WO2011089788A1 - 機密情報漏洩防止システム、機密情報漏洩防止方法及び機密情報漏洩防止プログラム - Google Patents
機密情報漏洩防止システム、機密情報漏洩防止方法及び機密情報漏洩防止プログラム Download PDFInfo
- Publication number
- WO2011089788A1 WO2011089788A1 PCT/JP2010/071838 JP2010071838W WO2011089788A1 WO 2011089788 A1 WO2011089788 A1 WO 2011089788A1 JP 2010071838 W JP2010071838 W JP 2010071838W WO 2011089788 A1 WO2011089788 A1 WO 2011089788A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- server
- client
- network access
- access control
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Definitions
- the present invention relates to a technique for preventing leakage of confidential information, and more particularly, to a technique for preventing leakage of confidential information using multilevel security.
- a multi-level security system (MLS) is known in which a label for specifying a security level is assigned to each access subject and target, and access to the access target is restricted based on the assigned label.
- the multi-level security system attempts to control access to a folder or the like from this application by giving a label indicating “general” or “confidential” to the application, for example.
- An example of a technique for applying such a multilevel security system to a network system is described in Patent Document 1 and Patent Document 2.
- Patent Document 1 Japanese Patent Application Laid-Open No. 2004-220120
- a label indicating a confidential level is attached to a file in a client terminal, and when the client terminal transmits the labeled file to the outside, the transmission management program on the gateway server stores the file
- a network system is disclosed in which a label is checked and a file is transmitted to a network outside the organization when the confidentiality level is non-confidential.
- Japanese Patent Laid-Open No. 2000-174807 discloses a configuration in which a computer system has an operating system kernel that supports a multilevel access control security mechanism for creating an object access packet.
- an object of the present invention is to provide a mechanism that can provide a network-compatible multi-level security system without modifying the operation system of the existing system.
- the present invention is a confidential information leakage prevention system configured such that a client and a server can communicate via a network.
- the client is introduced with network access control means for controlling a network access request transmitted from an application program to the server based on a security level assigned to the application program, and the network access control means.
- First authentication means for executing an authentication process for authenticating this with the server.
- the server includes a second authentication unit that executes an authentication process with the client and permits a network access request transmitted from the client when the authentication process is successful.
- the present invention is a confidential information leakage prevention method in a confidential information leakage prevention system configured such that a client and a server can communicate via a network.
- the client controls a network access request to the server transmitted from an application program based on a security level assigned to the application program, and a network access control program for executing the control step And an authentication step for executing an authentication process for authenticating with the server that the server is installed.
- the server includes an authentication step of executing an authentication process with the client, and a step of permitting a network access request transmitted from the client when the authentication process is successful.
- the present invention controls a network access request to the server transmitted from the application program to a client configured to be able to communicate with the server via the network based on a security level assigned to the application program. And an authentication step for executing an authentication process for authenticating with the server that a network access control program for executing the control step is installed, and causing the server to execute the authentication process. And a step of permitting a network access request transmitted from the client when the authentication process is successful.
- the present invention is also a computer-readable storage medium storing the program.
- the program of the present invention can be installed or loaded on a computer through various recording media such as an optical disk such as a CD-ROM, a magnetic disk, and a semiconductor memory, or via a communication network.
- the term “means” does not simply mean a physical means, but includes a case where the functions of the means are realized by software. Further, the function of one means may be realized by two or more physical means, or the functions of two or more means may be realized by one physical means.
- FIG. 1 It is a figure which shows schematic structure of the confidential information leakage prevention system which concerns on 1st Embodiment. It is a figure which shows an example of the hardware constitutions of the confidential information leakage prevention system which concerns on 1st Embodiment. It is a figure which shows an example of a label allocation list. It is a figure which shows an example of the data structure of a server information storage means. It is a figure which shows an example of the data structure of an access control rule memory
- FIG. 1 is a block diagram showing a schematic configuration of a client / server system to which the confidential information leakage prevention system according to the present embodiment is applied.
- This system includes a client 100 and a server 200, and the client 100 and the server 200 are connected to each other via a network N.
- the client 100 includes a CPU 10 as a control unit that controls processing and operations of the client 100, a memory such as a ROM 11 and a RAM 12, an external storage device (HDD) 13 that stores various information, a communication interface 14, A general-purpose computer including an input interface 15, an output interface 16 such as a display, and hardware such as a bus connecting them can be applied.
- the ROM 11, RAM 12, or external storage device 13 is also simply referred to as a storage device.
- the client 100 functions as various function realizing means such as a label assignment means 102, a network access control means 106, and an authentication means 107, which will be described later, when the CPU 10 executes a predetermined program stored in the memory or the external storage device 13. be able to.
- FIG. 1 illustrates one client 100, a plurality of clients 100 can be connected to the server 200, and the number of clients 100 can be set as appropriate according to the design.
- server 200 is illustrated in FIG. 1, a plurality of servers 200 can be connected to the client 100, and the number of servers 200 can be appropriately set according to the design.
- the client 100 includes a communication unit 101, a label allocation unit 102, an application 103 (general application 103a, confidential application 103b), a server information storage unit 104, an access control rule storage unit 105, a network access control unit 106, Authentication means 107.
- the communication unit 101 is configured to communicate with the server 200 and other devices (not shown) via the network N so as to be able to input and output information, and is also called a communication unit.
- a communication unit For example, an existing communication module such as a network interface card (NIC) or a TCP / IP driver is provided.
- the label assigning means 102 is configured to be able to assign information indicating a security level (hereinafter referred to as “label”) to the application 103, and is also called a label assigning unit.
- label information indicating a security level
- a list label allocation list
- the application 103 and a label allocated to the application 103 are associated with each other can be stored in a predetermined storage area.
- FIG. 3 shows an example of the data structure of the label assignment list, in which a process ID (process number) for identifying an application and a label assigned to the application are stored in association with each other.
- the label assigning means 102 when receiving an inquiry about a label assigned to a predetermined application from the network access control means 106, the label assigning means 102 is configured to be able to read and notify the label assigned to the application from the label assignment list. .
- the label assigned by the label assigning unit 102 can also be used when information distribution within the client 100 from the confidential application 103b to the general application 103a is prohibited.
- Application 103 is application software that provides a user with a predetermined function by being stored in the external storage device 13 and executed by the CPU 10.
- the application 103 for example, existing software having an editor having a document creation function, a browser having an information browsing function, or the like can be applied, and is distinguished according to the contents of the label.
- the application 103 is classified into an application (general application) 103a to which a general label is assigned and an application (confidential application) 103b to which a confidential label is assigned.
- the server information storage unit 104 is a storage device that stores server information (also referred to as access target management information) that associates the access target of the application 103 with the label information assigned to the access target. It has a function and is also called a server information storage unit.
- server information storage unit 104 receives a predetermined request including information for specifying an access target from the network access control unit 106, the server information storage unit 104 searches the server information for a label assigned to the access target and sends it to the network access control unit 106. It is configured to notify search results.
- server information also referred to as access target management information
- the server information storage unit 104 searches the server information for a label assigned to the access target and sends it to the network access control unit 106. It is configured to notify search results.
- two types of “general” and “confidential” can be assigned to the label assigned to the access target, but the content of the label is not limited to this, and can be appropriately set according to the design.
- FIG. 4 shows an example of the data structure of the server information storage means 104.
- the server information storage means 104 stores server / folder information, and when the access target is the secret folder of server A (serversecretA / secret_folder), “secret” is displayed on the label. If it is assigned and is a general folder of server A (serverfoldA / public_folder B), “general” is assigned to the label.
- the data structure of the server information storage means 104 is not limited to this.
- the IP address may be used in place of the server name as information that can be uniquely identified, and if the security level is two levels of “confidential” and “general”, specify only the confidential folder, Others may be regarded as general folders.
- the access control rule storage unit 105 is a storage device that stores information (access control rule) for restricting access to an access target by the application 103, and is also called an access control rule storage unit. Although there is no particular limitation, the access control rule storage unit 105 stores, for example, the contents of access control restrictions associated with each access target in association with each application. The contents of restriction can be set / changed appropriately according to the design.
- FIG. 5 shows an example of the data structure of the access control rule storage means. As shown in the figure, in the confidential application, “access permission” is set in association with the confidential folder, and “read permission” is set in correspondence with the general folder. On the other hand, in the general application, “access prohibition” is set in association with the confidential folder, and “access permission” is set in association with the general folder.
- the network access control means 106 includes a network monitoring means 106a (hereinafter referred to as “monitoring means”) that monitors network communication executed through the communication means 101, and an access control means 106b that executes access control for the application. It is also called a network access control unit.
- the network access control means 106 is, for example, a program (network access control program) that is stored in the external storage device 13 or the like and is executed by the CPU 10 to provide a function for monitoring network communication or a function for executing access control for applications. ).
- the monitoring unit 106a monitors all network accesses by the application 103 and is also called a monitoring unit.
- the monitoring unit 106a can be realized by monitoring events by applying a conventional technique such as a filter driver such as a TDI (Transport Driver Interface) driver or an NDIS (Network Driver Interface Specification) driver.
- FIG. 6 is a diagram showing an example of the implementation of the monitoring unit 106a.
- the access control unit 106b is configured to be able to execute access control for an application when the monitoring unit 106a detects network access by the application 103, and is also referred to as an access control unit. Specifically, the access control unit 106b extracts application specifying information (for example, process ID) for specifying an application from the detected access and access target information (for example, file name) for specifying the access target, Based on the ID, an application label is acquired from the label assigning unit 102. Further, the label of the access target (for example, folder) is acquired from the server information storage unit 104 based on the access target information. Then, access control to the application 103 is performed by referring to the access control rule from the access control rule storage unit 105 based on the acquired label of the application 103 and the label of the folder 204.
- application specifying information for example, process ID
- access target information for example, file name
- the access control means 106b holds a list of servers in which the authentication means 202 has been installed (required authentication server list) in a predetermined storage area, and refers to this authentication required server list to determine whether authentication is necessary. Is configured to determine.
- FIG. 7 is a diagram illustrating an example of the data structure of the authentication-required server list. Although there is no particular limitation on the structure of the authentication server required list, for example, an IP address and a DNS name are stored as information that can uniquely identify the server.
- the access control means 106b holds an authentication key for proving that the network access control means 106 is installed in a predetermined storage area.
- This predetermined key is the same as the authentication key held by the authentication unit 202 of the server 200.
- the authentication unit 107 is for authenticating that the network access control unit 106 is installed in the client 100, and is configured to be able to execute an authentication process with the server 200, and is also called an authentication unit.
- the authentication unit 107 communicates with the authentication unit 202 of the server 200 using the authentication key held by the network access control unit 106 to perform authentication processing.
- the authentication unit 107 notifies the network access control unit 106 of the result of the authentication process.
- the authentication process is not particularly limited in its method, but here, as an example, the authentication process according to the challenge response formula is executed. Details of the authentication process will be described later.
- the authentication unit 107 is configured to determine whether or not the network access control unit 106 is operating.
- the determination as to whether or not the network access control means 106 is operating is not particularly limited, but for example, a process list being executed is acquired from the operating system, and the network access control means 106 is added to the acquired process list. This is done by checking whether or not the process ID is included.
- the server 200 includes a communication unit 201, an authentication unit 202, a server application 203, and a folder 204 (a general folder 204a and a confidential folder 204b).
- the server 200 is a general-purpose device including a CPU that controls processing and operations of the server 200, a memory such as a ROM and a RAM, an external storage device that stores various types of information, a communication interface, an input / output interface, and a bus that connects them.
- a server computer can be applied.
- the hardware configuration of the server computer is the same as the hardware configuration of the client 100 described with reference to FIG.
- the communication unit 201 communicates with the client 100 and other devices (not shown) via the network N and is configured to be able to input and output information, and is also called a communication unit.
- a communication unit For example, an existing communication module such as a network interface card (NIC) or a TCP / IP driver is provided.
- the authentication unit 202 is configured to be able to execute an authentication process with the client 100 in order to authenticate that the network access control unit 106 is installed in the client 100, and is also called an authentication unit. Specifically, the authentication unit 202 holds the same key as the authentication key held by the network access control unit 106 of the client 100, and uses this authentication key to authenticate the client. Is configured to perform authentication processing.
- the authentication unit 202 is configured to create a list of clients that have been successfully authenticated (authenticated client list).
- FIG. 8 is a diagram illustrating an example of the configuration of the authenticated client list.
- the data structure of the authenticated client list is not particularly limited, but as shown in the figure, the IP address of the client is stored as identification information for uniquely identifying the authenticated client.
- the authentication unit 202 adds the client to the authenticated client list.
- the valid time (remaining valid time) of the client as an authenticated client is also stored in association with the IP address. This remaining effective time will be described later.
- the authentication unit 202 monitors the network access to the server application 203 and, when detecting the network access, determines whether or not the client that performs the network access is included in the authenticated client list, and based on the determination result. And determining whether to permit the network access. Specifically, if the client that performs network access is included in the authenticated client list, the authentication unit 202 permits the network access, while the client that performs network access is not included in the authenticated client list. Prohibits the network access.
- the server application 203 is a program that provides a network service, is stored in an external storage device or the like, and is executed by the CPU. Although there is no particular limitation, for example, an existing program that implements FTP, CIFS, or the like is applicable.
- the folder 204 stores data to be accessed and is also called a directory.
- the folder 204 is distinguished by an assigned label.
- the folder 204 is classified into a folder (general folder) 204a to which a general label is assigned and a folder (secret folder) 204b to which a sensitivity label is assigned. . That is, general information is stored in the general folder, and confidential information is stored in the confidential folder.
- the content of the label is not limited to this, and can be set as appropriate according to the design.
- the correspondence between the folder 204 and the label is stored in the server information storage unit 104 (FIG. 4).
- the network N is a line for transmitting and receiving information between the client 100 and the server 200.
- the network N may be, for example, the Internet, a dedicated line, a packet communication network, a telephone line, a LAN, a corporate network, other communication lines, a combination thereof, or the like. It doesn't matter.
- the monitoring unit 106a of the network access control unit 106 starts monitoring network communication at a predetermined timing such as power-on, for example.
- the application 103 (103a or 103b) executed by the control means (CPU) starts access to the access target on the designated network, for example, in accordance with an operation instruction by the user (step S1).
- the monitoring unit 106a of the network access control unit 106 hooks network access (or network access event) by the application 103 (103a or 103b) (step S2).
- the access control means 106b of the network access control means 106 acquires, for example, a process number as application information for specifying an application from the hooked access, and attempts to perform network access based on this process number.
- the label allocation unit 102 is inquired about the label of the application 103 (103a or 103b) (step S3).
- the label allocation unit 102 searches the label allocation list (see FIG. 3) for the label allocated to the application 103 (103a or 103b), and notifies the access control unit 106b of the search result. (Step S4)
- the access control means 106b obtains the label of the application 103 from the label assignment means 102, the access control means 106b obtains access destination information for identifying the access destination from the hooked access, and based on this access destination information, the access destination folder 204 (204a Further, the server information storage means 104 is inquired about the label assigned to 204b) (step S5). For example, when the network access is file sharing, the server name and the folder name of the access destination can be acquired as the access destination information.
- the server information storage unit 104 searches for the label of the folder specified by the access destination information from the database (see FIG. 4) stored therein, and notifies the access control unit 106b of the search result (step S6).
- the access control means 106b Upon obtaining the label of the application 103 (103a or 103b) and the label of the access destination folder, the access control means 106b refers to the access control rule (see FIG. 5) stored in the access control rule storage means 105, and Whether or not network access is possible is determined (step S7).
- the application when the application is a confidential label and the access destination folder is also a confidential label, access is permitted. If the application is a general label and the access destination folder is also a general label, access is permitted. When the application is a general label and the access destination folder is a confidential label, access is prohibited. When the application is a confidential label and the access destination folder is a general label, only reading is permitted.
- the access control means 106b determines whether or not the access destination is on the authentication server list (see FIG. 7), for example, to determine whether the access destination is on the server 200. To determine whether authentication is required. If the access control unit 106b determines that the access destination is on the authentication-required server list, the access control unit 106b determines that authentication is necessary, and requests authentication from the authentication unit 107 (step S7). On the other hand, if the access destination is not included in the authentication server list requiring access, the access control means 106b determines that authentication is not required and permits network access (step S10). If access is prohibited in step S7, the access control means 106b terminates the process without determining whether or not the access destination is on the authentication-required server list (see FIG. 7).
- the authentication means 107 When authentication is requested by the access control means 106b, the authentication means 107 performs authentication processing with the server-side authentication means 202 that the network access control means 106 has been introduced and is operating. Details of the authentication process will be described later.
- the authentication means 107 on the server 200 side succeeds in the authentication that the network access control means 106 is installed and operating between the authentication means 107 on the client 100 side and the authentication means 202 on the server 200 side,
- the client 100 is added to the authenticated client list (step S8).
- the authentication unit 107 on the client 100 side notifies the access control unit 106b that the authentication is successful, the access control unit 106b permits network access based on the notification, and the application 103 is the server application 203 of the server 200. And network communication (step S10).
- the server-side authentication unit 202 Upon receiving an access (connection request) from the application 103, the server-side authentication unit 202 confirms whether or not the client 100 has been authenticated, and if authenticated, permits access from the application 103. The hooked event is executed (step S11). On the other hand, if the authentication in step S8 fails, the authentication unit 202 determines that the client has not been authenticated, and prohibits access from the application 103 (step S11).
- the server-side authentication unit 202 monitors network access from the application to the server application 203.
- the client When the access is hooked (detected), the client is included in the authenticated client list (see FIG. 8). If it is included, communication is permitted. If it is not included, communication is not permitted (packet is discarded). For example, when communication is performed using IP, communication is permitted when the source IP address is included in the authenticated client list, and communication is not permitted when the source IP address is not included.
- the server-side authentication unit 202 When the server-side authentication unit 202 receives an access from a client in which the network access control unit 106 is not installed, the client 100 is not registered in the authenticated client list, so that the application 103 determines that it is not authenticated. Access is prohibited.
- the server 200 may process the access according to the label according to the conventional technique.
- step S8 the authentication process in step S8 will be described in detail with reference to FIG.
- the authentication method is not limited to this, and other authentication methods can be appropriately employed depending on the design or the like.
- the authentication unit 107 on the client 100 side generates a first challenge code and transmits it to the authentication unit 202 on the server side.
- the first challenge code can be generated using, for example, a random number (step S20).
- the authentication means 202 on the server 200 side Upon receiving the first challenge code, the authentication means 202 on the server 200 side generates a first response code from the first challenge code using the key stored in the server 200 (step S21).
- the first response code can be obtained by converting the key and the first challenge code using a hash function such as SHA1 or MD5.
- the authentication unit 202 generates a second challenge code (step S22).
- the second challenge code can be generated using, for example, a random number.
- the authentication unit 202 transmits the generated first response code and the generated second challenge code to the authentication unit 107 on the client 100 side (step S23).
- the authentication unit 107 on the client 100 side acquires a key from the network access control unit 106 (step S24).
- the authentication unit 107 on the client 100 side generates a correct first response code from the first challenge code generated in S20 and the key acquired from the network access control unit 106 (step S25).
- the authentication unit 107 on the client 100 side compares the correct first response code generated in S25 with the first response code received from the authentication unit 202 on the server 200 side, and confirms whether or not they match. (Step S26).
- the authentication unit 107 on the client 100 side ends the processing as an authentication failure (not shown). If the two match, the authentication unit 107 on the client 100 side generates a second response code for the second challenge code received from the authentication unit 202 on the server 200 side using the key acquired from the network access control unit 106. (Step S27).
- the authentication unit 107 can obtain the second response code by converting the key and the second challenge code using, for example, a hash function such as SHA1 or MD5.
- the authentication unit 107 acquires the process list being executed from the operating system, and determines whether the network access control unit 106 is on the process list based on the process ID of the network access control unit 106. Then, it is determined whether or not the network access control means 106 is operating (step S28).
- the authenticating means 107 transmits the second response code generated in S27 to the authenticating means 202 on the server side 200 when the judgment result in step S28 is correct (step S29). On the other hand, if the determination result in step S28 is NO, the process ends as an authentication failure (not shown).
- the authentication unit 202 on the server 200 side Upon receiving the second response code, the authentication unit 202 on the server 200 side generates a correct second response code from the second challenge code and key generated in S22 (step S30).
- the authentication unit 202 on the server 200 side compares the generated correct second response code with the first response code received from the authentication unit 107 on the client 100 side, and confirms whether or not they match (step S31). .
- the authentication unit 202 terminates the process as an authentication failure (not shown). If the two match, the authentication unit 202 sets the authentication as successful and records the client 100 as authenticated in the authenticated client list. For example, when communicating using IP, identification information (for example, IP address, DNS name, machine name, etc.) that uniquely identifies the client 100 is recorded in the authenticated client list (see FIG. 8). (Step S32).
- identification information for example, IP address, DNS name, machine name, etc.
- the network access control means 106 is installed and operating in the client 100. Therefore, access control is performed on the client 100 side. Can be guaranteed to do. As a result, since it is not necessary to add a label to the packet on the client 100 side, it is possible to provide a network-compatible multi-level security system without modifying the operation or the like.
- the network access control means 106 of the client 100 holds the key, and at the time of authentication, the key is passed from the network access control means 106 to the authentication means 107, so that the client The server 200 can more reliably authenticate that the network access control means 106 is installed in the server 100.
- the authentication unit 107 of the client 100 confirms whether or not the network access control unit 106 is included in the process list of the operating system. It is possible to confirm that 100 network access control means 106 are operating.
- the authenticated client list can further store the remaining time during which authentication is valid.
- the authentication unit 202 on the server 200 side subtracts the valid time according to a predetermined timing (for example, every second), and when the valid time becomes 0, the authentication unit 202 deletes the entry from the list. Also good. Further, before the effective time becomes 0, the authentication processing may be performed again to reset the authentication effective time. In this case, since authentication is performed at regular intervals, it is possible to prevent the legitimate client 100 or server 200 from being replaced with an unauthorized client or server.
- the authenticated client list of the authentication unit 202 and the authenticated server list of the authentication unit 107 may record not only the IP address and name but also the port number used by the application 103 of the client 100. .
- the entry may be deleted from the authenticated client list or the authenticated server list based on the port number. In the case of this operation, since re-authentication is performed only while the application 103 performs communication, unnecessary re-authentication can be avoided.
- the label is classified into two types, confidential and general, but two or more types of labels may be used.
- four types of labels such as confidential, confidential, confidential, and unclassified may be assigned.
- the network access control means 106 like a general multilevel security system, transfers information from the application 103 or folder 204 having a low security level label to the application 103 or folder 204 having a high security level label. Prohibit distribution.
- the network access control unit 106 has described the case where the network access of the hooked application 103 is permitted in S10 in FIG. 9, but encryption or log recording is performed according to the label. You may perform processes, such as. According to this, it is possible to provide a system capable of controlling the security function according to the security level.
- the network access control unit 106 controls reading / writing with respect to the folder 204.
- the contents of the network access control are not limited to this.
- the network access control means 106 may control transmission / reception with respect to the mail address. Further, the communication of the server 200 to the process may be controlled.
- a database in which the above-described authentication server list of the network access control unit 106 and the label information of the folder of the server information storage unit 104 are recorded is defined for each user. It can be configured to switch. With this operation, access control according to the user can be performed.
- the authentication unit 107 of the client 100 and the authentication unit 202 on the server 200 side may confirm that the network access control unit 106 has not been tampered with at a predetermined timing during the authentication process.
- the confirmation method is not particularly limited.
- the authentication unit 107 transmits the execution binary hash value of the network access control unit 106 to the authentication unit 202 on the server 200 side.
- the authentication unit 202 on the server 200 side compares the hash value received from the authentication unit 107 with the hash value of the execution binary stored in the network access control unit 106 in advance, and determines whether or not they match. If the two match, the authentication unit 202 confirms that the network access control unit 106 has not been tampered with. On the other hand, if the two do not match, the authentication unit 202 determines that the network access control unit 106 has been tampered with, and ends the processing as an authentication failure.
- the access control unit 106b holds the authentication server list required and determines whether or not authentication is required by referring to the authentication server list is required.
- the method to do is not limited to this.
- the access control unit 106b can determine whether authentication is necessary by using server / folder information (see FIG. 4) held by the server information storage unit 104. Specifically, the access control unit 106b acquires server / folder information of the access destination server from the server information storage unit 104, and when the acquired folder information includes a confidential folder, the server stores the confidential folder. Since it is held, it can be determined that the server requires authentication.
- the authentication unit 107 has been described with respect to the case where the introduction check of the network access control unit 106 using a key and the operation check of the network access control unit 106 using a process list are performed. It may be. Specifically, the authentication unit 107 can execute the process of step S29 by omitting the process of step S28 after executing the process of step S27 of FIG. According to this, there is an effect that the authentication process can be performed at a higher speed.
- the client 100 further includes a setting reception unit 110
- the server 200 further includes a setting reception unit 210
- the setting transmission server 300 includes a setting transmission unit 301. Different from the first embodiment.
- the setting transmission unit 301 of the setting transmission server 300 includes server information stored in the database of the server information storage unit 104, an authentication server list of the network access control unit 106, and an authentication key of the network access control unit 106. Each of them is stored inside and is transmitted to the setting receiving means 110 of the client 100. Further, the authentication key is transmitted to the setting receiving unit 210 of the server 200.
- the setting receiving unit 110 of the client 100 receives the server information, the authentication required server list, the server information stored in the database of the server information storage unit 104 when receiving the key, and the authentication required server list of the network access control unit 106. Update each authentication key.
- the setting receiving unit 210 of the server 200 receives the authentication key
- the setting receiving unit 210 updates the key held by the authentication unit 202.
- the second embodiment it is possible to remotely update the server information stored in the server information storage unit 104, the authentication server list required for the network access control unit 106, and the key used for authentication.
- the management can be made efficient.
- the confidential information leakage prevention system, the confidential information leakage prevention method, and the confidential information leakage prevention program according to the present invention are suitable for providing a network-compatible multi-level security system without modifying the operation system of the existing system. .
- SYMBOLS 10 CPU, 11 ... ROM, 12 ... RAM, 13 ... External storage device, 14 ... Communication interface, 15 ... Input interface, 16 ... Output interface, 100 ... Client, 101 ... Communication means, 102 ... Label allocation means, 103 ... Application 103a ... General application 103b Confidential application 104 Server information storage means 105 Access control rule storage means 106 Network access control means 106a Monitoring means 106b Access control means 107 Authentication means DESCRIPTION OF SYMBOLS 110 ... Setting receiving means, 200 ... Server, 201 ... Communication means, 202 ... Authentication means, 203 ... Server application, 204 ... Folder, 204a ... General folder, 204b ... Confidential folder, 210 ... Setting receiving means, 300 ... Setting Transmission server, 301 ... setting transmission means, N ... Network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Description
図1は、本実施形態に係る機密情報漏洩防止システムが適用されるクライアント・サーバシステムの概略構成を示すブロック図である。本システムは、クライアント100とサーバ200とを含み、クライアント100とサーバ200はネットワークNを介して相互に接続される。
図9を参照して、本実施形態に係る機密情報漏洩防止処理について説明する。なお、図9及び図10に示すフローチャートに示す各処理ステップは処理内容に矛盾を生じない範囲で任意に順番を変更して又は並列に実行することができる。また、各処理ステップ間に他のステップを追加してもよい。また、便宜上1ステップとして記載されているステップは、複数ステップに分けて実行することができる一方、便宜上複数ステップに分けて記載されているものは、1ステップとして把握することができる。
次に、ステップS8の認証処理について、図10を参照して詳細に説明する。なお、本実施形態では、チャレンジレスポンス方式により相互認証を行う場合について説明するが、認証方式はこれに限られず、設計等に応じて他の認証方式を適宜採用することができる。
上記の説明では、サーバ200側の認証手段202のみが認証済みクライアントリストを保持したが、クライアント100側の認証手段107も、認証済みのサーバ200のIPアドレスや名前が記録された認証済みサーバリストを保持してもよい。この場合、既に認証済みのサーバへの通信は、認証を省略することによって、高速に通信が可能になる効果がある。
次に、第2の実施形態について図11を参照して詳細に説明する。第1の実施形態と同様箇所については、説明を省略する。第2の実施形態では、図11に示すように、クライアント100が、設定受信手段110、サーバ200が設定受信手段210をさらに備え、設定送信サーバ300が設定送信手段301を備えている点が、第1の形態と異なっている。
Claims (7)
- クライアントとサーバがネットワークを介して通信可能に構成される機密情報漏洩防止システムであって、
前記クライアントは、
アプリケーションプログラムから送信される前記サーバへのネットワークアクセス要求を、当該アプリケーションプログラムに割り当てられているセキュリティレベルに基づいて制御するネットワークアクセス制御手段と、
前記ネットワークアクセス制御手段が導入されていることを前記サーバとの間で認証する認証処理を実行する第1認証手段と、を有し、
前記サーバは、
前記クライアントとの間で認証処理を実行し、当該認証処理が成功した場合に、前記クライアントから送信されるネットワークアクセス要求を許可する第2認証手段を有する、
ことを特徴とする機密情報漏洩防止システム。 - 前記第1認証手段は、
前記ネットワークアクセス制御手段が保持する鍵を用いて前記第2の認証手段との間で前記認証処理を実行することを特徴とする請求項1に記載の機密情報漏洩防止システム。 - 前記第1認証手段は、
第1の乱数を利用して生成した第1チャレンジコードを前記サーバへ送信する第1送信手段と、
前記サーバより送信された、前記第1チャレンジコードに基づく第1レスポンスコードと、第2チャレンジコードと、を受信する第1受信手段と、
前記ネットワークアクセス制御手段が保持する第1の鍵と、前記生成した第1チャレンジコードとに基づいて、第1レスポンスコードを生成する第1レスポンスコード生成手段と、
前記第1受信手段が受信した第1レスポンスコードと、前記第1レスポンスコード生成手段が生成した第1レスポンスコードとが一致するか否かを判定する第1判定手段と、
前記第1判定手段による判定結果が是である場合、前記第1受信手段が受信した第2チャレンジコードから生成した第2レスポンスコードを前記サーバへ送信する第2送信手段と、を備え、
前記第2認証手段は、
前記クライアントより送信された第1チャレンジコードから前記第2認証手段が保持する第2の鍵を用いて生成した第1レスポンスコードと、第2の乱数を利用して生成した第2チャレンジコードとを、前記クライアントへ送信する第3送信手段と、
前記クライアントから送信された、前記第2チャレンジコードに基づく第2レスポンスコードを受信する第2受信手段と、
前記第2の鍵と前記生成した第2チャレンジコードとに基づいて、第2レスポンスコードを生成する第2レスポンスコード生成手段と、
前記クライアントから送信された第2レスポンスコードと、前記第2レスポンスコード生成手段が生成した第2レスポンスコードとが一致するか否かを判定し、判定結果が是である場合に、前記認証処理が成功したとする第2判定手段と、
を備えることを特徴とする請求項1に記載の機密情報漏洩防止システム。 - 前記第1認証手段は、
前記ネットワークアクセス制御手段が動作していることを条件に、前記サーバとの間で前記認証処理を実行することを特徴とする請求項1乃至3いずれか1項に記載の機密情報漏洩防止システム。 - 前記第1認証手段は、
オペレーティングシステムから実行中のプロセスリストを取得し、当該取得したプロセスリストに前記ネットワークアクセス制御手段が含まれている否かを確認することにより、前記ネットワークアクセス制御手段が動作しているか否かを判断することを特徴とする請求項4に記載の機密情報漏洩防止システム。 - クライアントとサーバがネットワークを介して通信可能に構成される機密情報漏洩防止システムにおける機密情報漏洩防止方法であって、
前記クライアントは、
アプリケーションプログラムから送信される前記サーバへのネットワークアクセス要求を、当該アプリケーションプログラムに割り当てられているセキュリティレベルに基づいて制御する制御ステップと、
前記制御ステップを実行するためのネットワークアクセス制御プログラムが導入されていることを前記サーバとの間で認証する認証処理を実行する第1認証ステップと、を有し、
前記サーバは、
前記クライアントとの間で認証処理を実行する第2認証ステップと、
前記認証処理が成功したる場合に、前記クライアントから送信されるネットワークアクセス要求を許可するステップと、を有する、
ことを特徴とする機密情報漏洩防止方法。 - サーバとネットワークを介して通信可能に構成されるクライアントに、
アプリケーションプログラムから送信される前記サーバへのネットワークアクセス要求を、当該アプリケーションプログラムに割り当てられているセキュリティレベルに基づいて制御する制御ステップと、
前記制御ステップを実行するためのネットワークアクセス制御プログラムが導入されていることを前記サーバとの間で認証する認証処理を実行する第1認証ステップと、実行させ、
前記サーバに、
前記クライアントとの間で認証処理を実行する第2認証ステップと、
前記認証処理が成功した場合に、前記クライアントから送信されるネットワークアクセス要求を許可するステップと、を実行させるためのプログラム。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/522,898 US20120291106A1 (en) | 2010-01-19 | 2010-06-12 | Confidential information leakage prevention system, confidential information leakage prevention method, and confidential information leakage prevention program |
CN201080061850.2A CN102713926B (zh) | 2010-01-19 | 2010-12-06 | 机密信息泄露防止系统及方法 |
JP2011550802A JP5704518B2 (ja) | 2010-01-19 | 2010-12-06 | 機密情報漏洩防止システム、機密情報漏洩防止方法及び機密情報漏洩防止プログラム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010-009124 | 2010-01-19 | ||
JP2010009124 | 2010-01-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011089788A1 true WO2011089788A1 (ja) | 2011-07-28 |
Family
ID=44306605
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2010/071838 WO2011089788A1 (ja) | 2010-01-19 | 2010-12-06 | 機密情報漏洩防止システム、機密情報漏洩防止方法及び機密情報漏洩防止プログラム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20120291106A1 (ja) |
JP (1) | JP5704518B2 (ja) |
CN (1) | CN102713926B (ja) |
WO (1) | WO2011089788A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739665A (zh) * | 2012-06-25 | 2012-10-17 | 成都卫士通信息产业股份有限公司 | 一种实现网络虚拟安全域的方法 |
JPWO2013080659A1 (ja) * | 2011-12-01 | 2015-04-27 | Necソリューションイノベータ株式会社 | 機密情報漏洩防止システム、機密情報漏洩防止方法、及びプログラム |
JP2018147203A (ja) * | 2017-03-06 | 2018-09-20 | 日本電気株式会社 | 情報漏洩防止装置、情報漏洩防止方法および情報漏洩防止プログラム |
JP7429177B2 (ja) | 2020-10-07 | 2024-02-07 | 株式会社Nttドコモ | 認証システム |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102196012B (zh) * | 2010-03-17 | 2013-08-07 | 华为技术有限公司 | 服务开放方法及系统、服务开放服务器 |
JP5153843B2 (ja) * | 2010-09-10 | 2013-02-27 | シャープ株式会社 | サーバ装置、メールサーバ装置、及びfaxサーバ装置 |
JP5701715B2 (ja) * | 2011-08-12 | 2015-04-15 | 株式会社東芝 | エネルギー管理装置、電力管理システムおよびプログラム |
US8799989B1 (en) * | 2011-12-16 | 2014-08-05 | Google Inc. | Network settings browser synchronization |
US8910261B2 (en) * | 2012-09-28 | 2014-12-09 | Alcatel Lucent | Radius policy multiple authenticator support |
US9041766B1 (en) | 2013-03-14 | 2015-05-26 | Ca, Inc. | Automated attention detection |
US8850597B1 (en) | 2013-03-14 | 2014-09-30 | Ca, Inc. | Automated message transmission prevention based on environment |
US9716599B1 (en) | 2013-03-14 | 2017-07-25 | Ca, Inc. | Automated assessment of organization mood |
US9256748B1 (en) | 2013-03-14 | 2016-02-09 | Ca, Inc. | Visual based malicious activity detection |
US8887300B1 (en) | 2013-03-14 | 2014-11-11 | Ca, Inc. | Automated message transmission prevention based on a physical reaction |
US9208326B1 (en) | 2013-03-14 | 2015-12-08 | Ca, Inc. | Managing and predicting privacy preferences based on automated detection of physical reaction |
US9100540B1 (en) | 2013-03-14 | 2015-08-04 | Ca, Inc. | Multi-person video conference with focus detection |
US9055071B1 (en) | 2013-03-14 | 2015-06-09 | Ca, Inc. | Automated false statement alerts |
US9047253B1 (en) | 2013-03-14 | 2015-06-02 | Ca, Inc. | Detecting false statement using multiple modalities |
JP6175679B2 (ja) * | 2013-10-16 | 2017-08-09 | 株式会社 日立産業制御ソリューションズ | 業務管理システム |
JP2016208174A (ja) * | 2015-04-20 | 2016-12-08 | 株式会社リコー | 通信システムおよび通信方法 |
JP2017004133A (ja) * | 2015-06-08 | 2017-01-05 | 株式会社リコー | サービス提供システム、情報処理システム、情報処理装置、サービス提供方法、及びプログラム |
US9507929B1 (en) * | 2015-06-08 | 2016-11-29 | Tata Institute Of Fundamental Research | Decentralized information flow securing method and system for multilevel security and privacy domains |
CN106022138B (zh) * | 2016-05-17 | 2018-11-20 | 飞天诚信科技股份有限公司 | 安全输入方法及过滤驱动 |
DE102017005366A1 (de) * | 2017-06-01 | 2018-12-06 | Manfred Meissner | Verfahren zu einem System der interaktiven Autorisierung für den Schutz von Daten |
US10555159B1 (en) * | 2019-03-13 | 2020-02-04 | Whelen Engineering Company, Inc. | System and method for operating stealth mode of emergency vehicle |
CN112511569B (zh) * | 2021-02-07 | 2021-05-11 | 杭州筋斗腾云科技有限公司 | 网络资源访问请求的处理方法、系统及计算机设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11272616A (ja) * | 1998-03-20 | 1999-10-08 | Nri & Ncc Co Ltd | データアクセス制御を行うデータ通信システム |
JP2003044297A (ja) * | 2000-11-20 | 2003-02-14 | Humming Heads Inc | コンピュータリソースの制御を行なう情報処理方法および装置、情報処理システム及びその制御方法並びに記憶媒体、プログラム |
JP2003173284A (ja) * | 2001-12-05 | 2003-06-20 | Hitachi Ltd | 送信制御可能なネットワークシステム |
JP2005209181A (ja) * | 2003-12-25 | 2005-08-04 | Sorun Corp | ファイル管理システム及び管理方法 |
JP2009043033A (ja) * | 2007-08-09 | 2009-02-26 | Hitachi Software Eng Co Ltd | クライアントサーバシステム |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6034618A (en) * | 1996-10-31 | 2000-03-07 | Matsushita Electric Industrial Co., Ltd. | Device authentication system which allows the authentication function to be changed |
US20020056043A1 (en) * | 1999-01-18 | 2002-05-09 | Sensar, Inc. | Method and apparatus for securely transmitting and authenticating biometric data over a network |
WO2003036867A1 (en) * | 2001-10-26 | 2003-05-01 | Ktfreetel Co., Ltd. | System and method for performing mutual authentication between mobile terminal and server |
US7587485B1 (en) * | 2002-09-19 | 2009-09-08 | Foundry Networks, Inc. | System and method for supplicant based accounting and access |
JP2004126889A (ja) * | 2002-10-01 | 2004-04-22 | Sharp Corp | 電子印鑑、リムーバブルメモリ媒体、事前認証システム、携帯機器、携帯電話装置および車両始動制御装置 |
US8117639B2 (en) * | 2002-10-10 | 2012-02-14 | Rocksteady Technologies, Llc | System and method for providing access control |
US7206600B2 (en) * | 2002-12-26 | 2007-04-17 | Intel Corporation | Method and apparatus of antenna detection and authentication |
US20050004873A1 (en) * | 2003-02-03 | 2005-01-06 | Robin Pou | Distribution and rights management of digital content |
US20050229004A1 (en) * | 2004-03-31 | 2005-10-13 | Callaghan David M | Digital rights management system and method |
US8112789B2 (en) * | 2005-10-11 | 2012-02-07 | Citrix Systems, Inc. | Systems and methods for facilitating distributed authentication |
US20070113291A1 (en) * | 2005-11-17 | 2007-05-17 | Juin-Jia Dai | Method for administrating the function access |
EP1873674B1 (en) * | 2005-12-19 | 2019-09-04 | Nippon Telegraph And Telephone Corporation | Terminal identification method, authentication method, authentication system, server, terminal, radio base station, program, and recording medium |
US20070143851A1 (en) * | 2005-12-21 | 2007-06-21 | Fiberlink | Method and systems for controlling access to computing resources based on known security vulnerabilities |
US20070199044A1 (en) * | 2006-02-17 | 2007-08-23 | Samsung Electronics Co., Ltd. | Systems and methods for distributed security policy management |
JPWO2007125877A1 (ja) * | 2006-04-28 | 2009-09-10 | パナソニック株式会社 | 通信装置、及び通信システム |
US7814531B2 (en) * | 2006-06-30 | 2010-10-12 | Intel Corporation | Detection of network environment for network access control |
JP2008033652A (ja) * | 2006-07-28 | 2008-02-14 | Nec Infrontia Corp | クライアント・サーバ型分散システム、クライアント装置、サーバ装置及びそれらに用いる相互認証方法 |
US8272048B2 (en) * | 2006-08-04 | 2012-09-18 | Apple Inc. | Restriction of program process capabilities |
US8261345B2 (en) * | 2006-10-23 | 2012-09-04 | Endeavors Technologies, Inc. | Rule-based application access management |
US8225103B2 (en) * | 2006-10-24 | 2012-07-17 | Avatier Corporation | Controlling access to a protected network |
US8312518B1 (en) * | 2007-09-27 | 2012-11-13 | Avaya Inc. | Island of trust in a service-oriented environment |
US20090205018A1 (en) * | 2008-02-07 | 2009-08-13 | Ferraiolo David F | Method and system for the specification and enforcement of arbitrary attribute-based access control policies |
CN101960465A (zh) * | 2008-03-03 | 2011-01-26 | 日本电气株式会社 | 机密信息泄漏防止系统和机密信息泄漏防止方法 |
US8353041B2 (en) * | 2008-05-16 | 2013-01-08 | Symantec Corporation | Secure application streaming |
US8661252B2 (en) * | 2008-06-20 | 2014-02-25 | Microsoft Corporation | Secure network address provisioning |
KR100997802B1 (ko) * | 2008-10-20 | 2010-12-01 | 한국전자통신연구원 | 정보 단말기의 보안 관리 장치 및 방법 |
US8424071B2 (en) * | 2009-04-15 | 2013-04-16 | International Business Machines Corporation | Method and apparatus for secure and reliable computing |
CN101605325B (zh) * | 2009-06-29 | 2012-06-06 | 钱袋网(北京)信息技术有限公司 | 身份认证的方法和移动终端、服务器以及身份认证系统 |
CN101631113B (zh) * | 2009-08-19 | 2011-04-06 | 西安西电捷通无线网络通信股份有限公司 | 一种有线局域网的安全访问控制方法及其系统 |
WO2011086787A1 (ja) * | 2010-01-13 | 2011-07-21 | 日本電気株式会社 | 機密情報漏洩防止システム、機密情報漏洩防止方法及び機密情報漏洩防止プログラム |
-
2010
- 2010-06-12 US US13/522,898 patent/US20120291106A1/en not_active Abandoned
- 2010-12-06 JP JP2011550802A patent/JP5704518B2/ja active Active
- 2010-12-06 WO PCT/JP2010/071838 patent/WO2011089788A1/ja active Application Filing
- 2010-12-06 CN CN201080061850.2A patent/CN102713926B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11272616A (ja) * | 1998-03-20 | 1999-10-08 | Nri & Ncc Co Ltd | データアクセス制御を行うデータ通信システム |
JP2003044297A (ja) * | 2000-11-20 | 2003-02-14 | Humming Heads Inc | コンピュータリソースの制御を行なう情報処理方法および装置、情報処理システム及びその制御方法並びに記憶媒体、プログラム |
JP2003173284A (ja) * | 2001-12-05 | 2003-06-20 | Hitachi Ltd | 送信制御可能なネットワークシステム |
JP2005209181A (ja) * | 2003-12-25 | 2005-08-04 | Sorun Corp | ファイル管理システム及び管理方法 |
JP2009043033A (ja) * | 2007-08-09 | 2009-02-26 | Hitachi Software Eng Co Ltd | クライアントサーバシステム |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2013080659A1 (ja) * | 2011-12-01 | 2015-04-27 | Necソリューションイノベータ株式会社 | 機密情報漏洩防止システム、機密情報漏洩防止方法、及びプログラム |
CN102739665A (zh) * | 2012-06-25 | 2012-10-17 | 成都卫士通信息产业股份有限公司 | 一种实现网络虚拟安全域的方法 |
JP2018147203A (ja) * | 2017-03-06 | 2018-09-20 | 日本電気株式会社 | 情報漏洩防止装置、情報漏洩防止方法および情報漏洩防止プログラム |
JP7429177B2 (ja) | 2020-10-07 | 2024-02-07 | 株式会社Nttドコモ | 認証システム |
Also Published As
Publication number | Publication date |
---|---|
JP5704518B2 (ja) | 2015-04-22 |
US20120291106A1 (en) | 2012-11-15 |
CN102713926A (zh) | 2012-10-03 |
CN102713926B (zh) | 2016-05-11 |
JPWO2011089788A1 (ja) | 2013-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5704518B2 (ja) | 機密情報漏洩防止システム、機密情報漏洩防止方法及び機密情報漏洩防止プログラム | |
JP4746266B2 (ja) | ネットワーク・ロケーション中のサブ・ロケーションについてのユーザの認証の方法およびシステム | |
US9942274B2 (en) | Securing communication over a network using client integrity verification | |
US9413750B2 (en) | Facilitating single sign-on (SSO) across multiple browser instance | |
KR101720160B1 (ko) | 인간의 개입이 없는 어플리케이션들을 위한 인증 데이터베이스 커넥티비티 | |
US9047458B2 (en) | Network access protection | |
US7774611B2 (en) | Enforcing file authorization access | |
US9438629B2 (en) | Sensitive information leakage prevention system, sensitive information leakage prevention method, and computer-readable recording medium | |
JP6096376B2 (ja) | アクセス制御方法、装置、プログラム、及び記録媒体 | |
JP5822078B2 (ja) | 機密情報漏洩防止システム、機密情報漏洩防止方法及び機密情報漏洩防止プログラム | |
US20220345491A1 (en) | Systems and methods for scalable zero trust security processing | |
JP6464544B1 (ja) | 情報処理装置、情報処理方法、情報処理プログラム、及び情報処理システム | |
KR101364610B1 (ko) | 웹 스토리지 객체를 이용하는 웹 사이트 접속 인증 방법 및 시스템 | |
KR101066729B1 (ko) | 네트워크 위치의 하위 위치에 대한 사용자의 인증을 위한 방법 및 시스템 | |
CN116015692A (zh) | 一种网络准入控制方法、装置、终端及存储介质 | |
JP2019061696A (ja) | 端末装置 | |
JP2006058995A (ja) | アクセス権限設定装置、方法およびシステム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080061850.2 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10843952 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011550802 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13522898 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10843952 Country of ref document: EP Kind code of ref document: A1 |