WO2024116251A1 - Inspection system, inspection method, and inspection program - Google Patents

Inspection system, inspection method, and inspection program Download PDF

Info

Publication number
WO2024116251A1
WO2024116251A1 PCT/JP2022/043826 JP2022043826W WO2024116251A1 WO 2024116251 A1 WO2024116251 A1 WO 2024116251A1 JP 2022043826 W JP2022043826 W JP 2022043826W WO 2024116251 A1 WO2024116251 A1 WO 2024116251A1
Authority
WO
WIPO (PCT)
Prior art keywords
inspection
information
security risk
configuration information
unit
Prior art date
Application number
PCT/JP2022/043826
Other languages
French (fr)
Japanese (ja)
Inventor
楊 鐘本
浩義 瀧口
Original Assignee
日本電信電話株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 日本電信電話株式会社 filed Critical 日本電信電話株式会社
Priority to PCT/JP2022/043826 priority Critical patent/WO2024116251A1/en
Publication of WO2024116251A1 publication Critical patent/WO2024116251A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Definitions

  • the present invention relates to an inspection system, an inspection method, and an inspection program.
  • Non-Patent Document 1 Conventional technologies related to the inspection of IoT devices include a technology that lists software dependencies and components to detect vulnerabilities, bugs, and other problems at an early stage (see, for example, Non-Patent Document 1), and a technology that prepares data that serves as an indicator of malware infection and checks for its presence or absence (see, for example, Non-Patent Document 2).
  • the inspection system of the present invention is an inspection system having a device information transmission device and an inspection processing device, the device information transmission device having a first ID assignment unit that assigns an ID to each of the device to be inspected and its configuration information, and a transmission unit that encrypts the assigned ID and transmits it to the inspection processing device, and the inspection processing device has a second ID assignment unit that assigns an ID to security risk information used in the inspection, a calculation unit that finds common denominators between the ID for the encrypted configuration information and the ID for the security risk information, and a display unit that displays the inspection results corresponding to the input device ID.
  • the present invention has the advantage that it is possible to carry out security inspections while avoiding the risk of information leaks, even when user information is sent externally and inspections are carried out remotely.
  • FIG. 1 is a diagram showing an overview of an inspection process including an inspection system according to an embodiment.
  • FIG. 2 is a block diagram showing the configuration of an inspection system according to the embodiment.
  • FIG. 3 is a diagram showing a specific example of configuration information of a device according to the embodiment.
  • FIG. 4 is a diagram showing a specific example of security risk information according to the embodiment.
  • FIG. 5 is a diagram showing an overview of a process of dividing a set of IDs for security risk information by a calculation unit according to the embodiment.
  • FIG. 6 is a diagram showing a specific example of the inspection process according to the embodiment.
  • FIG. 7 is a flowchart showing a flow of information processing by the device information transmission device in the inspection system according to the embodiment.
  • FIG. 8 is a flowchart showing a flow of information processing by the inspection processing device in the inspection system according to the embodiment.
  • FIG. 9 is a diagram illustrating an example of a computer that executes a test program.
  • FIG. 1 is a diagram showing an overview of an inspection process including an inspection system according to the present embodiment.
  • the inspection system 10 is composed of a device information transmission device 20 to which the inspection user inputs information about the IoT devices and an inspection processing device 30 to which the inspector inputs security risk information.
  • the inspection system 10 has a device information transmission device 20 and an inspection processing device 30.
  • the device information transmission device 20 assigns an ID to each of the input devices to be inspected and their configuration information, encrypts the assigned IDs, and transmits them to the inspection processing device 30.
  • the inspection processing device 30 also assigns an ID to the input security risk information, and finds common denominators between the ID assigned to the security risk information and the ID for the received configuration information of the device to be inspected. Furthermore, the inspection processing device 30 displays the inspection results corresponding to the input device ID.
  • the device information transmission device 20 assigns an ID to each of the input devices to be inspected and their configuration information. For example, the device information transmission device 20 assigns an ID that can uniquely identify each piece of information to each of the IoT devices to be inspected and their configuration information input by the inspection user. The device information transmission device 20 then encrypts the assigned ID and transmits it to the inspection processing device 30. For example, the device information transmission device 20 encrypts the ID assigned to the configuration information of the device to be inspected and transmits it to the inspection processing device 30.
  • the inspection processing device 30 assigns an ID to the input security risk information. For example, the inspection processing device 30 assigns an ID that can uniquely identify each piece of security risk information, such as vulnerability information and malware information, input by an inspector.
  • the inspection processing device 30 seeks commonalities between the ID assigned to the security risk information and the ID for the received configuration information of the device to be inspected. For example, the inspection processing device 30 seeks commonalities between the set of IDs for the encrypted configuration information and the set of IDs for the security risk information while still encrypted. Furthermore, upon input of a device ID, the inspection processing device 30 displays the corresponding inspection results. For example, upon input of a device ID by the inspection user or inspection result checker, the inspection processing device 30 displays the inspection results for the corresponding device.
  • Fig. 2 is a diagram showing a configuration example of the inspection system according to the embodiment.
  • the inspection system 10 according to the embodiment has a device information transmission device 20 and an inspection processing device 30.
  • the device information transmission device 20 has a communication unit 21, a control unit 22, and a storage unit 23, and the inspection processing device 30 has a communication unit 31, a control unit 32, and a storage unit 33.
  • the device information transmission device 20 and the inspection processing device 30 are connected to each other so that they can communicate with each other via wire or wirelessly.
  • the communication units 21 and 31 are realized, for example, by a NIC (Network Interface Card) or the like.
  • the communication units 21 and 31 are connected to the device information transmission device 20 or the inspection processing device 30 by wired or wireless connection, and transmit and receive information between the device information transmission device 20 or the inspection processing device 30.
  • the storage unit 23 and the storage unit 33 are realized by a storage device such as a RAM (Random Access Memory) or a hard disk.
  • the storage unit 23 and the storage unit 33 store data and programs necessary for various processes by the control unit 22 or the control unit 32.
  • the storage unit 23 of the device information transmission device 20 has a device information storage unit 23a, which is closely related to the present invention.
  • the device information storage unit 23a stores the ID assigned to the device to be inspected and its configuration information by the first ID assignment unit 22a described below.
  • the device information storage unit 13a stores the ID assigned to the information of the IoT device to be inspected that is input from outside so that the device and its configuration information can be uniquely identified.
  • the storage unit 33 of the inspection processing device 30 has a received information storage unit 33a, a security risk information storage unit 33b, and an inspection result information storage unit 33c, which are closely related to the present invention.
  • the received information storage unit 33a stores information that is transmitted by the transmission unit 22b (described below) and received by the inspection processing device 30.
  • the received information storage unit 33a stores encrypted IDs that are received by the inspection processing device 30, such as IDs assigned to devices to be inspected and IDs assigned to their configuration information.
  • the security risk information storage unit 33b stores information about vulnerabilities, scores indicating their severity, and information about malware, which are used in the inspection process.
  • the security risk information storage unit 33b stores information about vulnerabilities, scores indicating their severity, and information about malware, which are stored in a security risk information database owned by the inspector, by external storage.
  • the inspection result information storage unit 33c stores the inspection results calculated by the calculation unit 32b described below.
  • the inspection result information storage unit 33c stores the inspection results, such as the common items and the number of common items between the ID of the configuration information and the ID of the security risk information, calculated by the calculation unit 32b described below, in association with the ID of the device to be inspected.
  • the control units 22 and 32 are realized by a CPU (Central Processing Unit) or an MPU (Micro Processing Unit) or the like executing various programs stored in the storage device within each device using the RAM as a working area.
  • the control units 22 and 32 are also realized by integrated circuits such as an ASIC (Application Specific Integrated Circuit) or an FPGA (Field Programmable Gate Array).
  • the control unit 22 of the device information transmission device 20 has a first ID assignment unit 22a and a transmission unit 22b.
  • the first ID assignment unit 22a assigns an ID to each of the devices to be inspected and their configuration information. For example, the first ID assignment unit 22a assigns an ID that can uniquely identify a device to an externally input device to be inspected by assigning a serial number or an ID that can be physically identified to the device.
  • the first ID assignment unit 22a also assigns an ID that can uniquely identify each piece of information, for example, depending on the type of configuration information of the device to be inspected that is input from outside. If the first ID assignment unit 22a finds a duplicate when assigning an ID, it excludes that ID.
  • FIG. 3 is a diagram showing a specific example of configuration information of a device according to an embodiment.
  • three types of configuration information of the device to be inspected are shown: "app” indicating an application, "file/hash” indicating a file hash, and "file/name” indicating a file name.
  • the first ID assignment unit 22a assigns an ID that is a hashed value of the combined value of the app name and version.
  • "id1" in FIG. 3 is a hashed value of the combined value of the app name "A” and the version "1.0".
  • the first ID assignment unit 22a assigns the file hash value as is as the ID. That is, "id4" in FIG. 3 becomes the file hash value "1111aaaa”. Then, if the configuration information is "file/name”, the first ID assignment unit 22a assigns the hashed value of the file name as the ID. That is, "id6" in FIG. 3 becomes the hashed value of the file name "Malware.exe”.
  • the transmission unit 22b encrypts the assigned ID and transmits it to the inspection processing device.
  • the transmission unit 22b encrypts the ID for the configuration information of the device assigned by the first ID assignment unit 22a described above, and transmits the ID for the device and the ID for the encrypted configuration information to the inspection processing device 30.
  • the control unit 32 of the inspection processing device 30 has a second ID assignment unit 32a, a calculation unit 32b, and a display unit 32c.
  • the second ID assignment unit 32a assigns an ID to the security risk information used in the inspection.
  • the second ID assignment unit 32a then notifies the calculation unit 32b, which will be described later, of the assigned ID.
  • the second ID assignment unit 32a assigns an ID that can uniquely identify security risk information, such as information about vulnerabilities and IOC (Indicator of Compromise) information about malware, that is used in testing input from outside, and notifies the calculation unit 32b.
  • security risk information such as information about vulnerabilities and IOC (Indicator of Compromise) information about malware
  • FIG. 4 is a diagram showing a specific example of security risk information according to an embodiment.
  • three types of security risk information are shown: "app” indicating an application, "file/hash” indicating a file hash, and "file/name” indicating a file name.
  • the second ID assignment unit 32a assigns an ID that is a hashed value obtained by combining the app name and version.
  • "id1" in FIG. 4 is a hashed value obtained by combining the app name "A” and the version "1.0".
  • the second ID assignment unit 32a assigns the file hash value as is as the ID. That is, "id4" in FIG. 4 becomes the file hash value "1111aaaa”. Then, if the type of risk related to the malware information is "file/name”, the second ID assignment unit 32a assigns the hashed value of the file name as the ID. That is, "id6" in FIG. 4 becomes the hashed value of the file name "Malware.exe”.
  • the calculation unit 32b finds commonalities between the IDs for the encrypted configuration information and the IDs for the security risk information. For example, the calculation unit 32b finds commonalities between a set of IDs for the encrypted configuration information transmitted from the device information transmitting device 20 and stored in the received information storage unit 33a, and a set of IDs for the security risk information notified from the second ID assignment unit 32a, while still encrypted.
  • the calculation unit 32b may also determine the number of common terms between the ID for the encrypted configuration information and the ID for the security risk information. For example, the calculation unit 32b determines the number of common terms between a set of IDs for the encrypted configuration information and a set of IDs for the security risk information.
  • calculation unit 32b may divide the set of IDs for the encrypted configuration information or the set of IDs for the security risk information into any number of sets, and for each of the divided sets, find common denominators between the IDs for the encrypted configuration information and the IDs for the security risk information.
  • the calculation unit 32b divides the set of IDs into an arbitrary number of sets and performs the above-mentioned common denominator calculation process for each of the divided sets.
  • FIG. 5 is a diagram showing an overview of the process of dividing a set of IDs for security risk information by the calculation unit according to the embodiment.
  • the set of IDs of the encrypted configuration information is designated as X
  • the set of IDs of the security risk information is designated as Y
  • the calculation unit 32b finds common terms between X and Y.
  • finding the common terms takes a significant amount of processing time and consumes resources. Therefore, in such cases, a division process of X or Y is performed to find the common terms efficiently in a relatively short time with minimal resource consumption.
  • set Y has an extremely large number of types of elements, and first, the calculation unit 32b divides set Y into an arbitrary number of N sets, "Y1, Y2, ". Then, the calculation unit 32b finds the number of common terms with set X for each of the divided subsets "Y1, Y2, " and extracts the subsets with the number of common terms of 1 or more. In the example of FIG. 5, set Y is divided into two sets, and both of the divided subsets "Y1" and "Y2" have the number of common terms of 1 or more.
  • the calculation unit 32b repeats the above-mentioned series of processes on the extracted subsets until the number of types of elements in the subset falls below a preset threshold.
  • the extracted subsets "Y1" and “Y2" are similarly divided into two sets, resulting in subsets "Y11", “Y12", “Y21”, and “Y22", of which "Y11” and "Y22" are selected because they have 1 or more common terms, but because the number of types of elements in subsets "Y11” and "Y22" falls below a preset threshold, the calculation unit 32b ends the division process.
  • the calculation unit 32b may also find common denominators between the ID of the security risk information narrowed down by information related to the severity of the vulnerability and the ID of the encrypted configuration information.
  • the calculation unit 32b refers to the Common Vulnerability Scoring System (CVSS), which is a score that indicates the severity of vulnerabilities and is stored in the security risk information storage unit 33b, narrows down the IDs for the security risk information to be matched, and finds common denominators with the IDs for the encrypted configuration information.
  • CVSS Common Vulnerability Scoring System
  • the display unit 32c displays the test results corresponding to the input device ID. For example, for a device ID input from outside, the display unit 32c displays the test results associated with that ID stored in the test result information storage unit 33c.
  • Fig. 6 is a diagram showing a specific example of the inspection process according to the embodiment.
  • the upper part of Fig. 6 shows the configuration information of the device to be inspected and the ID assigned thereto, and the lower part of Fig. 6 shows the security risk information and the ID assigned thereto.
  • the calculation unit 32b finds common denominators between the set X of IDs for the encrypted configuration information and the set Y of IDs for security risk information. For example, when inspecting information related to vulnerabilities, the calculation unit 32b extracts IDs whose type of configuration information and type of risk information are "app" and finds common denominators.
  • Fig. 7 is a flowchart showing the flow of information processing by the device information transmission device in the inspection system according to the embodiment
  • Fig. 8 is a flowchart showing the flow of information processing by the inspection processing device in the inspection system according to the embodiment.
  • the device information transmission device 20 receives the device to be inspected and its configuration information (step S101).
  • the first ID assignment unit 22a assigns an ID to the device to be inspected and its configuration information, respectively (step S102).
  • step S101 if the device information transmission device 20 has not received the device to be inspected and its configuration information (step S101; No), the device information transmission device 20 waits until it receives the device to be inspected and its configuration information. Then, the transmission unit 22b encrypts the assigned ID and transmits it to the inspection processing device 30 (step S103).
  • the inspection processing device 30 receives security risk information (step S201). If the inspection processing device 30 receives security risk information (step S201; Yes), the second ID assignment unit 32a assigns an ID to the security risk information (step S202).
  • step S201 if the inspection processing device 30 has not received security risk information (step S201; No), the inspection processing device 30 waits until it receives security risk information. Then, the inspection processing device 30 receives the encrypted ID from the device information transmission device 20 (step S203). If the inspection processing device 30 receives the encrypted ID from the device information transmission device 20 (step S203; Yes), the calculation unit 32b finds a common denominator between the ID for the configuration information and the ID for the security risk information (step S204).
  • the inspection processing device 30 waits until it receives the encrypted ID from the device information transmission device 20. After that, the display unit 32c displays the inspection results corresponding to the input device ID (step S205).
  • the inspection system 10 includes the equipment information transmission device 20 and the inspection processing device 30.
  • the equipment information transmission device 20 includes a first ID assignment unit 22a that assigns an ID to each of the equipment to be inspected and its configuration information, and a transmission unit 22b that encrypts the assigned ID and transmits it to the inspection processing device 30.
  • the inspection processing device 30 also has a second ID assignment unit 32a that assigns an ID to the security risk information used in the inspection, a calculation unit 32b that determines the common denominator between the ID for the encrypted configuration information and the ID for the security risk information, and a display unit 32c that displays the inspection results corresponding to the input device ID.
  • the inspection system 10 encrypts the configuration information of the device to be inspected and transmits it to the inspection processing device 30, and the inspection is performed while still encrypted. This has the effect of making it possible to perform security inspections while avoiding the risk of information leaks, even when user information is transmitted externally and inspections are performed remotely.
  • the calculation unit 32b of the inspection system 10 also determines the number of common terms between the ID for the encrypted configuration information and the ID for the security risk information. As a result, by determining the number of common terms, the inspection system 10 has the effect of preventing the inspector from learning the configuration information from the ID of the common term determined by the inspection process, and enabling security inspection to be performed.
  • the calculation unit 32b of the inspection system 10 divides the set of IDs for the encrypted configuration information or the set of IDs for the security risk information into any number of sets, and for each divided set, finds common denominators between the IDs for the encrypted configuration information and the IDs for the security risk information.
  • the inspection system 10 has the advantage of being able to perform security inspections in a relatively short time and with minimal resource consumption in the process of finding common denominators, even when the set has a significantly large number of elements.
  • the calculation unit 32b of the inspection system 10 finds common denominators between the ID of the security risk information narrowed down by information related to the severity of the vulnerability and the ID of the encrypted configuration information.
  • the inspection system 10 has the advantage of being able to perform security inspections in a relatively short time and with minimal resource consumption by narrowing down the IDs for the security risk information to be compared, even if the set of IDs for the security risk information has an extremely large number of elements.
  • each component of each device shown in the figure is a functional concept, and does not necessarily have to be physically configured as shown in the figure.
  • the specific form of distribution and integration of each device is not limited to that shown in the figure, and all or part of it can be functionally or physically distributed and integrated in any unit depending on various loads and usage conditions.
  • each processing function performed by each device can be realized in whole or in part by a CPU and a program analyzed and executed by the CPU, or can be realized as hardware using wired logic.
  • a part or all of the memory unit 23 or memory unit 33 shown in FIG. 2 may be stored in a storage server or the like, rather than being stored in the device information transmission device 20 or the inspection processing device 30 of the inspection system 10.
  • the device information transmission device 20 or the inspection processing device 30 obtains various information by accessing the storage server.
  • Hardware Configuration Fig. 9 is a diagram showing an example of a hardware configuration.
  • the device information transmission device 20 and the inspection processing device 30 included in the inspection system 10 according to the embodiment described above are realized by a computer 1000 having a configuration as shown in Fig. 9, for example.
  • FIG. 9 is a diagram showing an example of a computer that executes a test program.
  • the computer 1000 has, for example, a memory 1010 and a CPU 1020.
  • the computer 1000 also has a hard disk drive interface 1030, a disk drive interface 1040, a serial port interface 1050, a video adapter 1060, and a network interface 1070. Each of these components is connected by a bus 1080.
  • the memory 1010 includes a ROM (Read Only Memory) 1011 and a RAM 1012.
  • the ROM 1011 stores a boot program such as a BIOS (Basic Input Output System).
  • BIOS Basic Input Output System
  • the hard disk drive interface 1030 is connected to a hard disk drive 1090.
  • the disk drive interface 1040 is connected to a disk drive 1100.
  • a removable storage medium such as a magnetic disk or optical disk is inserted into the disk drive 1100.
  • the serial port interface 1050 is connected to a mouse 1110 and a keyboard 1120, for example.
  • the video adapter 1060 is connected to a display 1130, for example.
  • the hard disk drive 1090 stores, for example, an OS (Operating System) 1091, an application program 1092, a program module 1093, and program data 1094. That is, the program that defines each process of the device information transmission device 20 or the inspection processing device 30 is implemented as a program module 1093 in which code executable by the computer 1000 is written.
  • the program module 1093 is stored, for example, in the hard disk drive 1090.
  • a program module 1093 for executing a process similar to the functional configuration of the device information transmission device 20 or the inspection processing device 30 is stored in the hard disk drive 1090.
  • the hard disk drive 1090 may be replaced by an SSD (Solid State Drive).
  • the setting data used in the processing of the above-mentioned embodiment is stored as program data 1094, for example, in memory 1010 or hard disk drive 1090.
  • the CPU 1020 reads the program module 1093 or program data 1094 stored in memory 1010 or hard disk drive 1090 into RAM 1012 as necessary and executes it.
  • the program module 1093 and program data 1094 are not limited to being stored in the hard disk drive 1090, but may be stored in, for example, a removable storage medium and read by the CPU 1020 via the disk drive 1100 or the like. Alternatively, the program module 1093 and program data 1094 may be stored in another computer connected via a network (LAN, WAN, etc.). The program module 1093 and program data 1094 may then be read by the CPU 1020 from the other computer via the network interface 1070.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

An inspection system (10) includes an equipment information transmission device (20) and an inspection processing device (30). The equipment information transmission device (20) includes a first ID assignment unit (22a) and a transmission unit (22b). The inspection processing device (30) includes a second ID assignment unit (32a), a computation unit (32b), and a display unit (32c). The first ID assignment unit (22a) assigns respective IDs to equipment to be inspected and configuration information thereof. The transmission unit (22b) encrypts and transmits the assigned IDs to the inspection processing device (30). The second ID assignment unit (32a) assigns an ID for security risk information to be used in an inspection. The computation unit (32b) finds a feature shared by the ID for the encrypted configuration information and the ID for the security risk information. The display unit (32c) displays an inspection result corresponding to an inputted equipment ID.

Description

検査システム、検査方法、及び検査プログラムInspection system, inspection method, and inspection program
 本発明は、検査システム、検査方法、及び検査プログラムに関する。 The present invention relates to an inspection system, an inspection method, and an inspection program.
 今日、サプライチェーンの弱点を狙ったサイバー攻撃が顕在化・高度化していることにより、企業がIoT機器を利用する際には、リスクマネジメントが一層重要となる。そのため、企業は利用するIoT機器に対し、ソフトウェアやハードウェアの脆弱性やマルウェアの感染などの有無について検査する必要がある。 Today, as cyber attacks targeting weaknesses in the supply chain become more prevalent and sophisticated, risk management becomes even more important when companies use IoT devices. For this reason, companies need to check the IoT devices they use for software and hardware vulnerabilities and malware infections.
 そこで、IoT機器の検査に関する技術として、ソフトウェアの依存関係や構成部品を一覧化し、脆弱性やバグといった不具合の早期発見を行う技術(例えば、非特許文献1参照)や、マルウェアの感染を示す指標となるデータを予め用意し、その存在の有無を確認することで、マルウェアの感染を検査する技術(例えば、非特許文献2参照)が従来技術として知られている。 Conventional technologies related to the inspection of IoT devices include a technology that lists software dependencies and components to detect vulnerabilities, bugs, and other problems at an early stage (see, for example, Non-Patent Document 1), and a technology that prepares data that serves as an indicator of malware infection and checks for its presence or absence (see, for example, Non-Patent Document 2).
 しかし、上記の従来技術では、利用者の情報を外部に送信してリモートで検査を実施する場合には、攻撃者によるセキュリティ侵害や内部不正により、意図せずに外部に情報が流出するリスクが存在するという課題があった。 However, with the above conventional technology, when sending user information to an external party and conducting an inspection remotely, there was a risk that information could be unintentionally leaked to the outside due to a security breach by an attacker or internal fraud.
 上述した課題を解決し、目的を達成するために、本発明の検査システムは、機器情報送信装置と検査処理装置とを有する検査システムであって、前記機器情報送信装置は、検査対象の機器とその構成情報とについて、それぞれIDを付与する第一のID付与部と、付与されたIDを暗号化し、前記検査処理装置に送信する送信部とを有し、前記検査処理装置は、検査に使用されるセキュリティリスク情報についてIDを付与する第二のID付与部と、暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項を求める演算部と、入力された機器IDに対応する検査結果を表示する表示部を有することを特徴とする。 In order to solve the above problems and achieve the objective, the inspection system of the present invention is an inspection system having a device information transmission device and an inspection processing device, the device information transmission device having a first ID assignment unit that assigns an ID to each of the device to be inspected and its configuration information, and a transmission unit that encrypts the assigned ID and transmits it to the inspection processing device, and the inspection processing device has a second ID assignment unit that assigns an ID to security risk information used in the inspection, a calculation unit that finds common denominators between the ID for the encrypted configuration information and the ID for the security risk information, and a display unit that displays the inspection results corresponding to the input device ID.
 本発明によれば、利用者の情報を外部に送信してリモートで検査を実施する場合であっても、情報漏洩のリスクを回避して、セキュリティ検査を実施することができるという効果を奏する。 The present invention has the advantage that it is possible to carry out security inspections while avoiding the risk of information leaks, even when user information is sent externally and inspections are carried out remotely.
図1は、実施形態に係る検査システムを含む検査処理の概要を示す図である。FIG. 1 is a diagram showing an overview of an inspection process including an inspection system according to an embodiment. 図2は、実施形態に係る検査システムの構成を示すブロック図である。FIG. 2 is a block diagram showing the configuration of an inspection system according to the embodiment. 図3は、実施形態に係る機器の構成情報の具体例を示す図である。FIG. 3 is a diagram showing a specific example of configuration information of a device according to the embodiment. 図4は、実施形態に係るセキュリティリスク情報の具体例を示す図である。FIG. 4 is a diagram showing a specific example of security risk information according to the embodiment. 図5は、実施形態に係る演算部によるセキュリティリスク情報についてのIDの集合の分割処理の概要を示す図である。FIG. 5 is a diagram showing an overview of a process of dividing a set of IDs for security risk information by a calculation unit according to the embodiment. 図6は、実施形態に係る検査処理の具体例を示す図である。FIG. 6 is a diagram showing a specific example of the inspection process according to the embodiment. 図7は、実施形態に係る検査システムにおける機器情報送信装置による情報処理の流れを示すフローチャートである。FIG. 7 is a flowchart showing a flow of information processing by the device information transmission device in the inspection system according to the embodiment. 図8は、実施形態に係る検査システムにおける検査処理装置による情報処理の流れを示すフローチャートである。FIG. 8 is a flowchart showing a flow of information processing by the inspection processing device in the inspection system according to the embodiment. 図9は、検査プログラムを実行するコンピュータの一例を示す図である。FIG. 9 is a diagram illustrating an example of a computer that executes a test program.
 以下に、本願に係る検査システム、検査方法、及び検査プログラムの実施形態を図面に基づいて詳細に説明する。なお、この実施形態により本願に係る検査システム、検査方法、及び検査プログラムが限定されるものではない。 Below, embodiments of the inspection system, inspection method, and inspection program according to the present application will be described in detail with reference to the drawings. Note that the inspection system, inspection method, and inspection program according to the present application are not limited to these embodiments.
〔1.システムの構成例〕
 図1は、本実施形態に係る検査システムを含む検査処理の概要を示す図である。図1に示すシステムでは、IoT機器を製造する検査利用者と、その機器の検査を行う検査者、IoT機器の納品先である検査結果確認者とが存在し、検査システム10は、検査利用者がIoT機器の情報を入力する機器情報送信装置20と検査者がセキュリティリスク情報を入力する検査処理装置30とから構成される。
[1. System configuration example]
Fig. 1 is a diagram showing an overview of an inspection process including an inspection system according to the present embodiment. In the system shown in Fig. 1, there are an inspection user who manufactures IoT devices, an inspector who inspects the devices, and an inspection result checker who is the delivery destination of the IoT devices, and the inspection system 10 is composed of a device information transmission device 20 to which the inspection user inputs information about the IoT devices and an inspection processing device 30 to which the inspector inputs security risk information.
 検査システム10は、機器情報送信装置20と検査処理装置30とを有する。機器情報送信装置20は、入力された検査対象の機器とその構成情報とについて、それぞれIDを付与し、付与されたIDを暗号化し検査処理装置30へと送信する。また、検査処理装置30は、入力されたセキュリティリスク情報についてIDを付与し、当該セキュリティリスク情報について付与したIDと、受信した検査対象機器の構成情報についてのIDとの共通項を求める。さらに、検査処理装置30は、機器IDの入力により、それに対応する検査結果を表示する。 The inspection system 10 has a device information transmission device 20 and an inspection processing device 30. The device information transmission device 20 assigns an ID to each of the input devices to be inspected and their configuration information, encrypts the assigned IDs, and transmits them to the inspection processing device 30. The inspection processing device 30 also assigns an ID to the input security risk information, and finds common denominators between the ID assigned to the security risk information and the ID for the received configuration information of the device to be inspected. Furthermore, the inspection processing device 30 displays the inspection results corresponding to the input device ID.
 機器情報送信装置20は、入力された検査対象の機器とその構成情報とについて、それぞれIDを付与する。例えば、機器情報送信装置20は、検査利用者により入力された検査対象のIoT機器とその構成情報とのそれぞれについて、各情報を一意に特定することができるIDを付与する。そして、機器情報送信装置20は、付与されたIDを暗号化し検査処理装置30へと送信する。例えば、機器情報送信装置20は、検査対象の機器の構成情報について付与されたIDを暗号化し、検査処理装置30へと送信する。 The device information transmission device 20 assigns an ID to each of the input devices to be inspected and their configuration information. For example, the device information transmission device 20 assigns an ID that can uniquely identify each piece of information to each of the IoT devices to be inspected and their configuration information input by the inspection user. The device information transmission device 20 then encrypts the assigned ID and transmits it to the inspection processing device 30. For example, the device information transmission device 20 encrypts the ID assigned to the configuration information of the device to be inspected and transmits it to the inspection processing device 30.
 検査処理装置30は、入力されたセキュリティリスク情報についてIDを付与する。例えば、検査処理装置30は、検査者により入力された、脆弱性情報やマルウェア情報といったセキュリティリスク情報について、各情報を一意に特定することができるIDを付与する。 The inspection processing device 30 assigns an ID to the input security risk information. For example, the inspection processing device 30 assigns an ID that can uniquely identify each piece of security risk information, such as vulnerability information and malware information, input by an inspector.
 その後、検査処理装置30は、セキュリティリスク情報について付与したIDと、受信した検査対象機器の構成情報についてのIDとの共通項を求める。例えば、検査処理装置30は、暗号化された構成情報についてのIDの集合と、セキュリティリスク情報についてのIDの集合の共通項を暗号化したまま求める。また、検査処理装置30は、機器IDの入力により、それに対応する検査結果を表示する。例えば、検査処理装置30は、検査利用者や検査結果確認者による機器IDの入力により、それに対応する機器の検査結果について表示する。 Then, the inspection processing device 30 seeks commonalities between the ID assigned to the security risk information and the ID for the received configuration information of the device to be inspected. For example, the inspection processing device 30 seeks commonalities between the set of IDs for the encrypted configuration information and the set of IDs for the security risk information while still encrypted. Furthermore, upon input of a device ID, the inspection processing device 30 displays the corresponding inspection results. For example, upon input of a device ID by the inspection user or inspection result checker, the inspection processing device 30 displays the inspection results for the corresponding device.
〔2.検査システム10の構成〕
 次に、図2を参照し、図1に示した検査システム10の構成を説明する。図2は、実施形態に係る検査システムの構成例を示す図である。図2に示すように、実施形態に係る検査システム10は、機器情報送信装置20と検査処理装置30とを有する。
2. Configuration of Inspection System 10
Next, the configuration of the inspection system 10 shown in Fig. 1 will be described with reference to Fig. 2. Fig. 2 is a diagram showing a configuration example of the inspection system according to the embodiment. As shown in Fig. 2, the inspection system 10 according to the embodiment has a device information transmission device 20 and an inspection processing device 30.
 機器情報送信装置20は、通信部21と制御部22と記憶部23とを有し、検査処理装置30は、通信部31と制御部32と記憶部33とを有する。また、機器情報送信装置20と検査処理装置30とは、有線又は無線により互いに通信可能に接続される。 The device information transmission device 20 has a communication unit 21, a control unit 22, and a storage unit 23, and the inspection processing device 30 has a communication unit 31, a control unit 32, and a storage unit 33. The device information transmission device 20 and the inspection processing device 30 are connected to each other so that they can communicate with each other via wire or wirelessly.
 通信部21及び通信部31は、例えば、NIC(Network Interface Card)等によって実現される。通信部21及び通信部31は、機器情報送信装置20又は検査処理装置30と有線又は無線で接続され、機器情報送信装置20又は検査処理装置30との間で情報の送受信を行う。 The communication units 21 and 31 are realized, for example, by a NIC (Network Interface Card) or the like. The communication units 21 and 31 are connected to the device information transmission device 20 or the inspection processing device 30 by wired or wireless connection, and transmit and receive information between the device information transmission device 20 or the inspection processing device 30.
 記憶部23及び記憶部33は、例えば、RAM(Random Access Memory)やハードディスク等の記憶装置によって実現される。記憶部23及び記憶部33は、制御部22又は制御部32による各種処理に必要なデータ及びプログラムを格納する。そして、機器情報送信装置20の記憶部23は、本発明に密接に関連するものとして、機器情報記憶部23aを有する。 The storage unit 23 and the storage unit 33 are realized by a storage device such as a RAM (Random Access Memory) or a hard disk. The storage unit 23 and the storage unit 33 store data and programs necessary for various processes by the control unit 22 or the control unit 32. The storage unit 23 of the device information transmission device 20 has a device information storage unit 23a, which is closely related to the present invention.
 機器情報記憶部23aは、後述する第一のID付与部22aによって、検査対象の機器やその構成情報について付与されたIDについて記憶する。例えば、機器情報記憶部13aは、外部から入力された検査対象のIoT機器の情報について、その機器や構成情報を一意に特定することができるように付与されたIDについて記憶する。 The device information storage unit 23a stores the ID assigned to the device to be inspected and its configuration information by the first ID assignment unit 22a described below. For example, the device information storage unit 13a stores the ID assigned to the information of the IoT device to be inspected that is input from outside so that the device and its configuration information can be uniquely identified.
 また、検査処理装置30の記憶部33は、本発明に密接に関連するものとして、受信情報記憶部33aとセキュリティリスク情報記憶部33bと、検査結果情報記憶部33cとを有する。受信情報記憶部33aは、後述する送信部22bにより送信され、検査処理装置30が受信した情報について記憶する。例えば、受信情報記憶部33aは、検査処理装置30が受信した、検査対象の機器に付与されたIDや、その構成情報について付与されたIDが暗号化されたものについて記憶する。 The storage unit 33 of the inspection processing device 30 has a received information storage unit 33a, a security risk information storage unit 33b, and an inspection result information storage unit 33c, which are closely related to the present invention. The received information storage unit 33a stores information that is transmitted by the transmission unit 22b (described below) and received by the inspection processing device 30. For example, the received information storage unit 33a stores encrypted IDs that are received by the inspection processing device 30, such as IDs assigned to devices to be inspected and IDs assigned to their configuration information.
 セキュリティリスク情報記憶部33bは、検査処理に使用される、脆弱性に関する情報や、その深刻度を表すスコア、マルウェアに関する情報について記憶する。例えば、セキュリティリスク情報記憶部33bは、検査者が有するセキュリティリスク情報データベースに記憶されている、脆弱性に関する情報や、その深刻度を表すスコア、マルウェアに関する情報について外部からの格納によって記憶する。 The security risk information storage unit 33b stores information about vulnerabilities, scores indicating their severity, and information about malware, which are used in the inspection process. For example, the security risk information storage unit 33b stores information about vulnerabilities, scores indicating their severity, and information about malware, which are stored in a security risk information database owned by the inspector, by external storage.
 検査結果情報記憶部33cは、後述する演算部32bによって演算された検査結果について記憶する。例えば、検査結果情報記憶部33cは、後述する演算部32bにより演算された、構成情報のIDとセキュリティリスク情報のIDとの共通項や共通項数といった検査結果について、検査対象の機器のIDと関連付けて記憶する。 The inspection result information storage unit 33c stores the inspection results calculated by the calculation unit 32b described below. For example, the inspection result information storage unit 33c stores the inspection results, such as the common items and the number of common items between the ID of the configuration information and the ID of the security risk information, calculated by the calculation unit 32b described below, in association with the ID of the device to be inspected.
 制御部22及び制御部32は、CPU(Central Processing Unit)やMPU(Micro Processing Unit)等によって、それぞれの装置内部の記憶装置に記憶されている各種プログラムがRAMを作業領域として実行されることにより実現される。また、制御部22及び制御部32は、例えば、ASIC(Application Specific Integrated Circuit)やFPGA(Field Programmable Gate Array)などの集積回路により実現される。 The control units 22 and 32 are realized by a CPU (Central Processing Unit) or an MPU (Micro Processing Unit) or the like executing various programs stored in the storage device within each device using the RAM as a working area. The control units 22 and 32 are also realized by integrated circuits such as an ASIC (Application Specific Integrated Circuit) or an FPGA (Field Programmable Gate Array).
 機器情報送信装置20の制御部22は、第一のID付与部22aと送信部22bとを有する。第一のID付与部22aは、検査対象の機器とその構成情報とについて、それぞれIDを付与する。例えば、第一のID付与部22aは、外部から入力された検査対象の機器について、シリアル番号や機器に物理的に識別可能なIDを付与することにより、その機器を一意に特定することができるIDを付与する。 The control unit 22 of the device information transmission device 20 has a first ID assignment unit 22a and a transmission unit 22b. The first ID assignment unit 22a assigns an ID to each of the devices to be inspected and their configuration information. For example, the first ID assignment unit 22a assigns an ID that can uniquely identify a device to an externally input device to be inspected by assigning a serial number or an ID that can be physically identified to the device.
 また、第一のID付与部22aは、例えば、外部から入力された検査対象の機器の構成情報の種類に応じて、それぞれの情報を一意に特定することができるIDを付与する。なお、第一のID付与部22aは、IDを付与する際に重複を発見した場合は、そのIDを除外する。 The first ID assignment unit 22a also assigns an ID that can uniquely identify each piece of information, for example, depending on the type of configuration information of the device to be inspected that is input from outside. If the first ID assignment unit 22a finds a duplicate when assigning an ID, it excludes that ID.
 ここで、図3を参照し、第一のID付与部22aが構成情報についてIDを付与する処理について説明する。図3は、実施形態に係る機器の構成情報の具体例を示す図である。図3では、検査対象の機器の構成情報の種類として、アプリケーションを示す「app」、ファイルハッシュを示す「file/hash」、ファイル名を示す「file/name」の3種類が示されている。 Now, referring to FIG. 3, the process in which the first ID assignment unit 22a assigns an ID to configuration information will be described. FIG. 3 is a diagram showing a specific example of configuration information of a device according to an embodiment. In FIG. 3, three types of configuration information of the device to be inspected are shown: "app" indicating an application, "file/hash" indicating a file hash, and "file/name" indicating a file name.
 第一のID付与部22aは、構成情報が「app」の場合は、アプリ名及びバージョンを結合した値をハッシュ化した値をIDとして付与する。つまり、図3における「id1」は、アプリ名である「A」とバージョンである「1.0」を結合した値をハッシュ化した値となる。 When the configuration information is "app", the first ID assignment unit 22a assigns an ID that is a hashed value of the combined value of the app name and version. In other words, "id1" in FIG. 3 is a hashed value of the combined value of the app name "A" and the version "1.0".
 次に、第一のID付与部22aは、構成情報が「file/hash」の場合は、ファイルハッシュ値をそのままIDとして付与する。つまり、図3における「id4」は、ファイルハッシュ値である「1111aaaa」となる。そして、第一のID付与部22aは、構成情報が「file/name」の場合は、ファイル名をハッシュ化した値をIDとして付与する。つまり、図3における「id6」は、ファイル名である「Malware.exe」をハッシュ化した値となる。 Next, if the configuration information is "file/hash", the first ID assignment unit 22a assigns the file hash value as is as the ID. That is, "id4" in FIG. 3 becomes the file hash value "1111aaaa". Then, if the configuration information is "file/name", the first ID assignment unit 22a assigns the hashed value of the file name as the ID. That is, "id6" in FIG. 3 becomes the hashed value of the file name "Malware.exe".
 送信部22bは、付与されたIDを暗号化し、検査処理装置に送信する。例えば、送信部22bは、前述の第一のID付与部22aによって付与された、機器の構成情報についてのIDを暗号化し、機器についてのIDと暗号化された構成情報についてのIDを検査処理装置30に送信する。 The transmission unit 22b encrypts the assigned ID and transmits it to the inspection processing device. For example, the transmission unit 22b encrypts the ID for the configuration information of the device assigned by the first ID assignment unit 22a described above, and transmits the ID for the device and the ID for the encrypted configuration information to the inspection processing device 30.
 検査処理装置30の制御部32は、第二のID付与部32aと演算部32bと表示部32cとを有する。第二のID付与部32aは、検査に使用されるセキュリティリスク情報についてIDを付与する。そして、第二のID付与部32aは、後述する演算部32bに付与したIDを通知する。 The control unit 32 of the inspection processing device 30 has a second ID assignment unit 32a, a calculation unit 32b, and a display unit 32c. The second ID assignment unit 32a assigns an ID to the security risk information used in the inspection. The second ID assignment unit 32a then notifies the calculation unit 32b, which will be described later, of the assigned ID.
 例えば、第二のID付与部32aは、外部から入力された検査に使用される、脆弱性に関する情報やマルウェアに関するIOC(Indicator of Compromise)情報といったセキュリティリスク情報について、その情報を一意に特定することができるIDを付与し、演算部32bに通知する。 For example, the second ID assignment unit 32a assigns an ID that can uniquely identify security risk information, such as information about vulnerabilities and IOC (Indicator of Compromise) information about malware, that is used in testing input from outside, and notifies the calculation unit 32b.
 ここで、図4を参照し、第二のID付与部32aがセキュリティリスク情報についてIDを付与する処理について説明する。図4は、実施形態に係るセキュリティリスク情報の具体例を示す図である。図4では、セキュリティリスク情報の種類として、アプリケーションを示す「app」、ファイルハッシュを示す「file/hash」、ファイル名を示す「file/name」の3種類が示されている。 Now, referring to FIG. 4, the process in which the second ID assignment unit 32a assigns an ID to security risk information will be described. FIG. 4 is a diagram showing a specific example of security risk information according to an embodiment. In FIG. 4, three types of security risk information are shown: "app" indicating an application, "file/hash" indicating a file hash, and "file/name" indicating a file name.
 第二のID付与部32aは、脆弱性情報に関するリスクの種類が「app」の場合は、アプリ名及びバージョンを結合した値をハッシュ化した値をIDとして付与する。つまり、図4における「id1」は、アプリ名である「A」とバージョンである「1.0」を結合した値をハッシュ化した値となる。 If the risk type related to the vulnerability information is "app", the second ID assignment unit 32a assigns an ID that is a hashed value obtained by combining the app name and version. In other words, "id1" in FIG. 4 is a hashed value obtained by combining the app name "A" and the version "1.0".
 次に、第二のID付与部32aは、マルウェア情報に関するリスクの種類が「file/hash」の場合は、ファイルハッシュ値をそのままIDとして付与する。つまり、図4における「id4」は、ファイルハッシュ値である「1111aaaa」となる。そして、第二のID付与部32aは、マルウェア情報に関するリスクの種類が「file/name」の場合は、ファイル名をハッシュ化した値をIDとして付与する。つまり、図4における「id6」は、ファイル名である「Malware.exe」をハッシュ化した値となる。 Next, if the type of risk related to the malware information is "file/hash", the second ID assignment unit 32a assigns the file hash value as is as the ID. That is, "id4" in FIG. 4 becomes the file hash value "1111aaaa". Then, if the type of risk related to the malware information is "file/name", the second ID assignment unit 32a assigns the hashed value of the file name as the ID. That is, "id6" in FIG. 4 becomes the hashed value of the file name "Malware.exe".
 演算部32bは、暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項を求める。例えば、演算部32bは、受信情報記憶部33aに記憶された、機器情報送信装置20から送信された暗号化された構成情報についてのIDの集合と、第二のID付与部32aから通知された、セキュリティリスク情報についてのIDの集合の共通項を暗号化したまま求める。 The calculation unit 32b finds commonalities between the IDs for the encrypted configuration information and the IDs for the security risk information. For example, the calculation unit 32b finds commonalities between a set of IDs for the encrypted configuration information transmitted from the device information transmitting device 20 and stored in the received information storage unit 33a, and a set of IDs for the security risk information notified from the second ID assignment unit 32a, while still encrypted.
 また、演算部32bは、暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項数を求めてもよい。例えば、演算部32bは、暗号化された構成情報についてのIDの集合と、セキュリティリスク情報についてのIDの集合との共通項の数を求める。 The calculation unit 32b may also determine the number of common terms between the ID for the encrypted configuration information and the ID for the security risk information. For example, the calculation unit 32b determines the number of common terms between a set of IDs for the encrypted configuration information and a set of IDs for the security risk information.
 さらに、演算部32bは、暗号化された構成情報についてのIDの集合又はセキュリティリスク情報についてのIDの集合を任意の数の集合に分割し、分割された各集合それぞれについて、暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項を求めてもよい。 Furthermore, the calculation unit 32b may divide the set of IDs for the encrypted configuration information or the set of IDs for the security risk information into any number of sets, and for each of the divided sets, find common denominators between the IDs for the encrypted configuration information and the IDs for the security risk information.
 例えば、演算部32bは、暗号化された構成情報についてのIDの集合又はセキュリティリスク情報についてのIDの集合の要素が著しく多い場合、そのIDの集合を任意の数に分割し、分割された各集合それぞれについて、前述の共通項の算出処理を行う。 For example, if the set of IDs for encrypted configuration information or the set of IDs for security risk information has an extremely large number of elements, the calculation unit 32b divides the set of IDs into an arbitrary number of sets and performs the above-mentioned common denominator calculation process for each of the divided sets.
 ここで、図5を参照し、演算部32bによる機器の構成情報についてのIDの集合又はセキュリティリスク情報についてのIDの集合の分割処理について説明する。図5は、実施形態に係る演算部によるセキュリティリスク情報についてのIDの集合の分割処理の概要を示す図である。 Now, referring to FIG. 5, the process of dividing a set of IDs for device configuration information or a set of IDs for security risk information by the calculation unit 32b will be described. FIG. 5 is a diagram showing an overview of the process of dividing a set of IDs for security risk information by the calculation unit according to the embodiment.
 図5の例では、暗号化された構成情報のIDの集合がXとされ、セキュリティリスク情報のIDの集合がYとされており、演算部32bは、XとYの共通項を求める。ここで、集合X又はYの要素数が著しく多い場合、共通項を求めるにあたって、著しく処理時間を要し、リソースを消費する。そのため、このような場合に比較的短時間でリソース消費を少なく効率的に共通項を求めるために、X又はYの分割処理を行う。 In the example of FIG. 5, the set of IDs of the encrypted configuration information is designated as X, and the set of IDs of the security risk information is designated as Y, and the calculation unit 32b finds common terms between X and Y. Here, if the number of elements in set X or Y is extremely large, finding the common terms takes a significant amount of processing time and consumes resources. Therefore, in such cases, a division process of X or Y is performed to find the common terms efficiently in a relatively short time with minimal resource consumption.
 図5の例では、集合Yの要素の種類数が著しく多い場合であり、まず、演算部32bは、集合Yを任意のN個の集合に分割し、「Y1、Y2、・・・」とする。そして、演算部32bは、分割された部分集合「Y1、Y2、・・・」のそれぞれについて集合Xとの共通項数を求め、共通項数が1以上の部分集合を取り出す。図5の例では、集合Yは2個の集合に分割され、分割された部分集合「Y1」及び「Y2」はどちらも共通項数が1以上である。 In the example of FIG. 5, set Y has an extremely large number of types of elements, and first, the calculation unit 32b divides set Y into an arbitrary number of N sets, "Y1, Y2, ...". Then, the calculation unit 32b finds the number of common terms with set X for each of the divided subsets "Y1, Y2, ..." and extracts the subsets with the number of common terms of 1 or more. In the example of FIG. 5, set Y is divided into two sets, and both of the divided subsets "Y1" and "Y2" have the number of common terms of 1 or more.
 その後、例えば、演算部32bは、取り出した部分集合に対し、前述の一連の処理を部分集合の要素の種類数が予め設定された閾値を下回るまで繰り返し行う。図5の例では、取り出された部分集合「Y1」及び「Y2」が同様に2個の集合に分割され、部分集合「Y11」、「Y12」、「Y21」,「Y22」となり、その中で「Y11」と「Y22」の共通項数が1以上となっているため選出されるが、部分集合「Y11」及び「Y22」の要素の種類数が予め設定された閾値を下回ったため、演算部32bは分割処理を終了する。 Then, for example, the calculation unit 32b repeats the above-mentioned series of processes on the extracted subsets until the number of types of elements in the subset falls below a preset threshold. In the example of FIG. 5, the extracted subsets "Y1" and "Y2" are similarly divided into two sets, resulting in subsets "Y11", "Y12", "Y21", and "Y22", of which "Y11" and "Y22" are selected because they have 1 or more common terms, but because the number of types of elements in subsets "Y11" and "Y22" falls below a preset threshold, the calculation unit 32b ends the division process.
 また、演算部32bは、脆弱性の深刻度に関する情報によって絞り込まれた前記セキュリティリスク情報のIDと、暗号化された構成情報についてのIDとの共通項を求めてもよい。 The calculation unit 32b may also find common denominators between the ID of the security risk information narrowed down by information related to the severity of the vulnerability and the ID of the encrypted configuration information.
 例えば、演算部32bは、共通項を求める処理の処理時間やリソースの消費を少なくするために、セキュリティリスク情報記憶部33bに記憶された、脆弱性の深刻度を表すスコアであるCVSS(Common Vulnerability Scoring System)を参照し、照合するセキュリティリスク情報についてのIDを絞り込み、暗号化された構成情報についてのIDとの共通項を求める。 For example, in order to reduce the processing time and resource consumption of the process of finding common denominators, the calculation unit 32b refers to the Common Vulnerability Scoring System (CVSS), which is a score that indicates the severity of vulnerabilities and is stored in the security risk information storage unit 33b, narrows down the IDs for the security risk information to be matched, and finds common denominators with the IDs for the encrypted configuration information.
 表示部32cは、入力された機器IDに対応する検査結果を表示する。例えば、表示部32cは、外部から入力された機器IDに対して、検査結果情報記憶部33cに記憶された、そのIDに関連付けられた検査結果を表示する。 The display unit 32c displays the test results corresponding to the input device ID. For example, for a device ID input from outside, the display unit 32c displays the test results associated with that ID stored in the test result information storage unit 33c.
〔3.検査処理の具体例〕
 ここで、図6の例を用いて、検査システム10による機器の構成情報についての検査処理を説明する。図6は、実施形態に係る検査処理の具体例を示す図である。図6上部には、検査対象の機器の構成情報とそれに付与されたIDとが示されており、図6下部には、セキュリティリスク情報とそれに付与されたIDとが示されている。
3. Specific Examples of Inspection Processing
Here, the inspection process of the configuration information of the device by the inspection system 10 will be described using the example of Fig. 6. Fig. 6 is a diagram showing a specific example of the inspection process according to the embodiment. The upper part of Fig. 6 shows the configuration information of the device to be inspected and the ID assigned thereto, and the lower part of Fig. 6 shows the security risk information and the ID assigned thereto.
 演算部32bは、前述の暗号化された構成情報についてのIDの集合Xとセキュリティリスク情報についてのIDの集合Yの共通項を求める。例えば、演算部32bは、脆弱性に関する情報について検査する場合は、構成情報の種類及びリスク情報の種類が「app」であるIDを抽出し、共通項を求める。 The calculation unit 32b finds common denominators between the set X of IDs for the encrypted configuration information and the set Y of IDs for security risk information. For example, when inspecting information related to vulnerabilities, the calculation unit 32b extracts IDs whose type of configuration information and type of risk information are "app" and finds common denominators.
 つまり、図6の例では、X={id1、id2、id3}、Y={id1,id3}となり、その共通項X∩Y={id1,id3}となる。よって、検査対象の機器には脆弱性があり、その内容は「CVE-2022-XXXX」と、「CVE-2022-YYYY」に関するものであることが検査結果として明らかになる。 In other words, in the example in Figure 6, X = {id1, id2, id3}, Y = {id1, id3}, and the common term X ∩ Y = {id1, id3}. Therefore, the inspection results reveal that the device being inspected has vulnerabilities related to "CVE-2022-XXXX" and "CVE-2022-YYYY".
 また、演算部は、マルウェア感染に関する情報について検査する場合は、構成情報の種類及びリスク情報の種類が「file/*」であるIDを抽出し、共通項を求める。つまり、図6の例では、X={id4、id5、id6、id7}、Y={id4,id6,id9}となり、その共通項X∩Y={id4,id6}となる。よって、検査対象の機器はマルウェア感染が疑われることが検査結果として明らかになる。 Furthermore, when inspecting information related to malware infection, the calculation unit extracts IDs whose configuration information type and risk information type are "file/*" and finds common terms. That is, in the example of FIG. 6, X = {id4, id5, id6, id7}, Y = {id4, id6, id9}, and the common term X ∩ Y = {id4, id6}. Therefore, the inspection result reveals that the device being inspected is suspected of being infected with malware.
 なお、演算部32bが共通項を求める処理には、例えば、秘匿共通集合演算という仕組みが用いられ、送信部22bは、検査対象の機器の構成情報についてのIDを「F(x)=(x-id1)(x-id2)・・・」という関数を暗号化した状態で検査処理装置30に送信する。 The calculation unit 32b uses, for example, a mechanism called a secret intersection calculation to find the common denominator, and the transmission unit 22b transmits the ID of the configuration information of the device to be inspected to the inspection processing device 30 in an encrypted form using the function "F(x) = (x-id1) (x-id2) ...".
 そして、演算部32bは、セキュリティリスク情報についてのIDを前述のF(x)に代入すると、一致していた場合は戻り値が「0」となることで、共通しているIDのみを求めることができる。一方で、F(x)は暗号化されているため、一致していない箇所の構成情報については、明らかになることはない。 Then, when the calculation unit 32b substitutes the ID for the security risk information into the above-mentioned F(x), if there is a match, the return value will be "0", making it possible to find only the common ID. On the other hand, because F(x) is encrypted, the configuration information of the mismatched parts will not be revealed.
〔4.検査システムの検査処理の一例〕
 次に、図7及び図8を用いて、検査システム10の検査処理について説明する。図7は、実施形態に係る検査システムにおける機器情報送信装置による情報処理の流れを示すフローチャートであり、図8は、実施形態に係る検査システムにおける検査処理装置による情報処理の流れを示すフローチャートである。
4. An example of inspection processing by the inspection system
Next, the inspection process of the inspection system 10 will be described with reference to Fig. 7 and Fig. 8. Fig. 7 is a flowchart showing the flow of information processing by the device information transmission device in the inspection system according to the embodiment, and Fig. 8 is a flowchart showing the flow of information processing by the inspection processing device in the inspection system according to the embodiment.
 まず、図7を参照し機器情報送信装置20の処理について説明する。機器情報送信装置20は、検査対象の機器とその構成情報とを受付ける(ステップS101)。機器情報送信装置20が検査対象の機器とその構成情報とを受付けた場合(ステップS101;Yes)、第一のID付与部22aは、検査対象の機器とその構成情報とについて、それぞれIDを付与する(ステップS102)。 First, the process of the device information transmission device 20 will be described with reference to FIG. 7. The device information transmission device 20 receives the device to be inspected and its configuration information (step S101). When the device information transmission device 20 receives the device to be inspected and its configuration information (step S101; Yes), the first ID assignment unit 22a assigns an ID to the device to be inspected and its configuration information, respectively (step S102).
 一方、機器情報送信装置20が検査対象の機器とその構成情報とを受付けていない場合(ステップS101;No)、機器情報送信装置20は、検査対象の機器とその構成情報とを受付けるまで待機する。そして、送信部22bは、付与されたIDを暗号化して検査処理装置30に送信する(ステップS103)。 On the other hand, if the device information transmission device 20 has not received the device to be inspected and its configuration information (step S101; No), the device information transmission device 20 waits until it receives the device to be inspected and its configuration information. Then, the transmission unit 22b encrypts the assigned ID and transmits it to the inspection processing device 30 (step S103).
 次に、図8を参照し、検査処理装置30の処理について説明する。検査処理装置30は、セキュリティリスク情報を受付ける(ステップS201)。検査処理装置30がセキュリティリスク情報を受付けた場合(ステップS201;Yes)、第二のID付与部32aは、セキュリティリスク情報についてIDを付与する(ステップS202)。 Next, the processing of the inspection processing device 30 will be described with reference to FIG. 8. The inspection processing device 30 receives security risk information (step S201). If the inspection processing device 30 receives security risk information (step S201; Yes), the second ID assignment unit 32a assigns an ID to the security risk information (step S202).
 一方、検査処理装置30がセキュリティリスク情報を受付けていない場合(ステップS201;No)、検査処理装置30は、セキュリティリスク情報を受付けるまで待機する。そして、検査処理装置30は、機器情報送信装置20からの暗号化されたIDを受信する(ステップS203)。検査処理装置30が機器情報送信装置20からの暗号化されたIDを受信した場合(ステップS203;Yes)、演算部32bは、構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項を求める(ステップS204)。 On the other hand, if the inspection processing device 30 has not received security risk information (step S201; No), the inspection processing device 30 waits until it receives security risk information. Then, the inspection processing device 30 receives the encrypted ID from the device information transmission device 20 (step S203). If the inspection processing device 30 receives the encrypted ID from the device information transmission device 20 (step S203; Yes), the calculation unit 32b finds a common denominator between the ID for the configuration information and the ID for the security risk information (step S204).
 一方、検査処理装置30が機器情報送信装置20からの暗号化されたIDを受信していない場合(ステップS203;No)、検査処理装置30は、機器情報送信装置20からの暗号化されたIDを受信するまで待機する。その後、表示部32cは、機器IDの入力に応じて、そのIDに対応する検査結果を表示する(ステップS205)。 On the other hand, if the inspection processing device 30 has not received the encrypted ID from the device information transmission device 20 (step S203; No), the inspection processing device 30 waits until it receives the encrypted ID from the device information transmission device 20. After that, the display unit 32c displays the inspection results corresponding to the input device ID (step S205).
〔5.実施形態の効果〕
 上述してきたように、本実施形態に係る検査システム10は、機器情報送信装置20と検査処理装置30とを有する。そして、機器情報送信装置20は、検査対象の機器とその構成情報とにそれぞれIDを付与する第一のID付与部22aと、付与されたIDを暗号化し、検査処理装置30に送信する送信部22bとを有する。
5. Effects of the embodiment
As described above, the inspection system 10 according to this embodiment includes the equipment information transmission device 20 and the inspection processing device 30. The equipment information transmission device 20 includes a first ID assignment unit 22a that assigns an ID to each of the equipment to be inspected and its configuration information, and a transmission unit 22b that encrypts the assigned ID and transmits it to the inspection processing device 30.
 また、検査処理装置30は、検査に使用されるセキュリティリスク情報にIDを付与する第二のID付与部32aと、暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項を求める演算部32bと、入力された機器IDに対応する検査結果を表示する表示部32cとを有する。 The inspection processing device 30 also has a second ID assignment unit 32a that assigns an ID to the security risk information used in the inspection, a calculation unit 32b that determines the common denominator between the ID for the encrypted configuration information and the ID for the security risk information, and a display unit 32c that displays the inspection results corresponding to the input device ID.
 これにより、検査システム10は、検査対象の機器の構成情報を暗号化して検査処理装置30に送信し、暗号化されたまま検査が行われることにより、利用者の情報を外部に送信してリモートで検査を実施する場合であっても、情報漏洩のリスクを回避して、セキュリティ検査を実施することができるという効果を奏する。 As a result, the inspection system 10 encrypts the configuration information of the device to be inspected and transmits it to the inspection processing device 30, and the inspection is performed while still encrypted. This has the effect of making it possible to perform security inspections while avoiding the risk of information leaks, even when user information is transmitted externally and inspections are performed remotely.
 また、検査システム10の演算部32bは、暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項数を求める。これにより、検査システム10は、共通項数を求めることにより、検査処理によって求められた共通項のIDから検査者に構成情報が知られることを防ぎ、セキュリティ検査を実施することができるという効果を奏する。 The calculation unit 32b of the inspection system 10 also determines the number of common terms between the ID for the encrypted configuration information and the ID for the security risk information. As a result, by determining the number of common terms, the inspection system 10 has the effect of preventing the inspector from learning the configuration information from the ID of the common term determined by the inspection process, and enabling security inspection to be performed.
 さらに、検査システム10の演算部32bは、暗号化された構成情報についてのIDの集合又はセキュリティリスク情報についてのIDの集合を任意の数の集合に分割し、分割された各集合それぞれについて、暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項を求める。 Furthermore, the calculation unit 32b of the inspection system 10 divides the set of IDs for the encrypted configuration information or the set of IDs for the security risk information into any number of sets, and for each divided set, finds common denominators between the IDs for the encrypted configuration information and the IDs for the security risk information.
 これにより、検査システム10は、共通項を求める処理において、集合の要素が著しく多い場合であっても、比較的短時間及びリソース消費を少なくしてセキュリティ検査を実施することができるという効果を奏する。 As a result, the inspection system 10 has the advantage of being able to perform security inspections in a relatively short time and with minimal resource consumption in the process of finding common denominators, even when the set has a significantly large number of elements.
 さらに、検査システム10の演算部32bは、脆弱性の深刻度に関する情報によって絞り込まれたセキュリティリスク情報のIDと、暗号化された構成情報についてのIDとの共通項を求める。 Furthermore, the calculation unit 32b of the inspection system 10 finds common denominators between the ID of the security risk information narrowed down by information related to the severity of the vulnerability and the ID of the encrypted configuration information.
 これにより、検査システム10は、共通項を求める処理において、セキュリティリスク情報についてのIDの集合の要素が著しく多い場合であっても、照合するセキュリティリスク情報についてのIDを絞り込むことで、比較的短時間及びリソース消費を少なくしてセキュリティ検査を実施することができるという効果を奏する。 As a result, in the process of finding common denominators, the inspection system 10 has the advantage of being able to perform security inspections in a relatively short time and with minimal resource consumption by narrowing down the IDs for the security risk information to be compared, even if the set of IDs for the security risk information has an extremely large number of elements.
〔6.システム構成等〕
 上記実施形態において説明した各処理のうち、自動的に行われるものとして説明した処理の一部を手動的に行うこともできる。あるいは、手動的に行われるものとして説明した処理の全部または一部を公知の方法で自動的に行うこともできる。この他、上記文書中や図面中で示した処理手順、具体的名称、各種のデータやパラメータを含む情報については、特記する場合を除いて任意に変更することができる。例えば、各図に示した各種情報は、図示した情報に限られない。
[6. System configuration, etc.]
Of the processes described in the above embodiments, some of the processes described as being performed automatically can be performed manually. Alternatively, all or some of the processes described as being performed manually can be performed automatically by a known method. In addition, the information including the processing procedures, specific names, various data and parameters shown in the above documents and drawings can be changed arbitrarily unless otherwise specified. For example, the various information shown in each drawing is not limited to the illustrated information.
 また、図示した各装置の各構成要素は機能概念的なものであり、必ずしも物理的に図示の如く構成されていることを要しない。すなわち、各装置の分散・統合の具体的形態は図示のものに限られず、その全部または一部を、各種の負荷や使用状況などに応じて、任意の単位で機能的または物理的に分散・統合して構成することができる。さらに、各装置にて行なわれる各処理機能は、その全部又は任意の一部が、CPU及び当該CPUにて解析実行されるプログラムにて実現され、あるいは、ワイヤードロジックによるハードウェアとして実現され得る。 Furthermore, each component of each device shown in the figure is a functional concept, and does not necessarily have to be physically configured as shown in the figure. In other words, the specific form of distribution and integration of each device is not limited to that shown in the figure, and all or part of it can be functionally or physically distributed and integrated in any unit depending on various loads and usage conditions. Furthermore, each processing function performed by each device can be realized in whole or in part by a CPU and a program analyzed and executed by the CPU, or can be realized as hardware using wired logic.
 例えば、図2に示した記憶部23又は記憶部33の一部又は全部は、検査システム10が有する機器情報送信装置20又は検査処理装置30によって保持されるのではなく、ストレージサーバ等に保持されてもよい。この場合、機器情報送信装置20又は検査処理装置30は、ストレージサーバにアクセスすることで、各種情報を取得する。 For example, a part or all of the memory unit 23 or memory unit 33 shown in FIG. 2 may be stored in a storage server or the like, rather than being stored in the device information transmission device 20 or the inspection processing device 30 of the inspection system 10. In this case, the device information transmission device 20 or the inspection processing device 30 obtains various information by accessing the storage server.
〔7.ハードウェア構成〕
 図9は、ハードウェア構成の一例を示す図である。上述してきた実施形態に係る検査システム10が有する機器情報送信装置20及び検査処理装置30は、例えば図9に示すような構成のコンピュータ1000によって実現される。
7. Hardware Configuration
Fig. 9 is a diagram showing an example of a hardware configuration. The device information transmission device 20 and the inspection processing device 30 included in the inspection system 10 according to the embodiment described above are realized by a computer 1000 having a configuration as shown in Fig. 9, for example.
 図9は、検査プログラムを実行するコンピュータの一例を示す図である。コンピュータ1000は、例えば、メモリ1010、CPU1020を有する。また、コンピュータ1000は、ハードディスクドライブインタフェース1030、ディスクドライブインタフェース1040、シリアルポートインタフェース1050、ビデオアダプタ1060、ネットワークインタフェース1070を有する。これらの各部は、バス1080によって接続される。 FIG. 9 is a diagram showing an example of a computer that executes a test program. The computer 1000 has, for example, a memory 1010 and a CPU 1020. The computer 1000 also has a hard disk drive interface 1030, a disk drive interface 1040, a serial port interface 1050, a video adapter 1060, and a network interface 1070. Each of these components is connected by a bus 1080.
 メモリ1010は、ROM(Read Only Memory)1011及びRAM1012を含む。ROM1011は、例えば、BIOS(Basic Input Output System)等のブートプログラムを記憶する。ハードディスクドライブインタフェース1030は、ハードディスクドライブ1090に接続される。ディスクドライブインタフェース1040は、ディスクドライブ1100に接続される。例えば磁気ディスクや光ディスク等の着脱可能な記憶媒体が、ディスクドライブ1100に挿入される。シリアルポートインタフェース1050は、例えばマウス1110、キーボード1120に接続される。ビデオアダプタ1060は、例えばディスプレイ1130に接続される。 The memory 1010 includes a ROM (Read Only Memory) 1011 and a RAM 1012. The ROM 1011 stores a boot program such as a BIOS (Basic Input Output System). The hard disk drive interface 1030 is connected to a hard disk drive 1090. The disk drive interface 1040 is connected to a disk drive 1100. A removable storage medium such as a magnetic disk or optical disk is inserted into the disk drive 1100. The serial port interface 1050 is connected to a mouse 1110 and a keyboard 1120, for example. The video adapter 1060 is connected to a display 1130, for example.
 ハードディスクドライブ1090は、例えば、OS(Operating System)1091、アプリケーションプログラム1092、プログラムモジュール1093、プログラムデータ1094を記憶する。すなわち機器情報送信装置20又は検査処理装置30の各処理を規定するプログラムは、コンピュータ1000により実行可能なコードが記述されたプログラムモジュール1093として実装される。プログラムモジュール1093は、例えばハードディスクドライブ1090に記憶される。例えば、機器情報送信装置20又は検査処理装置30における機能構成と同様の処理を実行するためのプログラムモジュール1093が、ハードディスクドライブ1090に記憶される。なお、ハードディスクドライブ1090は、SSD(Solid State Drive)により代替されてもよい。 The hard disk drive 1090 stores, for example, an OS (Operating System) 1091, an application program 1092, a program module 1093, and program data 1094. That is, the program that defines each process of the device information transmission device 20 or the inspection processing device 30 is implemented as a program module 1093 in which code executable by the computer 1000 is written. The program module 1093 is stored, for example, in the hard disk drive 1090. For example, a program module 1093 for executing a process similar to the functional configuration of the device information transmission device 20 or the inspection processing device 30 is stored in the hard disk drive 1090. The hard disk drive 1090 may be replaced by an SSD (Solid State Drive).
 また、上述した実施の形態の処理で用いられる設定データは、プログラムデータ1094として、例えばメモリ1010やハードディスクドライブ1090に記憶される。そして、CPU1020が、メモリ1010やハードディスクドライブ1090に記憶されたプログラムモジュール1093やプログラムデータ1094を必要に応じてRAM1012に読み出して実行する。 Furthermore, the setting data used in the processing of the above-mentioned embodiment is stored as program data 1094, for example, in memory 1010 or hard disk drive 1090. Then, the CPU 1020 reads the program module 1093 or program data 1094 stored in memory 1010 or hard disk drive 1090 into RAM 1012 as necessary and executes it.
 なお、プログラムモジュール1093やプログラムデータ1094は、ハードディスクドライブ1090に記憶される場合に限らず、例えば着脱可能な記憶媒体に記憶され、ディスクドライブ1100等を介してCPU1020によって読み出されてもよい。あるいは、プログラムモジュール1093及びプログラムデータ1094は、ネットワーク(LAN、WAN等)を介して接続された他のコンピュータに記憶されてもよい。そして、プログラムモジュール1093及びプログラムデータ1094は、他のコンピュータから、ネットワークインタフェース1070を介してCPU1020によって読み出されてもよい。 The program module 1093 and program data 1094 are not limited to being stored in the hard disk drive 1090, but may be stored in, for example, a removable storage medium and read by the CPU 1020 via the disk drive 1100 or the like. Alternatively, the program module 1093 and program data 1094 may be stored in another computer connected via a network (LAN, WAN, etc.). The program module 1093 and program data 1094 may then be read by the CPU 1020 from the other computer via the network interface 1070.
 10    検査システム
 20    機器情報送信装置
 21、31 通信部
 22、32 制御部
 22a   第一のID付与部
 22b   送信部
 23、33 記憶部
 23a   機器情報記憶部
 32a   第二のID付与部
 32b   演算部
 32c   表示部
 33a   受信情報記憶部
 33b   セキュリティリスク情報記憶部
 33c   検査結果情報記憶部
REFERENCE SIGNS LIST 10 Inspection system 20 Device information transmission device 21, 31 Communication unit 22, 32 Control unit 22a First ID assignment unit 22b Transmission unit 23, 33 Storage unit 23a Device information storage unit 32a Second ID assignment unit 32b Calculation unit 32c Display unit 33a Received information storage unit 33b Security risk information storage unit 33c Inspection result information storage unit

Claims (6)

  1.  機器情報送信装置と検査処理装置とを有する検査システムであって、
     前記機器情報送信装置は、
     検査対象の機器とその構成情報とについて、それぞれIDを付与する第一のID付与部と、
     付与されたIDを暗号化し、前記検査処理装置に送信する送信部を有し、
     前記検査処理装置は、
     検査に使用されるセキュリティリスク情報についてIDを付与する第二のID付与部と、
     暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項を求める演算部と、
     入力された機器IDに対応する検査結果を表示する表示部を有する
     ことを特徴とする検査システム。
    An inspection system having an equipment information transmission device and an inspection processing device,
    The device information transmission device includes:
    a first ID assignment unit that assigns an ID to each of a test target device and its configuration information;
    a transmission unit that encrypts the assigned ID and transmits it to the inspection processing device;
    The inspection processing device includes:
    a second ID assigning unit that assigns an ID to the security risk information used in the inspection;
    a calculation unit for determining a common denominator between an ID for the encrypted configuration information and an ID for the security risk information;
    An inspection system comprising: a display unit that displays an inspection result corresponding to an input device ID.
  2.  前記演算部は、暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項数を求める
     ことを特徴とする請求項1に記載の検査システム。
    The inspection system according to claim 1 , wherein the calculation unit calculates the number of common terms between an ID for the encrypted configuration information and an ID for the security risk information.
  3.  前記演算部は、前記暗号化された構成情報についてのIDの集合又は前記セキュリティリスク情報についてのIDの集合を任意の数の集合に分割し、分割された各集合それぞれについて、暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項を求める
     ことを特徴とする請求項1に記載の検査システム。
    The inspection system described in claim 1, characterized in that the calculation unit divides a set of IDs for the encrypted configuration information or a set of IDs for the security risk information into any number of sets, and for each of the divided sets, finds common denominators between the IDs for the encrypted configuration information and the IDs for the security risk information.
  4.  前記演算部は、脆弱性の深刻度に関する情報によって絞り込まれた前記セキュリティリスク情報のIDと、暗号化された構成情報についてのIDとの共通項を求める
     ことを特徴とする請求項1に記載の検査システム。
    The inspection system according to claim 1 , wherein the calculation unit finds common denominators between an ID of the security risk information narrowed down based on information about a severity of vulnerability and an ID of encrypted configuration information.
  5.  機器情報送信装置と検査処理装置とを有する検査システムで実行される検査方法あって、
     前記機器情報送信装置は、
     検査対象の機器とその構成情報とについて、それぞれIDを付与する第一のID付与工程と、
     付与されたIDを暗号化し、前記検査処理装置に送信する送信工程を含み、
     前記検査処理装置は、
     検査に使用されるセキュリティリスク情報についてIDを付与する第二のID付与工程と、
     暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項を求める演算工程と、
     入力された機器IDに対応する検査結果を表示する表示工程を含む
     ことを特徴とする検査方法。
    An inspection method performed in an inspection system having an equipment information transmission device and an inspection processing device,
    The device information transmission device includes:
    a first ID assignment step of assigning an ID to each of the devices to be inspected and their configuration information;
    a transmission step of encrypting the assigned ID and transmitting it to the inspection processing device;
    The inspection processing device includes:
    a second ID assignment step of assigning an ID to the security risk information used in the inspection;
    A calculation step of determining a common denominator between an ID for the encrypted configuration information and an ID for the security risk information;
    An inspection method comprising the steps of: displaying an inspection result corresponding to an input device ID.
  6.  方法をコンピュータに実行させる検査プログラムであって、
     前記機器情報送信装置としてのコンピュータに、
     検査対象の機器とその構成情報とについて、それぞれIDを付与する第一のID付与ステップと、
     付与されたIDを暗号化し、前記検査処理装置としてのコンピュータに送信する送信ステップと
     を実行させ、
     前記検査処理装置としてのコンピュータに、
     検査に使用されるセキュリティリスク情報についてIDを付与する第二のID付与ステップと、
     暗号化された構成情報についてのIDとセキュリティリスク情報についてのIDとの共通項を求める演算ステップと、
     入力された機器IDに対応する検査結果を表示する表示ステップと
     を実行させることを特徴とする検査プログラム。
    An inspection program for causing a computer to execute the method,
    The computer as the device information transmission device includes:
    a first ID assignment step of assigning an ID to each of the inspection target devices and their configuration information;
    a transmission step of encrypting the assigned ID and transmitting it to the computer serving as the inspection processing device;
    The computer as the inspection processing device includes:
    a second ID assignment step of assigning an ID to the security risk information used for the inspection;
    A calculation step of determining a common denominator between an ID for the encrypted configuration information and an ID for the security risk information;
    and a display step of displaying the inspection result corresponding to the input device ID.
PCT/JP2022/043826 2022-11-28 2022-11-28 Inspection system, inspection method, and inspection program WO2024116251A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2022/043826 WO2024116251A1 (en) 2022-11-28 2022-11-28 Inspection system, inspection method, and inspection program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2022/043826 WO2024116251A1 (en) 2022-11-28 2022-11-28 Inspection system, inspection method, and inspection program

Publications (1)

Publication Number Publication Date
WO2024116251A1 true WO2024116251A1 (en) 2024-06-06

Family

ID=91323255

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2022/043826 WO2024116251A1 (en) 2022-11-28 2022-11-28 Inspection system, inspection method, and inspection program

Country Status (1)

Country Link
WO (1) WO2024116251A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170177877A1 (en) * 2015-12-18 2017-06-22 Amazon Technologies, Inc. Software container registry inspection
US20190347423A1 (en) * 2018-05-10 2019-11-14 Microsoft Technology Licensing, Llc Systems and methods for attributing security vulnerabilities to a configuration of a client device
JP2022517494A (en) * 2018-12-18 2022-03-09 インターナショナル・ビジネス・マシーンズ・コーポレーション Secure multi-party detection of sensitive data using confidential intersection operations (PSI)

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170177877A1 (en) * 2015-12-18 2017-06-22 Amazon Technologies, Inc. Software container registry inspection
US20190347423A1 (en) * 2018-05-10 2019-11-14 Microsoft Technology Licensing, Llc Systems and methods for attributing security vulnerabilities to a configuration of a client device
JP2022517494A (en) * 2018-12-18 2022-03-09 インターナショナル・ビジネス・マシーンズ・コーポレーション Secure multi-party detection of sensitive data using confidential intersection operations (PSI)

Similar Documents

Publication Publication Date Title
US10348747B2 (en) Non-transitory computer-readable recording medium storing cyber attack analysis support program, cyber attack analysis support method, and cyber attack analysis support device
Holm et al. An expert-based investigation of the common vulnerability scoring system
CN106687981B (en) System and method for automated detection of input and output verification and resource management vulnerabilities
US8881271B2 (en) System and method for forensic identification of elements within a computer system
US11861006B2 (en) High-confidence malware severity classification of reference file set
EP3791302A1 (en) Systems and methods for attributing security vulnerabilities to a configuration of a client device
US11418534B2 (en) Threat analysis system and threat analysis method
US11057411B2 (en) Log analysis device, log analysis method, and log analysis program
CN109376534B (en) Method and apparatus for detecting applications
US10560467B2 (en) Non-transitory computer-readable recording medium storing control program, control method, and information processing device
Weir et al. Infiltrating security into development: exploring the world’s largest software security study
Koch et al. The {OK} is not enough: A large scale study of consent dialogs in smartphone applications
Johnson et al. A taxonomy and review of remote attestation schemes in embedded systems
WO2024116251A1 (en) Inspection system, inspection method, and inspection program
JP2005242754A (en) Security management system
Kolesnikov et al. On the relation of control-flow and performance feature interactions: a case study
CN115119197B (en) Wireless network risk analysis method, device, equipment and medium based on big data
KR102304237B1 (en) compliance management system through automatic diagnosis of infrastructure asset threat and method therefor
TWI682281B (en) Information processing device, information processing method and computer readable recording medium
US20180115570A1 (en) System and method for categorizing malware
KR20190090436A (en) Apparatus, method and system for checking vulnerable point
CN114036068A (en) Update detection method, device, equipment and storage medium based on privacy security
US11799894B2 (en) Dual network security assessment engine
US10754719B2 (en) Diagnosis device, diagnosis method, and non-volatile recording medium
Somayaji et al. Evaluating Security Products with Clinical Trials.