由等に関する情報を加えることとしてもよい。申請メールの送信 と併せて、申請者端末 10の申請情報記憶部 144には、持出承認の申請内容に関す る申請情報力 図 4の例に示したように記憶される。図 4の例においては、申請情報と して申請 ID、承認者、申請した持出期間に関する情報が含まれているが、承認者の 承認権限を承認メールが返信された後に確認する第 2の方式の場合には、図 9の例 に示したように承認者に関する情報を含まないこととしてもよい。尚、申請情報記憶部 144には、申請メールや承認メールの送受信をメーラーを用いて行う場合であれば、 メーラーの送信済フォルダを用いることとしてもよいし、承認申請プログラム 141に固 有の記憶領域を設定することとしてもょ 、。 [0044] 申請メールを受信した承認者端末 20では、承認権限を有する承認者が申請内容 を確認し、持ち出しの可否を判断する。承認結果については、図 5の例に示したよう な承認メールを作成して、申請者宛に返信する。承認メールにおいては申請者 (A1 01)のアドレスを宛先に指定し、送信者 (承認者: A001)、申請メールと申請内容を 識別する申請 ID (1001— 01)、持ち出しの承認結果 (OK又は NG)に関する情報が 少なくとも含まれることになる。この他に、持出期間を変更して承認する場合には変更 後の持出期間に関する情報を、その他に承認理由、持ち出しの付帯条件等に関す る情報を加えることとしてもよい。尚、第 2の方式における承認メールも、図 10の例に 示したように同様の形式となる。 [0043] As described above, in the application email sent to the approver, the address of the approver (A001) is specified as the destination, and the sender (applicant: A101), application ID (1001-01) , At least information about the export period (October 1, 2005 to October 11, 2005) will be included. In addition, it is good also as adding the information regarding a take-out reason etc. Along with the transmission of the application mail, the application information storage unit 144 of the applicant terminal 10 stores the application information capability regarding the application contents for the export approval as shown in the example of FIG. In the example of Figure 4, the application information includes information on the application ID, approver, and the requested export period, but the second approver confirms the approver's approval authority after the approval email is returned. In the case of the method, as shown in the example of Fig. 9, it is possible not to include information on the approver. The application information storage unit 144 may use a mailer's sent folder if application mail or approval mail is sent and received using a mailer. As an area setting, too. [0044] In the approver terminal 20 that has received the application mail, the approver having the authorization authority confirms the application content and determines whether or not the application can be taken out. As for the approval result, an approval email as shown in the example of Fig. 5 is created and sent back to the applicant. In the approval mail, the address of the applicant (A1 01) is specified as the destination, the sender (approver: A001), the application ID that identifies the application mail and the application contents (1001-01), and the approval result (OK or NG) at least. In addition to this, when approving after changing the take-out period, information on the take-out period after the change may be added, and information on the reason for approval, incidental conditions of take-out, etc. may be added. Note that the approval mail in the second method also has the same format as shown in the example of FIG.
[0045] 申請者端末 10で承認メールを受信すると、図 6の例に示したように、申請 IDをキー に申請情報記憶部 144において対応する申請情報を特定する。申請情報には、申 請者が指定した承認権限を有する承認者に関する情報が含まれて 、るので、承認メ ールの送信者と一致することを確認すれば、承認権限を有する承認者からの承認結 果であることが確認できる。承認メールの送信者と一致しない場合には、エラーメッセ ージの表示などのエラー処理が行われる。  When the approval mail is received at the applicant terminal 10, as shown in the example of FIG. 6, corresponding application information is specified in the application information storage unit 144 using the application ID as a key. The application information includes information about the approver who has the authorization authority specified by the applicant, so if you confirm that it matches the sender of the approval mail, It can be confirmed that this is the result of approval. If it does not match the sender of the approval email, error processing such as displaying an error message is performed.
[0046] 尚、申請メール送信時に承認権限の確認を行わずに承認者の宛先を指定した第 2 の方式の場合には、この段階で承認メールを送信した承認者が承認権限者リスト〖こ 登録された承認権限を有する者に該当するかを確認する。つまり、図 11の例に示し たように、承認メールの送信者が、承認者情報記憶部 143に記憶された承認権限者 リストに承認権限を有する者として登録されている力否かを確認する。  [0046] In the case of the second method in which the address of the approver is specified without confirming the approval authority at the time of sending the application mail, the approver who sent the approval mail at this stage will see the approval authority list. Check if it falls under the registered approval authority. In other words, as shown in the example of FIG. 11, it is confirmed whether the sender of the approval mail is registered as an authorized person in the approval authority list stored in the approver information storage unit 143. .
[0047] 承認権限を有する承認者からの承認結果であることが確認されると、承認結果が N Gである場合には、申請者端末 10に持ち出しが認められな力つたことを示すメッセ一 ジの表示等が行われる。承認結果が OKである場合には、申請情報として記憶され た承認申請を行った持出期間に関する情報を取得し、図 7の例に示したように、指定 された持出期間を持出承認期間(2005年 10月 1日〜 2005年 10月 11日)として、申 請者端末 10のレジストリに設定情報として記憶させる。この動作については、図 12の 例に示した第 2の方式についても同様である。承認メールにおいて持出承認期間が 変更されている場合には、変更された期間に関する方法を承認メール力 取得して、 申請者端末 10のレジストリに設定情報として記憶させる。 [0047] When it is confirmed that the result is an approval result from an approver having an approval authority, if the approval result is NG, a message indicating that the applicant terminal 10 has not been allowed to take out. Is displayed. If the approval result is OK, obtain information on the take-out period for which the application for approval was stored, which is stored as application information, and approve the specified take-out period as shown in the example in Figure 7. As a period (October 1, 2005 to October 11, 2005), it is stored as setting information in the registry of the applicant terminal 10. This operation is the same for the second method shown in the example of FIG. If the export approval period has been changed in the approval email, get the approval email method for the method related to the changed period, It is stored as setting information in the registry of the applicant terminal 10.
[0048] このように、レジストリの設定情報に持出承認期間がセットされると、先に説明した申 請者端末 10の起動時等におけるネットワーク環境の確認において、正規のネットヮ ーク環境でな ヽことが確認された場合に直ちに情報保全処理を行わず、レジストリの 設定情報を確認して、持出承認期間がセットされている場合には、当該起動時間が 持出承認期間内に含まれて 、るかを判定する。持出承認期間内に含まれる場合に は、持ち出しの承認を受けていることになるので情報保全処理は行われない。持出 承認期間がセットされていない場合、又は持出承認期間内に含まれない場合には、 原則として情報保全処理が行われることになるが、情報保全処理の実行の要否判断 にはパスワードによる認証等を併用することとしてもよい。  [0048] As described above, when the export approval period is set in the registry setting information, the network environment is not confirmed in the normal network environment in the confirmation of the network environment at the time of starting the applicant terminal 10 described above. If it is confirmed that there is a problem, the information preservation process is not performed immediately. If the setting information in the registry is checked and the export approval period is set, the activation time is included in the export approval period. Determine whether or not. If it is included in the take-out approval period, it means that it has been approved for take-out, so information security processing is not performed. If the export approval period is not set, or if it is not included in the export approval period, information security processing will be performed in principle. It is also possible to use authentication or the like together.
[0049] 図 13、図 14のフローチャートを用いて、本発明に力かる情報保全プログラムによつ て持出承認期間を設定するフローについて説明する。図 13は、申請メール送信時に 承認者の承認権限の確認を行う第 1の実施形態におけるフローを示している。図 14 は、承認メール受信時に承認者の承認権限の確認を行う第 2の実施形態におけるフ ローを示している。  A flow for setting a take-out approval period by the information maintenance program according to the present invention will be described using the flowcharts of FIGS. 13 and 14. FIG. 13 shows the flow in the first embodiment for confirming the approval authority of the approver when sending the application mail. FIG. 14 shows a flow in the second embodiment in which the approval authority of the approver is confirmed when the approval mail is received.
[0050] 図 13の第 1の実施形態では、申請メールの返信として、承認者からの承認メールを 受け付けると(S01)、承認メールに含まれる申請内容を識別する申請 IDを読み取つ て(S02)、申請 IDをキーに申請メールの送信時にコンピュータに記憶した申請情報 を特定して読み出す (S03)。  [0050] In the first embodiment of FIG. 13, when an approval mail from the approver is received as a reply to the application mail (S01), the application ID for identifying the application content included in the approval mail is read (S02). ), The application information stored in the computer when sending the application mail is specified and read out using the application ID as a key (S03).
[0051] 第 1の実施形態では、申請メール送信時に承認者の承認権限の確認を行い、申請 情報には承認権限の有る承認者に関する情報が記憶されているため、ここで申請メ ールの送信者が申請情報に含まれる承認者であるかを確認する(S04)。承認者と一 致しな 、場合には、承認権限の有る承認者からの承認メールとは認められな 、ので 、エラーメッセージが表示される(S08)。  [0051] In the first embodiment, the approval authority of the approver is confirmed when the application email is sent, and information on the approver with the approval authority is stored in the application information. It is confirmed whether the sender is an approver included in the application information (S04). If it does not match the approver, the approval mail from the approver with the approval authority is not accepted, so an error message is displayed (S08).
[0052] 承認者と一致する場合には、承認メールにおける承認結果が持出 OKとなっている かを確認する(S05)。持出 NGである場合には、コンピュータの持ち出しは認められ なかったとして、 NGメッセージが表示される(S09)。持出 OKである場合には、申請 情報に含まれる申請メール送信時に指定した持出期間を読み取って (S06)、読み 取った持出期間をコンピュータのレジストリの設定情報に持出承認期間として記録す る(S07)。 [0052] If it matches with the approver, it is checked whether the approval result in the approval mail is OK to take out (S05). If it is NG, the NG message is displayed (S09), assuming that the computer is not allowed to be taken out. If export is OK, read the export period specified when sending the application email included in the application information (S06) The taken-out period is recorded in the computer registry setting information as a take-out approval period (S07).
[0053] 図 14の第 2の実施形態では、申請メールの返信として、承認者からの承認メールを 受け付けると(S11)、承認メールに含まれる申請内容を識別する申請 IDと送信者に 関する情報を読み取って(S12)、申請 IDをキーに申請メールの送信時にコンビユー タに記憶した申請情報を特定して読み出すとともに、承認権限の有る承認者に関す る情報を記憶した承認者リストを読み出す (S 13)。  In the second embodiment of FIG. 14, when an approval mail from the approver is received as a reply to the application mail (S11), the application ID identifying the application content included in the approval mail and the information on the sender (S12), using the application ID as a key to identify and read out the application information stored in the computer when sending the application email, and also read out the approver list storing information about the approvers with approval authority ( S 13).
[0054] 第 2の実施形態では、申請メール送信時には承認者の承認権限の確認が行われ て ヽな 、ので、ここで申請メールの送信者が承認者リストに承認権限の有る者として 登録されているかを確認する(S 14)。承認権限を有していない場合には、エラーメッ セージが表示される(S18)。  [0054] In the second embodiment, the approval authority of the approver is confirmed when the application mail is sent. Therefore, the sender of the application mail is registered as an authorized person in the approver list here. (S14). If the user does not have approval authority, an error message is displayed (S18).
[0055] 承認権限を有している場合には、承認メールにおける承認結果が持出 OKとなって いるかを確認する(S 15)。持出 NGである場合には、コンピュータの持ち出しは認め られなかったとして、 NGメッセージが表示される(S 19)。持出 OKである場合には、 申請情報に含まれる申請メール送信時に指定した持出期間を読み取って (S16)、 読み取った持出期間をコンピュータのレジストリの設定情報に持出承認期間として記 録する(S 17)。  [0055] If the user has approval authority, it is confirmed whether the approval result in the approval mail is OK (S15). If it is NG, an NG message is displayed (S19), assuming that the computer is not allowed to be taken out. If the export is OK, read the export period specified when sending the application email included in the application information (S16), and record the read export period in the computer registry setting information as the export approval period. (S 17).
[0056] 図 15〜図 18のフローチャートを用いて、本発明に力かる情報保全プログラムによつ てコンピュータの接続環境をチェックして情報保全の可否を判定するフローについて 説明する。図 15〜図 17はコンピュータが取得したネットワーク環境が予め登録された 環境情報と一致するかによりネットワーク環境を判定する場合であって、図 15は情報 保全プログラムを OSより先に起動するパターン、図 16は情報保全プログラムを OS上 で起動するパターン、図 17は情報保全プログラムを OSより先に起動し、かつ OS上 でも起動するパターンのフローを示している。図 18は監視サーバに pingを送信して ネットワーク環境を判定する場合のフローを示して 、る。  A flow for determining whether or not information maintenance is possible by checking the connection environment of the computer by the information maintenance program according to the present invention will be described with reference to the flowcharts of FIGS. Figures 15 to 17 show the case where the network environment is determined based on whether the network environment acquired by the computer matches the pre-registered environment information. Figure 15 shows the pattern and diagram for starting the information maintenance program before the OS. Figure 16 shows the pattern of starting the information integrity program on the OS, and Fig. 17 shows the flow of the pattern in which the information integrity program is activated before the OS and also on the OS. Figure 18 shows the flow for determining the network environment by sending a ping to the monitoring server.
[0057] まず、情報保全プログラムを OSより先に起動する図 15のフローでは、端末の電源 をオンにすると(S21)、情報保全プログラムが ROM又は HDDのブートセクタ力 読 み出されて起動される(S22)。情報保全プログラムは、ネットワークインターフェイス において検出された端末が接続されたネットワーク環境に関する情報、例えば IPアド レスや MACアドレスを取得して(S23)、端末の HDD等に予め記憶された正規のネ ットワーク環境と対比して本来指定されたネットワークに接続中力否かを確認する(S 24)。指定されたネットワークに接続中と判定された場合は、 OSが起動されていない 場合には OSの起動処理を実行し (S28、 S30)、その後は通常通りの端末の使用が 許可される(S29)。 [0057] First, in the flow of Fig. 15 in which the information integrity program is started before the OS, when the terminal is turned on (S21), the information integrity program is read and started by reading the boot sector power of the ROM or HDD. (S22). Information preservation program, network interface Information on the network environment connected to the terminal detected in step 1, for example, IP address or MAC address is acquired (S23), and it is originally specified in comparison with the regular network environment stored in advance in the HDD of the terminal. To check whether it is connected to the connected network (S 24). If it is determined that it is connected to the specified network, if the OS is not started, OS startup processing is executed (S28, S30), and thereafter, normal use of the terminal is permitted (S29). ).
[0058] 指定されたネットワークに接続されていないと判定された場合は、レジストリの設定 情報力も持出承認期間を読み出す (S25)。持出承認期間が記録されていて、かつ 現在時が持出承認期間として指定された期間内に該当するかを確認し (S26)、持出 承認期間内に該当する場合にっ ヽては、 OSが起動されて ヽな ヽ場合には OSの起 動処理を実行し (S28、 S30)、その後は通常通りの端末の使用が許可される(S29)  If it is determined that the network is not connected to the designated network, the setting information power of the registry is also read out the export approval period (S25). Check if the export approval period is recorded and the current time falls within the period specified as the export approval period (S26), and if it falls within the export approval period, If the OS has been started and is in a bad state, the OS startup process is executed (S28, S30), and then the normal use of the terminal is permitted (S29).
[0059] 一方、持出承認期間が記録されていない場合、又は現在時が持出承認期間として 指定された期間内に該当しない場合には、端末の停止処理、端末に格納された OS 又はアプリケーションプログラムの起動を禁止する処理、端末に格納されたデータを 消去する処理、端末に接続された外部デバイスに対する命令 (プリントアウトや外部 ディスクへの書き出し等)を禁止する処理などの情報保全のための処理が実行される (S27)。 [0059] On the other hand, if the export approval period is not recorded, or if the current time does not fall within the period specified as the export approval period, the terminal stop process, the OS or application stored in the terminal For information conservation, such as the process of prohibiting program startup, the process of erasing data stored in the terminal, and the process of prohibiting commands to external devices connected to the terminal (printout, writing to an external disk, etc.) Processing is executed (S27).
[0060] 尚、指定のネットワークに接続中と判定された場合であっても、その後に端末が移 動されて不正な環境で利用される可能性もあるため、通常の使用を許可した後にも、 所定のタイミングでネットワーク環境の再確認を行うことが好ま 、。このような端末の 操作が開始された後の確認で引続き指定のネットワークに接続中と判定された場合 や、持出承認期間内に該当することが確認された場合には、 OSは既に起動されて いるために、そのまま通常の使用が許可されて処理が継続される(S28、 S29)。  [0060] Even if it is determined that the terminal is connected to the specified network, the terminal may be moved afterwards to be used in an unauthorized environment. It is preferable to reconfirm the network environment at a predetermined timing. If it is determined that the terminal is still connected to the specified network in the confirmation after the operation of such a terminal is started, or if it is confirmed that it falls within the export approval period, the OS is already started. Therefore, normal use is permitted as it is, and processing continues (S28, S29).
[0061] 図 15では、ステップ 24において指定されたネットワークに接続中であることが確認 されると、そのまま OSの起動等が行われることとされている力 正規の環境に接続さ れた場合であっても持出承認期間の設定の有無を確認し、持出承認期間内に該当 する場合には所定の情報保全処理を行うこととしてもよい。情報保全処理としては、 端末の停止処理、端末に格納された OS又はアプリケーションプログラムの起動を禁 止する処理、端末に格納されたデータを消去する処理、端末に接続された外部デバ イスに対する命令 (プリントアウトや外部ディスクへの書き出し等)を禁止する処理など の他に、端末のネットワークへの接続を停止させる処理が行われる。 [0061] In FIG. 15, when it is confirmed that the network is connected to the specified network in step 24, the OS is booted as it is. Even if it exists, the presence or absence of the export approval period may be confirmed, and if it falls within the export approval period, a predetermined information maintenance process may be performed. As information preservation processing, Processing to stop the terminal, processing to prohibit startup of the OS or application program stored in the terminal, processing to erase data stored in the terminal, instructions to the external device connected to the terminal (printout or to external disk) In addition to the process of prohibiting the writing of data, etc.), the process of stopping the terminal's connection to the network is performed.
[0062] 尚、指定されたネットワークに接続中であるかの確認と、持出承認期間の設定の有 無の確認の順序については特に限定されるものではなぐネットワークに接続中であ るかの確認の後に、いずれの場合であっても持出承認期間の設定の有無を確認す ることとしてもよいし、持出承認期間の設定の有無を先に確認し、持出承認期間が設 定されておらず、かつ正規のネットワークに接続中であることが確認された場合に、 O Sの起動処理等を行うこととしてもょ 、。  [0062] It should be noted that the order of confirming whether it is connected to the specified network and confirming whether or not the export approval period is set is not particularly limited. After confirmation, in any case, it may be possible to confirm whether or not a take-out approval period has been set, or first check whether a take-out approval period has been set and set a take-out approval period. If it is confirmed that it is not connected and connected to a legitimate network, OS startup processing etc. may be performed.
[0063] 次に、情報保全プログラムを OS上で起動する図 16のフローでは、端末の電源をォ ンにすると(S31)、 OSが HDD力も読み出されて起動処理が実行される(S32)。情 報保全プログラムも OSの一部として HDD力 読み出されて起動され (S33)、アプリ ケーシヨンインターフェイス (API)力も OSが特定したドメイン名や IPアドレスなどのネ ットワーク環境に関する情報を取得して(S34)、端末の HDD等に予め記憶された正 規のネットワーク環境と対比して本来指定されたネットワークに接続中か否かを確認 する(S35)。指定されたネットワークに接続中と判定された場合は、通常通りの端末 の使用が許可される(S39)。  [0063] Next, in the flow of FIG. 16 for starting the information maintenance program on the OS, when the terminal is turned on (S31), the OS also reads the HDD power and executes the startup process (S32). . The information maintenance program is also read and started by the HDD as part of the OS (S33), and the application interface (API) also acquires information about the network environment such as the domain name and IP address specified by the OS. (S34), it is checked whether or not it is connected to the originally designated network in comparison with the regular network environment stored in advance in the HDD of the terminal (S35). If it is determined that it is connected to the specified network, use of the terminal as usual is permitted (S39).
[0064] 指定されたネットワークに接続されていないと判定された場合は、レジストリの設定 情報力も持出承認期間を読み出す (S36)。持出承認期間が記録されていて、かつ 現在時が持出承認期間として指定された期間内に該当するかを確認し (S37)、持出 承認期間内に該当する場合には、通常通りの端末の使用が許可される(S39)。  If it is determined that the network is not connected to the designated network, the setting information power of the registry is also read out the export approval period (S36). Check if the export approval period is recorded and the current time falls within the period specified as the export approval period (S37). Use of the terminal is permitted (S39).
[0065] 一方、持出承認期間が記録されていない場合、又は現在時が持出承認期間として 指定された期間内に該当しない場合には、端末の停止処理、端末に格納された OS 又はアプリケーションプログラムの起動を禁止する処理、端末に格納されたデータを 消去する処理、端末に接続された外部デバイスに対する命令 (プリントアウトや外部 ディスクへの書き出し等)を禁止する処理などの情報保全のための処理が実行される (S38)。 [0066] 図 16でも、ステップ 35において指定されたネットワークに接続中であることが確認さ れると、そのまま通常の使用が許可されることとなっている力 正規の環境に接続され た場合であっても持出承認期間の設定の有無を確認し、持出承認期間内に該当す る場合には所定の情報保全処理を行うこととしてもよい。情報保全処理としては、端 末の停止処理、端末に格納された OS又はアプリケーションプログラムの起動を禁止 する処理、端末に格納されたデータを消去する処理、端末に接続された外部デバィ スに対する命令 (プリントアウトや外部ディスクへの書き出し等)を禁止する処理などの 他に、端末のネットワークへの接続を停止させる処理が行われる。 [0065] On the other hand, if the export approval period is not recorded, or if the current time does not fall within the period specified as the export approval period, the terminal stop process, the OS or application stored in the terminal For information conservation, such as the process of prohibiting program startup, the process of erasing data stored in the terminal, and the process of prohibiting commands to external devices connected to the terminal (printout, writing to an external disk, etc.) Processing is executed (S38). [0066] Also in FIG. 16, if it is confirmed that the network is connected to the specified network in step 35, it is the case that the normal use is permitted as it is, and the case is connected to the normal environment. However, it is also possible to check whether or not a take-out approval period is set, and to perform predetermined information maintenance processing if it falls within the take-out approval period. Information preservation processing includes terminal termination processing, processing for prohibiting startup of the OS or application program stored in the terminal, processing for erasing data stored in the terminal, and instructions for external devices connected to the terminal ( In addition to the process of prohibiting printout and writing to an external disk, etc., the process of stopping the terminal's connection to the network is performed.
[0067] 尚、指定されたネットワークに接続中であるかの確認と、持出承認期間の設定の有 無の確認の順序については特に限定されるものではなぐネットワークに接続中であ るかの確認の後に、いずれの場合であっても持出承認期間の設定の有無を確認す ることとしてもよいし、持出承認期間の設定の有無を先に確認し、持出承認期間が設 定されておらず、かつ正規のネットワークに接続中であることが確認された場合に、 通常の使用を許可することとしてもよい。  [0067] Note that there is no particular limitation on the order of confirming whether or not the connection to the specified network is being established, and whether or not the export approval period has been set. After confirmation, in any case, it may be possible to confirm whether or not a take-out approval period has been set, or first check whether a take-out approval period has been set and set a take-out approval period. If it is confirmed that it is not connected and connected to a regular network, normal use may be permitted.
[0068] 次に、情報保全プログラムを OSより先に起動し、かつ OS上でも起動する場合は、 図 17の例のようなフローが実行される。図 17の例では、端末の起動時の確認を図 1 5と同じフローで行い、 OSの起動が許可された後の再確認は、図 16と同じフローで 行うこととしている。  Next, when the information maintenance program is started before the OS and is also started on the OS, a flow like the example of FIG. 17 is executed. In the example of Fig. 17, the confirmation at the time of starting the terminal is performed in the same flow as in Fig. 15, and the reconfirmation after the activation of the OS is permitted is performed in the same flow as in Fig. 16.
[0069] つまり、端末の電源をオンにすると(S41)、情報保全プログラムが ROM又は HDD のブートセクタ力も読み出されて起動される(S42)。情報保全プログラムは、ネットヮ 一クインターフェイスが検出した端末が接続されたネットワーク環境に関する情報を 取得して(S43)、端末の HDD等に予め記憶された正規のネットワーク環境と対比し て本来指定されたネットワークに接続中カゝ否かを確認する(S44)。指定されたネット ワークに接続中と判定された場合は OSの起動処理を実行する(S47)。  [0069] That is, when the terminal is turned on (S41), the information maintenance program is activated by reading out the boot sector power of the ROM or HDD (S42). The information maintenance program acquires information related to the network environment to which the terminal detected by the network interface is connected (S43), and is originally specified in comparison with the regular network environment stored in advance in the HDD of the terminal. It is confirmed whether or not it is connected to the network (S44). If it is determined that it is connected to the specified network, OS startup processing is executed (S47).
[0070] 指定されたネットワークに接続されていないと判定された場合は、レジストリの設定 情報力も持出承認期間を読み出す (S45)。持出承認期間が記録されていて、かつ 現在時が持出承認期間として指定された期間内に該当するかを確認し (S46)、持出 承認期間内に該当する場合については、 OSの起動処理を実行する(S47)。 [0071] 一方、持出承認期間が記録されていない場合、又は現在時が持出承認期間として 指定された期間内に該当しない場合には、端末の停止処理、端末に格納された OS 又はアプリケーションプログラムの起動を禁止する処理、端末に格納されたデータを 消去する処理、端末に接続された外部デバイスに対する命令 (プリントアウトや外部 ディスクへの書き出し等)を禁止する処理などの情報保全のための処理が実行される (S54)。 [0070] If it is determined that the network is not connected to the specified network, the setting information power of the registry is also read out the export approval period (S45). Check if the export approval period is recorded and the current time falls within the period specified as the export approval period (S46), and if it falls within the export approval period, start the OS Processing is executed (S47). [0071] On the other hand, if the export approval period is not recorded, or if the current time does not fall within the period specified as the export approval period, the terminal stop process, the OS or application stored in the terminal For information conservation, such as the process of prohibiting program startup, the process of erasing data stored in the terminal, and the process of prohibiting commands to external devices connected to the terminal (printout, writing to an external disk, etc.) Processing is executed (S54).
[0072] OSが起動すると(S47)、情報保全プログラムが OSの一部として HDD力 読み出 されて起動され(S48)、アプリケーションインターフェイスを用いて OSが特定したネッ トワーク環境に関する情報を取得して(S49)、端末の HDD等に予め記憶された正 規のネットワーク環境と対比して本来指定されたネットワークに接続中か否かを確認 する(S50)。指定されたネットワークに接続中と判定された場合は、通常通りの端末 の使用が許可される(S53)。  [0072] When the OS is started (S47), the information integrity program is read and started as a part of the OS (S48), and the application interface is used to obtain information about the network environment specified by the OS. (S49), it is checked whether or not it is connected to the originally designated network in comparison with the regular network environment stored in advance in the HDD of the terminal (S50). If it is determined that it is connected to the specified network, use of the terminal as usual is permitted (S53).
[0073] 指定されたネットワークに接続されていないと判定された場合は、レジストリの設定 情報力も持出承認期間を読み出す (S51)。持出承認期間が記録されていて、かつ 現在時が持出承認期間として指定された期間内に該当するかを確認し (S52)、持出 承認期間内に該当する場合については、通常通りの端末の使用が許可される(S53 If it is determined that the network is not connected to the designated network, the setting information power of the registry is also read out the export approval period (S51). Check if the export approval period is recorded and the current time falls within the period specified as the export approval period (S52). Use of terminal is allowed (S53
) o ) o
[0074] 一方、持出承認期間が記録されていない場合、又は現在時が持出承認期間として 指定された期間内に該当しない場合には、端末の停止処理、端末に格納された OS 又はアプリケーションプログラムの起動を禁止する処理、端末に格納されたデータを 消去する処理、端末に接続された外部デバイスに対する命令 (プリントアウトや外部 ディスクへの書き出し等)を禁止する処理などの情報保全のための処理が実行される (S54)。  [0074] On the other hand, if the export approval period is not recorded, or if the current time does not fall within the period specified as the export approval period, the terminal stop process, the OS or application stored in the terminal For information conservation, such as the process of prohibiting program startup, the process of erasing data stored in the terminal, and the process of prohibiting commands to external devices connected to the terminal (printout, writing to an external disk, etc.) Processing is executed (S54).
[0075] 尚、図 17のフローにおいては、通常の使用を許可した後についても、所定の間隔 でネットワーク環境の再確認を行うのが好ましいことは、図 15の場合と同様である。  In the flow of FIG. 17, it is preferable to reconfirm the network environment at a predetermined interval even after the normal use is permitted, as in the case of FIG.
[0076] 図 17では、ステップ 44において指定されたネットワークに接続中であることが確認 されると、そのまま OSの起動が行われ、ステップ 50において指定されたネットワーク に接続中であることが確認されると、そのまま通常の使用が許可されることとされてい るが、正規の環境に接続された場合であっても持出承認期間の設定の有無を確認し 、持出承認期間内に該当する場合には所定の情報保全処理を行うこととしてもよい。 情報保全処理としては、端末の停止処理、端末に格納された OS又はアプリケーショ ンプログラムの起動を禁止する処理、端末に格納されたデータを消去する処理、端 末に接続された外部デバイスに対する命令 (プリントアウトや外部ディスクへの書き出 し等)を禁止する処理などの他に、端末のネットワークへの接続を停止させる処理が 行われる。 [0076] In FIG. 17, when it is confirmed that the network is connected to the specified network in Step 44, the OS is started as it is, and it is confirmed that the network is connected to the specified network in Step 50. Normal use is allowed as it is. However, even when connected to a regular environment, the presence / absence of a take-out approval period may be confirmed, and if it falls within the take-out approval period, predetermined information maintenance processing may be performed. Information preservation processing includes terminal stop processing, processing for prohibiting activation of the OS or application program stored in the terminal, processing for erasing data stored in the terminal, instructions for external devices connected to the terminal ( In addition to processing that prohibits printouts and export to external disks, etc., processing to stop the terminal's connection to the network is performed.
[0077] 尚、指定されたネットワークに接続中であるかの確認と、持出承認期間の設定の有 無の確認の順序については特に限定されるものではなぐネットワークに接続中であ るかの確認の後に、いずれの場合であっても持出承認期間の設定の有無を確認す ることとしてもよいし、持出承認期間の設定の有無を先に確認し、持出承認期間が設 定されておらず、かつ正規のネットワークに接続中であることが確認された場合に、 O Sの起動処理や通常の使用の許可を行うこととしてもよい。  [0077] There is no particular limitation on the order of checking whether the network is connected to the specified network and checking whether the export approval period is set. Check whether the network is connected. After confirmation, in any case, it may be possible to confirm whether or not a take-out approval period has been set, or first check whether a take-out approval period has been set and set a take-out approval period. If it is confirmed that it is not connected and connected to a legitimate network, the OS boot process and normal use may be permitted.
[0078] 続いて、図 18を用いて、監視サーバに pingを送信してネットワーク環境を判定する 場合のフローについて説明する。このフローにおいては、正規のネットワーク環境に おいてデータの送受信が可能な監視サーバに pingを送信し、返信の有無によって 正規の環境である力否かを確認する。  Next, a flow for determining a network environment by sending a ping to the monitoring server will be described with reference to FIG. In this flow, a ping is sent to a monitoring server that can send and receive data in a legitimate network environment, and it is checked whether the power is a legitimate environment based on the presence or absence of a reply.
[0079] 端末の電源をオンにすると(S61)、情報保全プログラムが ROM又は HDDのブー トセクタ力 読み出されて起動される(S62)。情報保全プログラムは、正規の環境に おいて同一の LAN等のネットワークに接続されている監視サーバに対して、 pingを 送信する(S63)、端末が正規のネットワーク環境に接続されているか否かは、監視サ ーノくから pingに対する返信がある力否か(S64)〖こより判定される。返信がある場合 には正規のネットワーク環境に接続されて 、ると判定し、 OSが起動されて 、な 、場 合には OSの起動を実行し (S68、 S70)、その後は通常通りの端末の使用が許可さ れる(S69)。  [0079] When the terminal is turned on (S61), the information integrity program is read and activated by the boot sector power of the ROM or HDD (S62). The information integrity program sends a ping to the monitoring server connected to the same network such as the LAN in the normal environment (S63). Whether the terminal is connected to the normal network environment is checked. Whether or not there is a response to the ping from the monitoring server (S64) is judged from this. If there is a reply, it is determined that the device is connected to the regular network environment, and the OS is started. If not, the OS is started (S68, S70), and then the normal terminal Use is permitted (S69).
[0080] pingが返信されない場合には、端末は正規のネットワーク環境とは異なる環境にあ るものと判定され、レジストリの設定情報力 持出承認期間を読み出す (S65)。持出 承認期間が記録されていて、かつ現在時が持出承認期間として指定された期間内 に該当するかを確認し (S66)、持出承認期間内に該当する場合については、 OSが 起動されていない場合には OSの起動処理を実行し (S68、 S70)、その後は通常通 りの端末の使用が許可される(S69)。 [0080] If the ping is not returned, the terminal is determined to be in an environment different from the normal network environment, and the setting information capability take-out approval period in the registry is read (S65). The export approval period is recorded, and the current time is within the period specified as the export approval period. (S66), if it falls within the export approval period, if the OS has not been started, execute OS startup processing (S68, S70), and then continue normally Use of the terminal is permitted (S69).
[0081] 一方、持出承認期間が記録されていない場合、又は現在時が持出承認期間として 指定された期間内に該当しない場合には、端末の停止処理、端末に格納された OS 又はアプリケーションプログラムの起動を禁止する処理、端末に格納されたデータを 消去する処理、端末に接続された外部デバイスに対する命令 (プリントアウトや外部 ディスクへの書き出し等)を禁止する処理などの情報保全のための処理が実行される (S67)。 [0081] On the other hand, if the export approval period is not recorded, or if the current time does not fall within the period specified as the export approval period, the terminal stop process, the OS or application stored in the terminal For information conservation, such as the process of prohibiting program startup, the process of erasing data stored in the terminal, and the process of prohibiting commands to external devices connected to the terminal (printout, writing to an external disk, etc.) Processing is executed (S67).
[0082] 尚、指定のネットワークに接続中と判定され、通常の使用を許可した後においても、 所定のタイミングでネットワーク環境の再確認を行うことが好ましいことは、図 15の場 合と同様である。このような端末の操作が開始された後の確認で引続き指定のネット ワークに接続中と判定された場合や、持出承認期間内に該当することが確認された 場合には、 OSは既に起動されているために、そのまま通常の使用が許可されて処理 が継続される(S68、 S69)。  [0082] It should be noted that it is preferable to reconfirm the network environment at a predetermined timing even after it is determined that the network is connected to the designated network and normal use is permitted, as in FIG. is there. If it is determined that the terminal is still connected to the specified network in the confirmation after the operation of such a terminal is started, or if it is confirmed that it falls within the export approval period, the OS has already started. Therefore, normal use is permitted as it is, and processing continues (S68, S69).
[0083] 図 18では、ステップ 64において pingの返信を受け付けたことが確認されると、その まま OSの起動等が行われることとされて 、るが、正規の環境に接続された場合であ つても持出承認期間の設定の有無を確認し、持出承認期間内に該当する場合には 所定の情報保全処理を行うこととしてもよい。情報保全処理としては、端末の停止処 理、端末に格納された OS又はアプリケーションプログラムの起動を禁止する処理、端 末に格納されたデータを消去する処理、端末に接続された外部デバイスに対する命 令 (プリントアウトや外部ディスクへの書き出し等)を禁止する処理などの他に、端末の ネットワークへの接続を停止させる処理が行われる。  [0083] In FIG. 18, when it is confirmed in step 64 that a ping reply has been received, the OS is started as it is, but this is a case where a normal environment is connected. Therefore, it is also possible to check whether or not a take-out approval period is set, and to perform predetermined information maintenance processing if it falls within the take-out approval period. Information preservation processing includes terminal stop processing, processing for prohibiting activation of the OS or application program stored in the terminal, processing for erasing data stored on the terminal, and instructions for external devices connected to the terminal. In addition to the process of prohibiting printouts, writing to external disks, etc., the process of stopping the terminal's connection to the network is performed.
[0084] 尚、 pingの返信の受付確認と、持出承認期間の設定の有無の確認の順序につ!、 ては特に限定されるものではなぐ pingの返信の受付確認の後に、いずれの場合で あっても持出承認期間の設定の有無を確認することとしてもよいし、持出承認期間の 設定の有無を先に確認し、持出承認期間が設定されておらず、かつ pingが返信され たことが確認された場合に、 OSの起動処理等を行うこととしてもょ 、。 [0085] 尚、監視サーバに pingを送信してネットワーク環境を判定する実施形態について、 図 18では情報保全プログラムを OSより先に起動するパターンを説明したが、図 16、 図 17のフローで説明したのと同様に、情報保全プログラムを OS上で起動するパター ン、情報保全プログラムを OSより先に起動し、かつ OS上でも起動するパターンのい ずれかのパターンを適用することもできる。 [0084] It should be noted that the order of confirmation of ping reply acceptance and confirmation of whether or not the export approval period is set! In any case, after confirming the acceptance of the ping reply, it is possible to check whether or not the export approval period has been set, or to set the export approval period. If it is confirmed that there is no export approval period, and if it is confirmed that a ping has been returned, the OS startup process will be performed. [0085] As for the embodiment for determining the network environment by sending a ping to the monitoring server, FIG. 18 describes the pattern in which the information maintenance program is started before the OS. In the same way, it is possible to apply either the pattern for starting the information maintenance program on the OS, the information protection program starting before the OS, and the pattern for starting on the OS.
図面の簡単な説明  Brief Description of Drawings
[0086] [図 1]本発明にかかる情報保全システムの実施形態の概要を示す図である。 FIG. 1 is a diagram showing an outline of an embodiment of an information maintenance system according to the present invention.
[図 2]本発明にかかる情報保全システムの構成を示すブロック図である。  FIG. 2 is a block diagram showing a configuration of an information maintenance system according to the present invention.
[図 3]本発明にかかる情報保全システムの第 1の運用フローを示す第 1図である。  FIG. 3 is a first diagram showing a first operational flow of the information maintenance system according to the present invention.
[図 4]本発明にかかる情報保全システムの第 1の運用フローを示す第 2図である。  FIG. 4 is a second diagram showing a first operational flow of the information maintenance system according to the present invention.
[図 5]本発明にかかる情報保全システムの第 1の運用フローを示す第 3図である。  FIG. 5 is a third diagram showing a first operational flow of the information maintenance system according to the present invention.
[図 6]本発明にかかる情報保全システムの第 1の運用フローを示す第 4図である。  FIG. 6 is a fourth diagram showing a first operational flow of the information maintenance system according to the present invention.
[図 7]本発明にかかる情報保全システムの第 1の運用フローを示す第 5図である。  FIG. 7 is a fifth diagram showing a first operational flow of the information maintenance system according to the present invention.
[図 8]本発明にかかる情報保全システムの第 2の運用フローを示す第 1図である。  FIG. 8 is a first diagram showing a second operational flow of the information maintenance system according to the present invention.
[図 9]本発明にかかる情報保全システムの第 2の運用フローを示す第 2図である。  FIG. 9 is a second diagram showing a second operational flow of the information maintenance system according to the present invention.
[図 10]本発明にかかる情報保全システムの第 2の運用フローを示す第 3図である。  FIG. 10 is a third diagram showing a second operational flow of the information maintenance system according to the present invention.
[図 11]本発明にかかる情報保全システムの第 2の運用フローを示す第 4図である。  FIG. 11 is a fourth diagram showing a second operational flow of the information maintenance system according to the present invention.
[図 12]本発明にかかる情報保全システムの第 2の運用フローを示す第 5図である。  FIG. 12 is a fifth diagram showing a second operational flow of the information maintenance system according to the present invention.
[図 13]本発明にかかる情報保全プログラムによる、持出承認期間設定の第 1のフロー を示すフローチャートである。  FIG. 13 is a flowchart showing a first flow for setting a take-out approval period by the information maintenance program according to the present invention.
[図 14]本発明にかかる情報保全プログラムによる、持出承認期間設定の第 2のフロー を示すフローチャートである。  FIG. 14 is a flowchart showing a second flow for setting a take-out approval period by the information maintenance program according to the present invention.
[図 15]本発明にかかる情報保全プログラムによる、コンピュータの接続環境をチェック して情報保全の可否を判定する第 1のフローを示すフローチャートである。  FIG. 15 is a flowchart showing a first flow of determining whether or not information maintenance is possible by checking a computer connection environment by the information maintenance program according to the present invention.
[図 16]本発明にかかる情報保全プログラムによる、コンピュータの接続環境をチェック して情報保全の可否を判定する第 2のフローを示すフローチャートである。  FIG. 16 is a flowchart showing a second flow of determining whether or not information maintenance is possible by checking the connection environment of the computer by the information maintenance program according to the present invention.
[図 17]本発明にかかる情報保全プログラムによる、コンピュータの接続環境をチェック して情報保全の可否を判定する第 3のフローを示すフローチャートである。 圆 18]本発明にかかる情報保全プログラムによる、コンピュータの接続環境をチェック して情報保全の可否を判定する第 4のフローを示すフローチャートである。 FIG. 17 is a flowchart showing a third flow in which the information maintenance program according to the present invention checks the computer connection environment and determines whether or not information maintenance is possible. [18] FIG. 18 is a flowchart showing a fourth flow in which the information maintenance program according to the present invention checks the connection environment of the computer and determines whether or not information maintenance is possible.
符号の説明 Explanation of symbols
10 申請者端末 10 Applicant terminal
11 CPU  11 CPU
12 RAM  12 RAM
13 ROM  13 ROM
14 HDD  14 HDD
141 承認申請プログラム  141 Approval application program
142 情報保全プログラム  142 Information Conservation Program
143 承認者情報記憶部  143 Approver information storage
144 申請情報記憶部  144 Application information storage
145 持出期間記憶部  145 Takeout period storage
15 NIC  15 NIC
20 承認者端末  20 Approver terminal
30 監視サーバ  30 Monitoring server

Claims

請求の範囲 The scope of the claims
コンピュータを正規のネットワーク環境と異なる環境において使用する場合に、コン ピュータカ 取得し得る情報を保全するための情報保全プログラムであって、 コンピュータが正規のネットワーク環境において使用されている間に、前記コンビユー タに、  An information security program for preserving information that can be obtained by a computer when the computer is used in an environment different from a normal network environment, wherein the computer is used while the computer is being used in a normal network environment. In addition,
前記コンピュータに記憶された承認者を宛先に指定して、前記コンピュータを正規の 環境以外で使用する持出期間が指定された持出承認のための申請通知を、前記申 請通知を識別する申請 IDを付して送信するステップと、 An application for identifying the application notification, an application notification for carrying-out approval in which the approver stored in the computer is designated as a destination and the computer is used in a non-regular environment and a period for carrying out is specified. Sending with an ID, and
前記申請 ID、前記承認者、前記持出期間を少なくとも含む申請情報を、前記コンビ ユータに記憶させるステップと、 Storing the application information including at least the application ID, the approver, and the export period in the computer;
前記申請通知を受信した承認者が送信した、前記申請 ID、前記申請通知に対する 承認結果を少なくとも含む承認通知を受信するステップと、 Receiving an approval notification transmitted by the approver who has received the application notification, including at least the application ID and an approval result for the application notification; and
前記承認通知に含まれる申請 IDに対応する申請情報を特定し、前記承認通知の送 信者力 前記申請情報に含まれる承認者であるかを判定するステップと、 前記送信者が前記承認者に該当し、かつ前記承認結果が持出を承認するものであ る場合には、前記申請情報に含まれる持出期間を、持出承認期間として前記コンビ ユータの設定情報に記憶させるステップと、を実行させ、 Identifying the application information corresponding to the application ID included in the approval notification and determining whether the sender is an approver included in the application information, and determining whether the sender is the approver And if the approval result approves the export, the step of storing the export period included in the application information as the export approval period in the setting information of the computer is executed. Let
前記コンピュータの起動時においては、前記コンピュータに、 At startup of the computer, the computer
前記コンピュータが正規のネットワーク環境に接続されているかを判定するステップと 前記コンピュータが正規のネットワーク環境に接続されていないと判定された場合に は、前記コンピュータの設定情報に持出承認期間が記憶されているかを確認するス テツプと、 A step of determining whether the computer is connected to a regular network environment; and when it is determined that the computer is not connected to a regular network environment, a take-out approval period is stored in the setting information of the computer. Step to check if
前記持出承認期間が記憶されていると確認された場合には、前記コンピュータの起 動時間が前記持出承認期間の期間内であるかを判定するステップと、 If it is confirmed that the export approval period is stored, the step of determining whether the startup time of the computer is within the export approval period; and
前記持出承認期間が記憶されて ヽな ヽと確認された場合、又は前記コンピュータの 起動時間が前記持出承認期間の期間内でないと判定された場合には、前記コンビュ ータの停止処理、前記コンピュータに格納されたオペレーションシステム又はアプリ ケーシヨンプログラムの少なくとも一部の起動を禁止する処理、前記コンピュータに格 納された少なくとも一部のデータを消去する処理、前記コンピュータに接続された外 部デバイスに対する命令を禁止する処理、の少なくとも一つの処理を起動するステツ プと、 If the take-out approval period is stored and it is confirmed that the take-out approval period is correct, or if it is determined that the start-up time of the computer is not within the period of the take-out approval period, the computer stop process, Operation system or application stored in the computer At least one of a process for prohibiting activation of at least a part of a case program, a process for erasing at least a part of data stored in the computer, and a process for prohibiting an instruction to an external device connected to the computer Steps to start one process,
を実行させることを特徴とする情報保全プログラム。 An information maintenance program characterized by causing
コンピュータを正規のネットワーク環境と異なる環境において使用する場合に、コン ピュータカ 取得し得る情報を保全するための情報保全プログラムであって、 コンピュータが正規のネットワーク環境において使用されている間に、前記コンビユー タに、  An information security program for preserving information that can be obtained by a computer when the computer is used in an environment different from a normal network environment, wherein the computer is used while the computer is being used in a normal network environment. In addition,
承認者の宛先を指定して、前記コンピュータを正規の環境以外で使用する持出期間 が指定された持出承認のための申請通知を、前記申請通知を識別する申請 IDを付 して送信するステップと、 Specify the approver's address, and send out an application notification for export approval that specifies the export period in which the computer is used outside the normal environment, with an application ID that identifies the application notification. Steps,
前記申請 ID、前記持出期間を少なくとも含む申請情報を、前記コンピュータに記憶 させるステップと、 Storing application information including at least the application ID and the take-out period in the computer;
前記申請通知を受信した承認者が送信した、前記申請 ID、前記申請通知に対する 承認結果を少なくとも含む承認通知を受信するステップと、 Receiving an approval notification transmitted by the approver who has received the application notification, including at least the application ID and an approval result for the application notification; and
前記承認通知の送信者が、前記コンピュータに記憶された所定の承認者であるかを 判定するステップと、 Determining whether the sender of the approval notification is a predetermined approver stored in the computer;
前記送信者が前記承認者に該当し、かつ前記承認結果が持出を承認するものであ る場合には、前記承認通知に含まれる申請 IDに対応する申請情報を特定し、前記 申請情報に含まれる持出期間を、持出承認期間として前記コンピュータの設定情報 に記憶させるステップと、を実行させ、 When the sender corresponds to the approver and the approval result approves the export, the application information corresponding to the application ID included in the approval notification is specified, and the application information is included in the application information. Storing the taken-out period included in the setting information of the computer as a take-out approval period,
前記コンピュータの起動時においては、前記コンピュータに、 At startup of the computer, the computer
前記コンピュータが正規のネットワーク環境に接続されているかを判定するステップと 前記コンピュータが正規のネットワーク環境に接続されていないと判定された場合に は、前記コンピュータの設定情報に持出承認期間が記憶されているかを確認するス テツプと、 前記持出承認期間が記憶されていると確認された場合には、前記コンピュータの起 動時間が前記持出承認期間の期間内であるかを判定するステップと、 A step of determining whether the computer is connected to a regular network environment; and when it is determined that the computer is not connected to a regular network environment, a take-out approval period is stored in the setting information of the computer. Step to check if If it is confirmed that the export approval period is stored, the step of determining whether the startup time of the computer is within the export approval period; and
前記持出承認期間が記憶されて ヽな ヽと確認された場合、又は前記コンピュータの 起動時間が前記持出承認期間の期間内でないと判定された場合には、前記コンビュ ータの停止処理、前記コンピュータに格納されたオペレーションシステム又はアプリ ケーシヨンプログラムの少なくとも一部の起動を禁止する処理、前記コンピュータに格 納された少なくとも一部のデータを消去する処理、前記コンピュータに接続された外 部デバイスに対する命令を禁止する処理、の少なくとも一つの処理を起動するステツ プと、  If the take-out approval period is stored and it is confirmed that the take-out approval period is correct, or if it is determined that the start-up time of the computer is not within the period of the take-out approval period, the computer stop process, A process for prohibiting activation of at least a part of the operation system or application program stored in the computer, a process for erasing at least a part of data stored in the computer, and an external device connected to the computer A step of starting at least one of the processes for prohibiting the command to
を実行させることを特徴とする情報保全プログラム。  An information maintenance program characterized by causing
[3] 前記コンピュータが正規のネットワーク環境に接続されて 、るかを判定するステップ において、前記コンピュータに、  [3] In the step of determining whether the computer is connected to a regular network environment,
前記コンピュータが接続されたネットワーク環境に関する第 1の環境情報を取得する ステップと、  Obtaining first environment information relating to a network environment to which the computer is connected; and
前記第 1のネットワーク環境情報を、前記コンピュータに予め記憶された正規のネット ワーク環境に関する第 2の環境情報と比較するステップと、を実行させ、  Comparing the first network environment information with second environment information relating to a regular network environment stored in advance in the computer, and
前記第 1の環境情報が前記第 2の環境情報と一致しない場合に、前記コンピュータ が正規のネットワーク環境に接続されて 、な 、と判定すること  When the first environment information does not match the second environment information, it is determined that the computer is connected to a regular network environment.
を特徴とする請求項 1又は 2記載の情報保全プログラム。  The information maintenance program according to claim 1 or 2, characterized by the above.
[4] 前記コンピュータが正規のネットワーク環境に接続されて 、るかを判定するステップ において、前記コンピュータに、 [4] In the step of determining whether or not the computer is connected to a regular network environment,
前記コンピュータとネットワークを通じて接続された認証サーバに pingを送信するス テツプと、  A step of pinging an authentication server connected to the computer through a network;
前記認証サーバから前記 pingに対する返信の有無を確認するステップと、を実行さ せ、  Checking whether there is a reply to the ping from the authentication server, and
前記 pingに対する返信がないと確認されると、前記コンピュータが正規のネットワーク 環境に接続されて 、な 、と判定すること  When it is confirmed that there is no reply to the ping, the computer is determined to be connected to a normal network environment.
を特徴とする請求項 1又は 2記載の情報保全プログラム。 コンピュータを正規のネットワーク環境と異なる環境において使用する場合に、コン ピュータカ 取得し得る情報を保全するための情報保全方法であって、 The information maintenance program according to claim 1 or 2, characterized by the above. An information security method for preserving information that can be acquired by a computer when the computer is used in an environment different from a regular network environment,
コンピュータが正規のネットワーク環境において使用されている間に、 While the computer is being used in a regular network environment,
前記コンピュータが、前記コンピュータに記憶された承認者を宛先に指定して、前記 コンピュータを正規の環境以外で使用する持出期間が指定された持出承認のため の申請通知を、前記申請通知を識別する申請 IDを付して送信するステップと、 前記コンピュータが、前記申請 ID、前記承認者、前記持出期間を少なくとも含む申 請情報を、前記コンピュータに記憶させるステップと、 The computer designates an approver stored in the computer as a destination, and sends out an application notification for take-out approval in which a take-out period in which the computer is used outside the normal environment is designated. Transmitting with an application ID to be identified, and causing the computer to store application information including at least the application ID, the approver, and the export period;
前記コンピュータが、前記申請通知を受信した承認者が送信した、前記申請 ID、前 記申請通知に対する承認結果を少なくとも含む承認通知を受信するステップと、 前記コンピュータが、前記承認通知に含まれる申請 IDに対応する申請情報を特定し 、前記承認通知の送信者が、前記申請情報に含まれる承認者であるかを判定するス テツプと、 The computer receives an approval notification that includes at least the approval result for the application ID and the application notification transmitted by the approver who has received the application notification; and the computer includes an application ID included in the approval notification. Identifying the application information corresponding to, and determining whether the sender of the approval notification is an approver included in the application information;
前記コンピュータが、前記送信者が前記承認者に該当し、かつ前記承認結果が持出 を承認するものである場合には、前記申請情報に含まれる持出期間を、持出承認期 間として前記コンピュータの設定情報に記憶させるステップと、を有して!/、て、 前記コンピュータの起動時においては、 When the sender corresponds to the approver and the approval result approves the export, the computer uses the export period included in the application information as the export approval period. And storing it in the setting information of the computer! / When the computer starts up,
前記コンピュータ力 前記コンピュータが正規のネットワーク環境に接続されているか を判定するステップと、 Determining whether the computer is connected to a legitimate network environment;
前記コンピュータ力、前記コンピュータが正規のネットワーク環境に接続されていない と判定された場合には、前記コンピュータの設定情報に持出承認期間が記憶されて V、るかを確認するステップと、 If it is determined that the computer power, the computer is not connected to a regular network environment, and whether the export approval period is stored in the setting information of the computer;
前記コンピュータが、前記持出承認期間が記憶されていると確認された場合には、前 記コンピュータの起動時間が前記持出承認期間の期間内であるかを判定するステツ プと、 A step of determining whether the startup time of the computer is within the period of the export approval period when the computer confirms that the export approval period is stored;
前記コンピュータが、前記持出承認期間が記憶されていないと確認された場合、又 は前記コンピュータの起動時間が前記持出承認期間の期間内でないと判定された 場合には、前記コンピュータの停止処理、前記コンピュータに格納されたオペレーシ ヨンシステム又はアプリケーションプログラムの少なくとも一部の起動を禁止する処理 、前記コンピュータに格納された少なくとも一部のデータを消去する処理、前記コンビ ユータに接続された外部デバイスに対する命令を禁止する処理、の少なくとも一つの 処理を起動するステップと、 If the computer confirms that the export approval period is not stored, or if it is determined that the startup time of the computer is not within the export approval period, the computer is stopped. , The operation stored in the computer A process for prohibiting activation of at least a part of a computer system or an application program, a process for erasing at least a part of data stored in the computer, and a process for prohibiting an instruction to an external device connected to the computer A step to start one process,
を有することを特徴とする情報保全方法。 An information maintenance method characterized by comprising:
コンピュータを正規のネットワーク環境と異なる環境において使用する場合に、コン ピュータカ 取得し得る情報を保全するための情報保全方法であって、  An information security method for preserving information that can be acquired by a computer when the computer is used in an environment different from a regular network environment,
コンピュータが正規のネットワーク環境において使用されている間に、 While the computer is being used in a regular network environment,
前記コンピュータが、承認者の宛先を指定して、前記コンピュータを正規の環境以外 で使用する持出期間が指定された持出承認のための申請通知を、前記申請通知を 識別する申請 IDを付して送信するステップと、 The computer designates the approver's address and uses the computer in a non-regular environment. The application notification for the export approval is specified, and the application ID that identifies the application notification is added. And sending and
前記コンピュータが、前記申請 ID、前記持出期間を少なくとも含む申請情報を、前記 コンピュータに記 '慮させるステップと、 The computer causing the computer to consider application information including at least the application ID and the export period;
前記コンピュータが、前記申請通知を受信した承認者が送信した、前記申請 ID、前 記申請通知に対する承認結果を少なくとも含む承認通知を受信するステップと、 前記コンピュータが、前記承認通知の送信者が、前記コンピュータに記憶された所定 の承認者であるかを判定するステップと、 The computer receives an approval notification that includes at least the approval result for the application ID and the application notification transmitted by the approver that has received the application notification, and the computer transmits the approval notification. Determining whether it is a predetermined approver stored in the computer;
前記コンピュータが、前記送信者が前記承認者に該当し、かつ前記承認結果が持出 を承認するものである場合には、前記承認通知に含まれる申請 IDに対応する申請 情報を特定し、前記申請情報に含まれる持出期間を、持出承認期間として前記コン ピュータの設定情報に記憶させるステップと、を有して 、て、 If the sender corresponds to the approver and the approval result approves the export, the computer specifies application information corresponding to the application ID included in the approval notification, and Storing the take-out period included in the application information in the setting information of the computer as a take-out approval period, and
前記コンピュータの起動時においては、 At startup of the computer,
前記コンピュータ力 前記コンピュータが正規のネットワーク環境に接続されているか を判定するステップと、 Determining whether the computer is connected to a legitimate network environment;
前記コンピュータ力、前記コンピュータが正規のネットワーク環境に接続されていない と判定された場合には、前記コンピュータの設定情報に持出承認期間が記憶されて V、るかを確認するステップと、 If it is determined that the computer power, the computer is not connected to a regular network environment, and whether the export approval period is stored in the setting information of the computer;
前記コンピュータが、前記持出承認期間が記憶されていると確認された場合には、前 記コンピュータの起動時間が前記持出承認期間の期間内であるかを判定するステツ プと、 If the computer confirms that the export approval period has been stored, A step of determining whether the startup time of the computer is within the period of the export approval period;
前記コンピュータが、前記持出承認期間が記憶されていないと確認された場合、又 は前記コンピュータの起動時間が前記持出承認期間の期間内でないと判定された 場合には、前記コンピュータの停止処理、前記コンピュータに格納されたオペレーシ ヨンシステム又はアプリケーションプログラムの少なくとも一部の起動を禁止する処理If the computer confirms that the export approval period is not stored, or if it is determined that the startup time of the computer is not within the export approval period, the computer is stopped. , A process for prohibiting activation of at least a part of an operation system or application program stored in the computer
、前記コンピュータに格納された少なくとも一部のデータを消去する処理、前記コンビ ユータに接続された外部デバイスに対する命令を禁止する処理、の少なくとも一つの 処理を起動するステップと、 Starting at least one of a process for erasing at least a part of data stored in the computer and a process for prohibiting an instruction to an external device connected to the computer;
を有することを特徴とする情報保全方法。 An information maintenance method characterized by comprising:
コンピュータを正規のネットワーク環境と異なる環境において使用する場合に、コン ピュータカ 取得し得る情報を保全するためにコンピュータに備えられる情報保全シ ステムであって、  When a computer is used in an environment different from a regular network environment, the information security system provided in the computer to secure information that can be acquired by the computer,
前記コンピュータを正規の環境以外で使用する持出承認を行う権限を有する承認者 の宛先を記憶する承認者記憶手段と、 Approver storage means for storing a destination of an approver having the authority to perform take-out approval to use the computer in a non-regular environment;
正規のネットワーク環境において使用されている間に、前記承認者記憶手段に記憶 された承認者を宛先に指定して、持出期間が指定された前記持出承認のための申 請通知を、前記申請通知を識別する申請 IDを付して送信する申請通知送信手段と 前記申請 ID、前記承認者、前記持出期間を少なくとも含む申請情報を記憶する申 請情報記憶手段と、 While being used in a regular network environment, the approver stored in the approver storage means is designated as the destination, and the application notification for the export approval with the export period specified is An application notification transmitting means for transmitting an application ID for identifying an application notification; an application information storage means for storing application information including at least the application ID, the approver, and the export period;
前記申請通知を受信した承認者が送信した、前記申請 ID、前記申請通知に対する 承認結果を少なくとも含む承認通知を受信する承認通知受信手段と、 An approval notification receiving means for receiving an approval notification transmitted by the approver who has received the application notification, including at least the approval result for the application ID and the application notification;
前記承認通知に含まれる申請 IDに対応する申請情報を前記申請情報記憶手段か ら読み出して、前記承認通知の送信者が、前記申請情報に含まれる承認者であるか を判定する承認者判定手段と、 Approver determination means for reading application information corresponding to the application ID included in the approval notification from the application information storage means and determining whether the sender of the approval notification is an approver included in the application information When,
前記送信者が前記承認者に該当し、かつ前記承認結果が持出を承認するものであ る場合には、前記申請情報に含まれる持出期間を前記申請情報記憶手段から読み 出して、持出承認期間として前記コンピュータの設定情報に記憶する持出承認期間 記憶手段と、 When the sender corresponds to the approver and the approval result approves the export, the export period included in the application information is read from the application information storage means. A take-out approval period storage means for storing in the setting information of the computer as a take-out approval period;
前記コンピュータの起動時において、正規のネットワーク環境に接続されているかを 判定する接続環境判定手段と、 A connection environment determination means for determining whether the computer is connected to a regular network environment at the time of startup of the computer;
正規のネットワーク環境に接続されて 、な 、と判定された場合には、前記設定情報 に持出承認期間が記憶されているかを確認する持出承認期間確認手段と、 前記持出承認期間が記憶されていると確認された場合には、前記コンピュータの起 動時間が前記持出承認期間の期間内であるかを持出承認期間判定手段と、 前記持出承認期間が記憶されて ヽな ヽと確認された場合、又は前記コンピュータの 起動時間が前記持出承認期間の期間内でないと判定された場合には、前記コンビュ ータの停止処理、前記コンピュータに格納されたオペレーションシステム又はアプリ ケーシヨンプログラムの少なくとも一部の起動を禁止する処理、前記コンピュータに格 納された少なくとも一部のデータを消去する処理、前記コンピュータに接続された外 部デバイスに対する命令を禁止する処理、の少なくとも一つの処理を起動する情報 保全手段と、 When it is determined that it is connected to a regular network environment, a take-out approval period confirmation means for confirming whether a take-out approval period is stored in the setting information, and the take-out approval period is stored. If it is confirmed that the start-up time of the computer is within the period of the export approval period, the export approval period determination means and the export approval period are stored. Or when it is determined that the startup time of the computer is not within the period of the export approval period, the computer stop processing, the operation system or application stored in the computer A process for prohibiting the activation of at least a part of the program, a process for erasing at least a part of data stored in the computer, and an external connection to the computer An information protection means for starting at least one of the processes for prohibiting the command to the device,
を備えることを特徴とする情報保全システム。 An information maintenance system comprising:
コンピュータを正規のネットワーク環境と異なる環境において使用する場合に、コン ピュータカ 取得し得る情報を保全するためにコンピュータに備えられる情報保全シ ステムであって、  When a computer is used in an environment different from a regular network environment, the information security system provided in the computer to secure information that can be acquired by the computer,
前記コンピュータを正規の環境以外で使用する持出承認を行う権限を有する承認者 を記憶する承認者記憶手段と、 Approver storage means for storing an approver having the authority to carry out approval for use outside the normal environment of the computer;
正規のネットワーク環境において使用されている間に、承認者を宛先に指定して、持 出期間が指定された前記持出承認のための申請通知を、前記申請通知を識別する 申請 IDを付して送信する申請通知送信手段と、 While being used in a regular network environment, the approver is designated as the destination, and the application notification for the export approval with the export period specified is attached with the application ID for identifying the application notification. An application notification sending means for sending
前記申請 ID、前記持出期間を少なくとも含む申請情報を記憶する申請情報記憶手 段と、 An application information storage means for storing application information including at least the application ID and the export period;
前記申請通知を受信した承認者が送信した、前記申請 ID、前記申請通知に対する 承認結果を少なくとも含む承認通知を受信する承認通知受信手段と、 前記承認通知を送信した承認者が、前記承認者記憶手段に記憶された持出承認を 行う権限を有する承認者であるかを判定する承認者判定手段と、 An approval notification receiving means for receiving an approval notification transmitted by the approver who has received the application notification, including at least the approval result for the application ID and the application notification; An approver determination unit that determines whether the approver who has transmitted the approval notification is an approver having the authority to perform the take-out approval stored in the approver storage unit;
前記承認者が持出承認を行う権限を有する承認者に該当し、かつ前記承認結果が 持出を承認するものである場合には、前記申請情報に含まれる持出期間を前記申請 情報記憶手段から読み出して、持出承認期間として前記コンピュータの設定情報に 記憶する持出承認期間記憶手段と、  When the approver corresponds to an approver having the authority to carry out take-out approval, and the approval result approves take-out, the take-out period included in the application information is set as the application information storage means. A take-out approval period storage means for reading out and storing in the setting information of the computer as a take-out approval period;
前記コンピュータの起動時において、正規のネットワーク環境に接続されているかを 判定する接続環境判定手段と、  A connection environment determination means for determining whether the computer is connected to a regular network environment at the time of startup of the computer;
正規のネットワーク環境に接続されて 、な 、と判定された場合には、前記設定情報 に持出承認期間が記憶されているかを確認する持出承認期間確認手段と、 前記持出承認期間が記憶されていると確認された場合には、前記コンピュータの起 動時間が前記持出承認期間の期間内であるかを持出承認期間判定手段と、 前記持出承認期間が記憶されて ヽな ヽと確認された場合、又は前記コンピュータの 起動時間が前記持出承認期間の期間内でないと判定された場合には、前記コンビュ ータの停止処理、前記コンピュータに格納されたオペレーションシステム又はアプリ ケーシヨンプログラムの少なくとも一部の起動を禁止する処理、前記コンピュータに格 納された少なくとも一部のデータを消去する処理、前記コンピュータに接続された外 部デバイスに対する命令を禁止する処理、の少なくとも一つの処理を起動する情報 保全手段と、  When it is determined that it is connected to a regular network environment, a take-out approval period confirmation means for confirming whether a take-out approval period is stored in the setting information, and the take-out approval period is stored. If it is confirmed that the start-up time of the computer is within the period of the export approval period, the export approval period determination means and the export approval period are stored. Or when it is determined that the startup time of the computer is not within the period of the export approval period, the computer stop processing, the operation system or application stored in the computer A process for prohibiting the activation of at least a part of the program, a process for erasing at least a part of data stored in the computer, and an external connection to the computer An information protection means for starting at least one of the processes for prohibiting the command to the device,
を備えることを特徴とする情報保全システム。  An information maintenance system comprising:
[9] 前記接続環境判定手段は、前記コンピュータが接続されたネットワーク環境に関す る第 1の環境情報を取得し、前記第 1のネットワーク環境情報を、前記コンピュータに 予め記憶された正規のネットワーク環境に関する第 2の環境情報と比較して、前記第 1の環境情報が前記第 2の環境情報と一致しない場合に、前記コンピュータが正規 のネットワーク環境に接続されて 、な 、と判定すること  [9] The connection environment determination unit acquires first environment information related to a network environment to which the computer is connected, and the first network environment information is stored in the normal network environment stored in the computer in advance. When the first environmental information does not match the second environmental information as compared with the second environmental information regarding, the computer is determined to be connected to a normal network environment.
を特徴とする請求項 7又は 8記載の情報保全システム。  The information maintenance system according to claim 7 or 8, characterized in that.
[10] 前記接続環境判定手段は、前記コンピュータとネットワークを通じて接続された認 証サーバに pingを送信し、前記認証サーバ力も前記 pingに対する返信の有無を確 認して、前記 pingに対する返信がないと確認されると、前記コンピュータが正規のネ ットワーク環境に接続されて 、な 、と判定すること [10] The connection environment determining means transmits a ping to an authentication server connected to the computer through a network, and the authentication server power also confirms whether or not there is a reply to the ping. If it is confirmed that there is no reply to the ping, it is determined that the computer is connected to a regular network environment.
を特徴とする請求項 7又は 8記載の情報保全システム。 The information maintenance system according to claim 7 or 8, characterized in that.
PCT/JP2005/020143 2005-11-01 2005-11-01 Information preserving program, information preserving method, and information preserving system WO2007052342A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2005/020143 WO2007052342A1 (en) 2005-11-01 2005-11-01 Information preserving program, information preserving method, and information preserving system
JP2007542189A JPWO2007052342A1 (en) 2005-11-01 2005-11-01 Information preservation program, information preservation method and information preservation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2005/020143 WO2007052342A1 (en) 2005-11-01 2005-11-01 Information preserving program, information preserving method, and information preserving system

Publications (1)

Publication Number Publication Date
WO2007052342A1 true WO2007052342A1 (en) 2007-05-10

Family

ID=38005506

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/020143 WO2007052342A1 (en) 2005-11-01 2005-11-01 Information preserving program, information preserving method, and information preserving system

Country Status (2)

Country Link
JP (1) JPWO2007052342A1 (en)
WO (1) WO2007052342A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009015766A (en) * 2007-07-09 2009-01-22 Nec Corp User terminal, access management system, access management method, and program
JP2009093222A (en) * 2007-10-03 2009-04-30 Fuji Xerox Co Ltd Information processor, information management device, information management system, information processing program and information management program
JP2009289187A (en) * 2008-05-30 2009-12-10 Toshiba Corp Takeout control system, takeout device, management device, takeout program and management program
JP2016038919A (en) * 2014-08-11 2016-03-22 フィッシャー−ローズマウント システムズ,インコーポレイテッド Securing device to process control system
US10503483B2 (en) 2016-02-12 2019-12-10 Fisher-Rosemount Systems, Inc. Rule builder in a process control network
US10551799B2 (en) 2013-03-15 2020-02-04 Fisher-Rosemount Systems, Inc. Method and apparatus for determining the position of a mobile control device in a process plant
US10649424B2 (en) 2013-03-04 2020-05-12 Fisher-Rosemount Systems, Inc. Distributed industrial performance monitoring and analytics
US10649449B2 (en) 2013-03-04 2020-05-12 Fisher-Rosemount Systems, Inc. Distributed industrial performance monitoring and analytics
US10656627B2 (en) 2014-01-31 2020-05-19 Fisher-Rosemount Systems, Inc. Managing big data in process control systems
US10678225B2 (en) 2013-03-04 2020-06-09 Fisher-Rosemount Systems, Inc. Data analytic services for distributed industrial performance monitoring
US10685121B2 (en) 2017-10-17 2020-06-16 Quanta Computer Inc. Secure environment examination
US10866952B2 (en) 2013-03-04 2020-12-15 Fisher-Rosemount Systems, Inc. Source-independent queries in distributed industrial system
US10909137B2 (en) 2014-10-06 2021-02-02 Fisher-Rosemount Systems, Inc. Streaming data for analytics in process control systems
US11385608B2 (en) 2013-03-04 2022-07-12 Fisher-Rosemount Systems, Inc. Big data in process control systems

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001082086A1 (en) * 2000-04-24 2001-11-01 Matsushita Electric Industrial Co., Ltd. Access right setting device and manager terminal
JP2002304373A (en) * 2001-04-05 2002-10-18 Matsushita Electric Ind Co Ltd Method and system for security, safekeeping box and program for it
JP2004118623A (en) * 2002-09-27 2004-04-15 Brother Ind Ltd Electronic device and program
JP2005100141A (en) * 2003-09-25 2005-04-14 Mitsubishi Electric Corp System, method, and program for security management, and recording medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001082086A1 (en) * 2000-04-24 2001-11-01 Matsushita Electric Industrial Co., Ltd. Access right setting device and manager terminal
JP2002304373A (en) * 2001-04-05 2002-10-18 Matsushita Electric Ind Co Ltd Method and system for security, safekeeping box and program for it
JP2004118623A (en) * 2002-09-27 2004-04-15 Brother Ind Ltd Electronic device and program
JP2005100141A (en) * 2003-09-25 2005-04-14 Mitsubishi Electric Corp System, method, and program for security management, and recording medium

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009015766A (en) * 2007-07-09 2009-01-22 Nec Corp User terminal, access management system, access management method, and program
JP2009093222A (en) * 2007-10-03 2009-04-30 Fuji Xerox Co Ltd Information processor, information management device, information management system, information processing program and information management program
US7979467B2 (en) 2007-10-03 2011-07-12 Fuji Xerox Co., Ltd. Information processing device, information management device, information processing system and computer readable medium
JP2009289187A (en) * 2008-05-30 2009-12-10 Toshiba Corp Takeout control system, takeout device, management device, takeout program and management program
US10649449B2 (en) 2013-03-04 2020-05-12 Fisher-Rosemount Systems, Inc. Distributed industrial performance monitoring and analytics
US11385608B2 (en) 2013-03-04 2022-07-12 Fisher-Rosemount Systems, Inc. Big data in process control systems
US10866952B2 (en) 2013-03-04 2020-12-15 Fisher-Rosemount Systems, Inc. Source-independent queries in distributed industrial system
US10649424B2 (en) 2013-03-04 2020-05-12 Fisher-Rosemount Systems, Inc. Distributed industrial performance monitoring and analytics
US10678225B2 (en) 2013-03-04 2020-06-09 Fisher-Rosemount Systems, Inc. Data analytic services for distributed industrial performance monitoring
US10691281B2 (en) 2013-03-15 2020-06-23 Fisher-Rosemount Systems, Inc. Method and apparatus for controlling a process plant with location aware mobile control devices
US11169651B2 (en) 2013-03-15 2021-11-09 Fisher-Rosemount Systems, Inc. Method and apparatus for controlling a process plant with location aware mobile devices
US11573672B2 (en) 2013-03-15 2023-02-07 Fisher-Rosemount Systems, Inc. Method for initiating or resuming a mobile control session in a process plant
US10671028B2 (en) 2013-03-15 2020-06-02 Fisher-Rosemount Systems, Inc. Method and apparatus for managing a work flow in a process plant
US10649413B2 (en) 2013-03-15 2020-05-12 Fisher-Rosemount Systems, Inc. Method for initiating or resuming a mobile control session in a process plant
US10649412B2 (en) 2013-03-15 2020-05-12 Fisher-Rosemount Systems, Inc. Method and apparatus for seamless state transfer between user interface devices in a mobile control room
US10551799B2 (en) 2013-03-15 2020-02-04 Fisher-Rosemount Systems, Inc. Method and apparatus for determining the position of a mobile control device in a process plant
US11112925B2 (en) 2013-03-15 2021-09-07 Fisher-Rosemount Systems, Inc. Supervisor engine for process control
US10656627B2 (en) 2014-01-31 2020-05-19 Fisher-Rosemount Systems, Inc. Managing big data in process control systems
JP2016038919A (en) * 2014-08-11 2016-03-22 フィッシャー−ローズマウント システムズ,インコーポレイテッド Securing device to process control system
US10909137B2 (en) 2014-10-06 2021-02-02 Fisher-Rosemount Systems, Inc. Streaming data for analytics in process control systems
US11886155B2 (en) 2015-10-09 2024-01-30 Fisher-Rosemount Systems, Inc. Distributed industrial performance monitoring and analytics
US10503483B2 (en) 2016-02-12 2019-12-10 Fisher-Rosemount Systems, Inc. Rule builder in a process control network
US10685121B2 (en) 2017-10-17 2020-06-16 Quanta Computer Inc. Secure environment examination

Also Published As

Publication number Publication date
JPWO2007052342A1 (en) 2009-04-30

Similar Documents

Publication Publication Date Title
WO2007052342A1 (en) Information preserving program, information preserving method, and information preserving system
US7546639B2 (en) Protection of information in computing devices
JP4781692B2 (en) Method, program, and system for restricting client I / O access
US8219806B2 (en) Management system, management apparatus and management method
JP4656034B2 (en) Storage device access system
JP5270694B2 (en) Client computer, server computer thereof, method and computer program for protecting confidential file
US8561209B2 (en) Volume encryption lifecycle management
EP2256656A1 (en) Key management to protect encrypted data of an endpoint computing device
US20120233428A1 (en) Apparatus and method for securing portable storage devices
JP4786501B2 (en) Data management system, data management method, information processing apparatus
JP2007280096A (en) Log maintenance method, program, and system
JP2003167606A (en) Programmable controller or programmable display unit and its user authentication method
JP2005234729A (en) Unauthorized access protection system and its method
JP4044126B1 (en) Information leakage prevention device, information leakage prevention program, information leakage prevention recording medium, and information leakage prevention system
JP4948460B2 (en) Data management system
CN113711261A (en) Deadline management server, agent program, and terminal lending system
JP4830576B2 (en) Information processing apparatus, data management method, program
JPH11184756A (en) Security control method in portable information terminal and system therefor and recording medium for programming and recording the same method
JP4683856B2 (en) Authentication program and authentication server
JP4885168B2 (en) External media control method, system and apparatus
TWI470458B (en) A method and device for controlling control
JP2002312316A (en) Unlawful computer access prevention device and method, unlawful computer access prevention program and recording medium
WO2016193176A1 (en) A remotely protected electronic device
JP2001056761A (en) Security management system using card
JP2008181467A (en) Device for preventing outflow of information for portable terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2007542189

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05805423

Country of ref document: EP

Kind code of ref document: A1