Information processor, method and program for controlling incident response device
    1.
    发明申请
    Information processor, method and program for controlling incident response device 审中-公开
    用于控制事件响应设备的信息处理器,方法和程序

    公开(公告)号:US20070107041A1

    公开(公告)日:2007-05-10

    申请号:US11386787

    申请日:2006-03-23

    IPC分类号: H04L9/00

    摘要: An information processor, which controls an incident response device to perform an incident response toward a communication device, realizes the following functions: detecting an incident occurrence in the communication device; storing response information which is information indicative of the incident response that the incident response unit should perform, and target information which is information to identify the communication device, with corresponding policy information regarding a response policy to an incident; outputting a list of the policy information when the incident occurrence is detected; receiving a selection of the policy information; retrieving the response information and the target information corresponding to the selected policy information, from the memory; and sending the incident response unit a command to perform the incident response based on the retrieved response information toward the communication device identified based on the retrieved target information.

    摘要翻译: 控制事件响应装置对通信装置进行事件响应的信息处理装置实现以下功能:检测通信装置中的事件发生; 存储作为事件响应单元应该执行的事件响应的信息的响应信息和作为​​用于识别通信设备的信息的目标信息,以及关于事件的响应策略的相应策略信息; 当检测到事件发生时输出策略信息的列表; 接收政策信息的选择; 从所述存储器检索对应于所选择的策略信息的所述响应信息和所述目标信息; 以及基于所检索到的基于所检索到的目标信息识别的通信设备的响应信息,发送所述事件响应单元执行所述事件响应的命令。

    Unauthorized operation detection system and unauthorized operation detection method
    2.
    发明授权
    Unauthorized operation detection system and unauthorized operation detection method 有权
    未经授权的操作检测系统和未经授权的操作检测方法

    公开(公告)号:US08850592B2

    公开(公告)日:2014-09-30

    申请号:US12808130

    申请日:2010-04-02

    摘要: The content of operations is identified and an alert is generated to an operation having a high risk of information leakage.An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.

    摘要翻译: 识别操作的内容,并且对具有高信息泄漏风险的操作产生警报。 代理监视例如关于在客户端PC上显示的对话执行的操作。 如果通过对显示的对话执行的操作来选择文件,则代理将指定文件的源的标识符分配给该文件。 如果文件作为附件发送,代理将识别所附文件的输出目的地以及所附文件的源; 并且如果附加文件的输出目的地是外部Web服务器,并且所附加文件的源是邮件服务器,则代理通过确定已经执行了未经授权的操作来生成警报; 然后将生成的警报发送到管理服务器。

    Information processing limitation system and information processing limitation device
    6.
    发明申请
    Information processing limitation system and information processing limitation device 审中-公开
    信息处理限制系统和信息处理限制装置

    公开(公告)号:US20100058441A1

    公开(公告)日:2010-03-04

    申请号:US12310624

    申请日:2009-02-17

    IPC分类号: G06F21/00

    摘要: This information processing limitation system includes an information processing server computer 103 which provides an information processing service, and a terminal computer 101 which is coupled to the information processing server computer 103 and utilizes that information processing service. The terminal computer 101, when utilizing the information processing service, limits the utilization of the information processing service on the basis of a security state which is required for the utilization of the information processing service.

    摘要翻译: 该信息处理限制系统包括提供信息处理服务的信息处理服务器计算机103和耦合到信息处理服务器计算机103并利用该信息处理服务的终端计算机101。 终端计算机101在利用信息处理服务时,基于信息处理服务的使用所需的安全状态来限制信息处理服务的利用。

    METHOD AND SYSTEM FOR DETECTING IMPROPER OPERATION AND COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM
    7.
    发明申请
    METHOD AND SYSTEM FOR DETECTING IMPROPER OPERATION AND COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM 审中-公开
    用于检测不正确操作的方法和系统以及可计算机非可用存储介质

    公开(公告)号:US20120215908A1

    公开(公告)日:2012-08-23

    申请号:US13130959

    申请日:2011-02-18

    IPC分类号: G06F15/173

    摘要: An embodiment of this invention detects an improper operation to a file in a computer of a monitoring target in a computer system including a plurality of computers connected via a network. The monitoring target computer receives a file. The computer receives acquisition source information on the file transmitted from a different computer. The computer refers to information on improper operation requirements to determine whether transmission of the file meets the improper operation requirements or not, based on a combination of the acquisition source of the file indicated by the acquisition source information and a transmission destination of the file and if the improper operation requirements are met, it determines that the transmission of the file is an improper operation.

    摘要翻译: 本发明的实施例检测对包括通过网络连接的多个计算机的计算机系统中的监视目标的计算机中的文件的不正确操作。 监视目标计算机接收文件。 计算机接收从不同计算机发送的文件的获取源信息。 计算机是指基于由采集源信息指示的文件的获取源与文件的发送目的地的组合来确定文件的传输是否满足不正确的操作要求的信息,如果 满足不正确的操作要求,确定文件的传输是不正确的操作。

    UNAUTHORIZED OPERATION DETECTION SYSTEM AND UNAUTHORIZED OPERATION DETECTION METHOD
    9.
    发明申请
    UNAUTHORIZED OPERATION DETECTION SYSTEM AND UNAUTHORIZED OPERATION DETECTION METHOD 有权
    未经授权的操作检测系统和未经授权的操作检测方法

    公开(公告)号:US20110289589A1

    公开(公告)日:2011-11-24

    申请号:US12808130

    申请日:2010-04-02

    IPC分类号: G06F21/00

    摘要: The content of operations is identified and an alert is generated to an operation having a high risk of information leakage.An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.

    摘要翻译: 识别操作的内容,并且对具有高信息泄漏风险的操作产生警报。 代理监视例如关于在客户端PC上显示的对话执行的操作。 如果通过对显示的对话执行的操作来选择文件,则代理将指定文件的源的标识符分配给该文件。 如果文件作为附件发送,代理将识别所附文件的输出目的地以及所附文件的源; 并且如果附加文件的输出目的地是外部Web服务器,并且所附加文件的源是邮件服务器,则代理通过确定已经执行了未经授权的操作来生成警报; 然后将生成的警报发送到管理服务器。

    System for managing a network
    10.
    发明授权
    System for managing a network 失效
    用于管理网络的系统

    公开(公告)号:US07194530B2

    公开(公告)日:2007-03-20

    申请号:US10212709

    申请日:2002-08-07

    IPC分类号: G06F15/16

    摘要: In an integrated management system for providing a network system having a plurality of computers with a security function and managing a plurality of target products, implementation of the management system itself is facilitated by providing the management system with setting information templates prepared for respective target products, a management program for managing setting information files of target products actually used in a target network, an edit program for editing setting information files, and an install program for installing setting information files created by using the management program and the edit program in respective target devices.

    摘要翻译: 在用于提供具有安全功能的多台计算机和管理多个目标产品的网络系统的集成管理系统中,通过向管理系统提供为各个目标产品准备的设置信息模板来实现管理系统本身, 用于管理目标网络中实际使用的目标产品的设置信息文件的管理程序,用于编辑设置信息文件的编辑程序,以及用于安装在各个目标设备中使用管理程序和编辑程序创建的设置信息文件的安装程序 。