WO2012001763A1 - 計算機システムの管理方法及びクライアントコンピュータ - Google Patents
計算機システムの管理方法及びクライアントコンピュータ Download PDFInfo
- Publication number
- WO2012001763A1 WO2012001763A1 PCT/JP2010/061000 JP2010061000W WO2012001763A1 WO 2012001763 A1 WO2012001763 A1 WO 2012001763A1 JP 2010061000 W JP2010061000 W JP 2010061000W WO 2012001763 A1 WO2012001763 A1 WO 2012001763A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- information
- monitoring module
- destination
- management
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/164—File meta data generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
Definitions
- Patent Document 1 As an operation detection system that detects a malicious operation or a suspicious operation.
- an administrator user creates a malicious operation pattern in advance and registers it in the database of the log analysis server, and then matches the contents of the user operation log recorded in advance. Judge the danger according to the degree.
- the present invention uses information on the operation history of a file as additional meta information.
- the additional meta information is stored in a predetermined storage area in the file or another area outside the file.
- the meta information can include file storage identification information given when the file is stored in the file system of the client computer, operation generation identification information indicating the number of operations, and copy number information indicating the number of copies. .
- meta information is created and associated with the destination file.
- the meta information is also sent to and stored in the management device. Based on the meta information held by the management apparatus, the operation history of the file can be detected and displayed.
- the present invention includes an unauthorized operation detection system for detecting unauthorized file operations.
- the unauthorized operation detection system includes a monitoring device and a management terminal.
- the monitoring device monitors operations on information on the screen of the output device connected to the monitoring target, with the microprocessor of the client computer as the monitoring target.
- the management terminal manages the monitoring result of the monitoring device with the monitoring device as a management target.
- the monitoring device In response to an operation for inputting information to the monitoring target, the monitoring device identifies the acquisition source of the input information input to the monitoring target and assigns an identifier indicating the acquisition source of the input information to the input information.
- the output destination of the output information output from the monitoring target is identified, the identifier indicating the source of the output information is searched, and the identified output information It is determined whether or not the combination of the output destination and the source from which the retrieved output information is obtained meets the conditions for the unauthorized operation, and an alert is generated according to the determination result.
- FIG. 6 is a diagram illustrating an example of a sequence executed between a user operation, a dialog operation monitoring module, a browser monitoring module, and a file operation monitoring module when a file is imported by a Web browser.
- FIG. 14 shows how meta information (in-file trace information) is generated in accordance with a file operation according to the second embodiment of the present invention.
- FIG. 24 shows a state in which a copy operation is performed from the state shown on the right side.
- FIG. 25 shows a state where the file name has been changed from the state shown on the right side.
- FIG. 26 shows a state where the file has been moved from the state shown on the right side.
- FIG. 27 shows a state where a file is deleted from the state shown on the right side.
- An example of tracing file operations based on information stored in the management server is shown.
- An example of in-file trace information is shown. The sequence which monitors the file operation by a user is shown. It is a flowchart which shows the process which creates or updates in-file trace information.
- the table for converting a count value into a character code is shown.
- a state in which a character code is added to the last digit of the operation identifier when the number of times of copying reaches a predetermined number of times of copying is shown. If the file is illegally operated after the number of operations (number of operation generations) reaches the predetermined number of operations, the number of digits of the operation identifier is set to the upper limit value.
- the file operation history is displayed in a tree structure.
- a part of a database used for tracking an operation history such as a file attached to an e-mail is shown.
- a state in which an operation history of a file attached to an e-mail is displayed in a tree structure is shown.
- a configuration example of a client computer according to the third embodiment is shown.
- the configuration of the agent program is shown.
- the monitoring sequence in the case of downloading a file using a web browser is shown.
- the monitoring sequence in the case of uploading a file using a web browser is shown.
- the monitoring sequence in the case of receiving an electronic mail is shown.
- the monitoring sequence in the case of transmitting an e-mail is shown.
- Fig. 2 shows a part of a database used for monitoring the operation history of a file downloaded via a web browser.
- Fig. 2 shows a part of a database used for monitoring the operation history of files uploaded via a web browser.
- a part of the database used for monitoring the operation history of a file attached to a transmitted e-mail is shown.
- history of operation of a file is shown.
- the operation contents of an application program running on a client PC are monitored, the source of the input information input to the client PC is identified, and the input information includes First means for assigning an identifier indicating the source of input information, and identifying the output destination of the output information output from the client PC, inspecting the identifier assigned to the output information, It has a 2nd means which produces
- FIG. 1 is a system configuration diagram showing an embodiment of the unauthorized operation detection system of the present invention.
- a LAN (LOCAL Area Network) 117 in an information center 101 and a network 124 in a base 102 are connected by a wide area network 103, and the information center 101 is further connected to the Internet via the wide area network 104. It is assumed that it is connected to
- the unauthorized operation detection system includes a management server 111 installed in the information center 101 and a client PC 121 installed in the base 102.
- the management server 111 uses the information center 101 and the base 102 as management areas. For example, a mail server 114, a file server 115, an in-house Web server 116, a client PC 121, and a network printer 123 are arranged in the management area. Etc. are managed, and these managed objects are managed.
- a manager 112 that controls the entire unauthorized operation detection system and a disk 113 that stores a PC management DB (DataBase) used by the manager to manage a plurality of client PCs operate.
- the management server 111 corresponds to “management terminal” and / or “management device”.
- Each client PC 121 is composed of a microprocessor loaded with various application programs.
- each client PC 121 is a monitoring target, and an agent 122 is operated as a monitoring device that monitors an operation on information on the screen of the output device connected to the monitoring target.
- the client PC 121 is configured as a computer such as a personal computer, a portable information terminal, a mobile phone, or the like.
- the user who uses the client PC 121 performs business using e-mail, Web server, file server, and the like. Therefore, in the information center 101, a mail server 114, a file server 115, and an in-house Web server 116 are installed and connected to the LAN 117. Further, an external web server 131 that can be accessed from the client PC 121 is connected to the Internet.
- a network printer 123 used for printing is connected to the network 124 in the base 102.
- the removable medium 125 such as a flash memory is a device that is excluded from the management target of the management server 111 and is processed as an inspection target.
- FIG. 22 is a block diagram showing an example of the configuration of the management server 111 in the present invention.
- the management server 111 includes a CPU (Central Processing Unit) 2201, a bus 2202, a memory 2203, a PC management DB 2204 in the disks 113 and 113, a network I / F 2205, a device I / F 2206, an input device 2208, and a display device 2209.
- the device I / F 2206 includes, for example, a USB (Universal Serial Bus) interface.
- An OS (Operating System) 2207 is loaded on the memory 2203, and the manager program 112 is operating.
- FIG. 2 is a block diagram showing an example of the configuration of the client PC 121 in the present invention.
- the client PC 121 includes a CPU (Central Processing Unit) 201, a bus 202, a memory 203, a local file system 204, a network I / F 205, a device I / F 206, a disk 209, an input device 210, and a display device 211.
- the device I / F 206 includes, for example, a USB (Universal Serial Bus) interface.
- An OS (Operating System) 207 is loaded on the memory 203.
- a program of agent 122 which is a component of the unauthorized operation detection system, and a plurality of application programs such as file explorer, Web browser (may be abbreviated as browser), mailer, word processor or spreadsheet software (application and 208 is stored in the memory 203 and is operating.
- application programs such as file explorer, Web browser (may be abbreviated as browser), mailer, word processor or spreadsheet software (application and 208 is stored in the memory 203 and is operating.
- the user using the client PC 121 uses any one of the application programs 208 to attach a file attached to the mail addressed to the user who arrived at the mail server 114, or a file stored in the file server 115, or
- the file registered in the in-house Web server 116 is stored as a local file in the local file system 204 in the disk 209 in the file system format of the client PC 121.
- the file 209 stored in the local file system 204 may be exported to the outside of the client PC 121 using any of the application programs 208.
- the file is copied to a removable medium connected to the device I / F 206 by using a file explorer, or is printed by the network printer 123 by using a print function of a word processor or spreadsheet software.
- attach a file to the mail body created by the mailer send the file to other parties inside or outside the organization, or upload the file to a web server inside or outside the organization.
- FIG. 21 is a diagram illustrating an example of a screen when the user operates the application on the client PC 121 to import a file.
- a link On the Web browser screen (screen of the output device connected to the client PC 121) 2101 there is an area called a link.
- a pointing device an input device such as a mouse connected to the client PC 121
- a screen transition or the like is caused.
- the mouse cursor is placed on the link character string 2102 and the left button is clicked, the next dialog (also called a page) is displayed, or the download dialog for downloading the target (file) at the clicked link destination Processing for displaying 2111 is executed.
- a pop-up window called a context menu is displayed.
- the context menu 2103 displayed here there is an item “save target in a file (A)...”. By left-clicking on this item, processing for displaying a download dialog 2111 for downloading the target is performed. Executed.
- the download dialog 2111 includes a field 2112 indicating a location where the downloaded file is stored, a field 2113 displaying a selection of a save destination folder, and 2114 indicating a file name to be stored.
- the file name to be saved can be rewritten.
- the user operates the fields 2112 and 2113 to select a folder in which to save the file, changes the save file name in the field 2114 as necessary, and clicks the save button 2115, so that the file can be saved using a web browser. You can download and save the file in any folder.
- FIG. 3 is a diagram showing an example of the module configuration of the agent 122 operating on the client PC 121.
- the agent 122 includes a manager communication function module 301 that is responsible for communication with the manager 112 and a monitoring module control module 302 that controls various monitoring modules that monitor user operations on the client PC 121.
- the agent 122 includes a process monitoring module 310, a printer monitoring module 320, a browser monitoring module 330, a dialog operation monitoring module 340, a file operation monitoring module 350, and a TCP communication monitoring module 360.
- the process monitoring module 310 monitors the operation status of the application program 303 running on the client PC 121.
- the printer monitoring module 320 monitors an output operation to the printer 304 including the network printer 123.
- the browser monitoring module 330 monitors user operations by the web browser 305.
- the dialog operation monitoring module 340 monitors various dialogs 306 displayed on the screen of the client PC 121 and used by the user to select a file when downloading or uploading.
- the file operation monitoring module 350 uses a pointing device such as a mouse to operate the various applications 307 displayed on the screen (for example, button clicks or displayed in the application window). (E.g. drag and drop).
- TCP communication monitoring module 360 for example, an application such as a mailer that transmits / receives data via a network transmits a data stream using a TCP / IP (Transmission Control Protocol / Internet Protocol) socket 308 or the like by a user operation. Monitor the reception status.
- TCP / IP Transmission Control Protocol / Internet Protocol
- the agent 122 has a system policy 391 that is a setting file for controlling the operation of the module, and a security policy 392 that is a setting file for performing control related to security in particular, and the monitoring module group described above.
- a system policy 391 that is a setting file for controlling the operation of the module
- a security policy 392 that is a setting file for performing control related to security in particular, and the monitoring module group described above.
- the process monitoring module 310 suppresses the activation when the activation detection function 311 that detects that the activation of the process 303 is requested on the client PC 121 and the activated process 303 violates the security policy 392.
- a suppression function 312 and a user notification function 313 for notifying the user that activation has been suppressed are realized.
- the printer monitoring module 320 suppresses printing when the print detection function 321 that detects that printing using the printer 304 is requested on the client PC 121 and the data to be printed violate the security policy 392. And a user notification function 323 for notifying the user that activation has been suppressed.
- the browser monitoring module 330 has an access detection function 331 for detecting that the client PC 121 has accessed the Web server using the browser 305, the URL (Uniform Resource Name) of the accessed Web server, and the received html (Hypertext Markup Language).
- the detection content holding function 332 that temporarily holds data and the like is realized.
- the dialog operation monitoring module 340 uses a dialog detection function 341 that detects that a file selection dialog or a print dialog is displayed when the user operates the application program 208 on the client PC 121, and the dialog. It provides an acquisition source information addition / inspection function 342 that assigns information about the source of the file to the operated file and checks the information about the source of the file that has been assigned.
- the operation to display the file selection dialog is, for example, an operation to download or upload a file using a web browser, an operation to save an attached file from a received mail using a mailer, or an attachment to a sent mail There is an operation to do.
- the operation for displaying a print dialog corresponds to an operation for selecting a print function using a word processor or spreadsheet software.
- the file operation monitoring module 350 is an operation detection that detects that a mouse button click operation or an operation such as dragging and dropping an object displayed in the window is performed on the window of the application program 208 on the client PC 121. Realization of the function 351 and the source information addition / inspection function 352 that assigns information about the source of the file to the file operated with the mouse, and performs inspection of the information about the source of the file assigned To do.
- the file operation by clicking the mouse button is, for example, an operation of right-clicking a link displayed on the screen of the web browser and saving the object indicated by the link as a file in the displayed menu or a mailer. Drag and drop a file attached to the received message screen to copy it to the desktop.
- the TCP communication monitoring module 360 has a socket reception detection function 361 for detecting that a file is transmitted / received via a network as a result of a user performing an operation with a network application on the client PC 121 ⁇ ⁇ ⁇ , and transmitting / receiving via the socket.
- a socket reception detection function 361 for detecting that a file is transmitted / received via a network as a result of a user performing an operation with a network application on the client PC 121 ⁇ ⁇ ⁇ , and transmitting / receiving via the socket.
- Each monitoring module described above has a function of communicating with another monitoring module or the acquisition source DB 393 according to the detected content, and a function of transmitting an alert to the manager 112 via the monitoring module control 302 and the manager communication mechanism 301. And a function of generating an alert and / or detection content log.
- information relating to the present invention will be described using expressions such as information relating to files.
- these pieces of information may be expressed by other than a data structure such as a table. Therefore, in order to show that the information does not depend on the data structure, “information about the file” may be simply referred to as “information”.
- information about the file may be simply referred to as “information”.
- the description as a DB may be simply referred to as “information”.
- program is used as the subject, but the program is executed by the processor to perform a predetermined process using a memory and a communication port (communication control device). Therefore, the description may be made with the processor as the subject. Further, the processing disclosed with the program as the subject may be processing performed by a computer such as the management server 111 or an information processing apparatus. Further, part or all of the program may be realized by dedicated hardware. Further, the present invention is not necessarily realized by using a thread mechanism, and any mechanism may be used as long as it can be executed by a mechanism that manages execution of a program provided by the OS, such as a micro thread or a process mechanism.
- various programs may be installed in each computer by a program distribution server or a storage medium.
- the management computer 111 has an input / output device.
- the input / output device include a display, a keyboard, and a pointer device, but other devices may be used.
- a serial interface or an Ethernet interface is used as an input / output device, a display computer having a display, keyboard, or pointer device is connected to the interface, and display information is displayed on the display computer.
- the input and display on the input / output device may be substituted by receiving the input.
- FIG. 4 is an example of a sequence showing a flow of processing executed by the browser monitoring module 330 and the dialog operation monitoring module 340 when the user downloads a file with a Web browser.
- a page transition user operation event occurs in the web browser, and the browser monitoring module 330 detects the page transition user operation event ( 402).
- the browser monitoring module 330 stores the URL after the transition (that is, the URL of the clicked link destination object) and waits for an information provision request from the dialog operation monitoring module 340 (403).
- a file download dialog is displayed.
- the dialog operation monitoring module 340 detects a dialog operation event (404), requests the browser monitoring module 330 to provide post-transition URL information, and then the browser monitoring module. Obtain post-transition URL information from 330 (405).
- the dialog operation monitoring module 340 obtains the save destination file name from the information displayed in the dialog (information by processing of the OS 207), and uses the full path as the save destination information of the file. Is obtained (406). Further, when the server included in the post-transition URL acquired in step 405 is the intra-organization Web server 116, the dialog operation monitoring module assigns an identifier indicating the acquisition source to the file (407). This identifier can be realized using an “alternate stream” when NTFS (NT File System) of Microsoft (registered trademark) is used as the local file system 204 used by the client PC 121.
- NTFS NT File System
- Microsoft registered trademark
- FIG. 5 is an example of a sequence showing a flow of processing executed by the browser monitoring module 330, the dialog operation monitoring module 340, and the file operation monitoring module 350 when the user downloads a file with a Web browser.
- the browser monitoring module 330 detects a user operation event of page transition (501). At this time, the Web browser holds the URL and page source after the transition, and can pass them in response to a request from the browser monitoring module 330.
- the user performs a right click operation on the link displayed on the Web browser in this state (503), a mouse operation event occurs, and the file operation monitoring module 350 detects the event (505).
- the file operation monitoring module 350 stores the information related to the position where the mouse operation event has occurred on the Web browser as object related information and sends it to the browser monitoring module 330 (506).
- the browser monitoring module 330 stores the URL of the page after the transition and the page source each time the page is displayed on the Web browser (502).
- the dialog operation monitoring module 340 detects the dialog display event (507), it acquires the URL and page source (page data) of the displayed page from the browser monitoring module 330 (508). Further, the dialog operation monitoring module 340 obtains the file path where the file is stored (510), and if the server included in the URL of the file is the in-house Web server 116, the file source is monitored. As an object, an identifier indicating the acquisition source is assigned to the file (511).
- FIG. 6 is an example of a sequence showing a flow of processing executed by the TCP communication monitoring module 360 and the dialog operation monitoring module 340 when the user saves the file attached to the mail in the local system 204 by the mailer.
- a message is downloaded from the mail server 114.
- the TCP communication monitoring module 360 that monitors the socket in the network driver or the TCP / IP protocol stack performs the analysis processing of the mail body data (603), and acquires the sender name and the attached file name in the message. (604).
- the TCP communication monitoring module 360 decodes the attached file data encoded with Base64 or the like, and calculates a hash value (605).
- the attached file name, hash value, and attached file sender name obtained in steps 604 and 605 are registered in the source DB 393 (606).
- the user may attempt to perform an operation to save the attached file in the local file system 204 while browsing the mail text using the mailer (this operation is not performed immediately after downloading the mail data). , May be executed after a considerable amount of time).
- the dialog operation monitoring module 340 detects the dialog display event (607), and obtains the file name from the information displayed in the dialog. (608) and obtain the full path of the file storage destination (609). Further, the obtaining source DB 393 is searched using the file name displayed in the dialog as a key, and attributes such as the sender name of the file are obtained (610).
- the attached file name is a general name, for example, “specifications.doc”
- a plurality of records may be registered in the source DB 393.
- it is possible to obtain the sender name of the file by calculating a hash value for the file having the storage destination file name obtained in step 608 and searching the obtaining source DB 393 using the hash value as a key. Is possible.
- step 610 if the sender of the file is another user in the organization, an identifier indicating the source is given to the file (611).
- FIG. 7 is an example of a sequence showing a flow of processing executed by the TCP communication monitoring module 360 and the file operation monitoring module 350 when the user saves the file attached to the mail in the local file system 204 by the mailer. .
- step 701 to step 706 is the same as the sequence in FIG. 6 (step 601 to step 606). While the user is viewing the mail text using the mailer, the operation to save the attached file to the local file system 204 is not only performed using the file save dialog but also displayed on the mailer screen. There is also a method of dragging and dropping an icon indicating the attached file to the desktop or file explorer.
- the file operation monitoring module 350 detects a drag-and-drop event with the mouse from the mailer screen (707). Further, the file operation monitoring module 350 monitors a file generation event for the file system, obtains the name of the file generated in the local file system 204 in response to the drag and drop operation by the mouse (708), and displays the full path. Obtain (709), search the source DB 393 using the file name and the hash value of the file as a key, and obtain attributes such as the sender name of the file (710). If the sender of the file is another user in the organization in step 710, an identifier indicating the source is given to the file (711).
- FIG. 8 is an example of a sequence showing a flow of processing executed by the browser monitoring module 330 and the dialog operation monitoring module 340 when a user uploads a file using a Web browser.
- the dialog operation monitoring module 340 detects the event in which the file selection dialog is displayed, acquires the name of the selected file, and starts monitoring the file open (805).
- the browser monitoring module 330 detects a page transition event that occurs as a result (803), and stores the URL after the transition (804).
- the dialog operation monitoring module 340 detects a file open for the corresponding file (806), and acquires the file path of the corresponding file from the OS 207 (807).
- the dialog operation monitoring module 340 determines whether or not the alert condition is satisfied, and transmits the alert to the manager 112 when it is determined that the alert condition is satisfied (809).
- the dialog operation monitoring module 340 acquires the URL after the page transition from the browser monitoring module 330, determines whether the output destination of the file is the inspection target, and the Web server that uploaded the file is a server outside the organization. If there is, it is determined that the output destination of the file is the inspection target, and the identifier of the file acquisition source is confirmed.
- a file copied from the file server 115 in the organization, a file downloaded from the web server 116 in the organization, or a file acquired by being attached to the mailer is a file to be uploaded. If so, an alert is output (809).
- the process of outputting an alert is a process of transmitting an alert to the manager 112 of the management server 111 when a predetermined alert condition is met.
- the predetermined alert condition is set so that an alert is transmitted when a file upload destination server is a monitoring target such as the non-organizational Web server 131 and the upload target file is a management target.
- the output destination of the output information output from the client PC 121 that is, for example, when the Web server that uploaded the file is the non-organization Web server 131, the Web server 131 is an inspection target different from the management target of the management server 111 .
- Files managed by the management server 111 include, for example, (1) a file copied from the file server 115 in the organization and (2) a file downloaded from the web server 116 in the organization. (3) A file corresponding to one of the files acquired by being attached to the mailer.
- the output information (file) output from the client PC 121 is determined to be information generated by an unauthorized operation.
- an alert indicating that the operation condition (alert condition) is met is generated, and the alert is transmitted to the management server 111.
- the management server 111 determines that an unauthorized operation with a high risk leading to an information leakage accident has been detected, and manages information associated with the unauthorized operation as information to be processed with an alert. As a result, the administrator can execute a countermeasure for suppressing information leakage based on the alert collected by the management server 111.
- FIG. 9 is an example of a sequence showing a flow of processing executed by the TCP communication monitoring module 360 and the dialog operation monitoring module 340 when the user transmits an email with an attached file using the mailer.
- the dialog operation monitoring module 340 detects a display event of the file selection dialog (906) and is selected. Get the name of the file and the full path of the file (907) and wait until the mail is sent.
- the TCP communication monitoring module 360 analyzes the data sent using the SMTP (Simple Mail Transfer Protocol) protocol (903), and sends the destination and attachment.
- the file name is acquired (904).
- the TCP communication monitoring module 360 sends the mail to the destination dialog operation monitoring module 340 to a destination outside the organization. (905).
- the dialog operation monitoring module 340 confirms the identifier indicating the source of the sent file, and the file copied from the file server in the organization, the file downloaded from the web server in the organization, or attached to the mailer If the file is one of the acquired files, an alert is output (908).
- FIG. 10 is an example of a sequence showing a flow of processing executed by the TCP communication monitoring module 360 and the file operation monitoring module 350 when the user transmits an email with an attached file using the mailer.
- the file operation monitoring module 350 drags and drops the file from the file explorer or the like to the mailer window. Is detected (1006), the name of the selected file and the full path of the file are acquired (1007), and the system waits until an email is sent.
- the TCP communication monitoring module 360 analyzes the data transmitted by the SMTP protocol (1003), and acquires the transmission destination and the attached file name ( 1004).
- the TCP communication monitoring module 360 sends the mail to the destination dialog operation monitoring module 340 to a destination outside the organization. (1005)
- the file operation monitoring module 350 confirms the identifier indicating the source of the sent file, and the file copied from the file server in the organization, the file downloaded from the web server in the organization, or attached to the mailer If it is one of the acquired files, an alert is output (1008).
- FIG. 11 is an example of a sequence showing a flow of processing executed by the dialog operation monitoring module 340 when a user performs a printing operation with an application.
- the dialog operation monitoring module 340 detects a display event of the print dialog (1103), and acquires the window title of the application that performs printing (1104). As a result, the dialog operation monitoring module 340 acquires the full path of the file that is opened by the application and is about to be printed (1105).
- the dialog operation monitoring module 340 detects that the dialog is closed (1206), and confirms the identifier indicating the source of the transmitted file. If the file is copied from the file server in the organization, downloaded from the web server in the organization, or obtained by attaching to the mailer, an alert is output (1107). ).
- Fig. 12 shows two sequences.
- the first means realized by the process executed by the file operation monitoring module 350 when the user copies the information of the file server 115 to the local file system 204 using the file explorer.
- the sequence is shown.
- a lower part of FIG. 12 shows a sequence of second means realized by processing executed by the file operation monitoring module 350 when the user copies a file to a removable medium using the file explorer. ing.
- the file operation monitoring module 350 specifies a file copy source and a copy destination (1202). If the copy source is the file server 115 and the copy destination is the client PC 121, the file operation monitoring module 350 assigns an identifier indicating the acquisition source to the operation target file (1203).
- the file operation monitoring module 350 identifies a file copy source and a copy destination (1212).
- the copy source is the local file system 204 of the client PC 121 and the copy destination is a removable medium connected to the client PC 121
- the file operation monitoring module 350 sets an identifier indicating the acquisition source in the operation target file.
- the operation target file is either a file copied from within the organization, a file downloaded from a web server in the organization, or a file acquired by attaching to a mailer.
- an alert is output (1213).
- FIG. 13 shows an example of the format of the acquisition source DB 393 used for storing information about received mail and the identifier 1311 indicating the acquisition source assigned to the file stored in the local file system 204.
- the acquisition source DB 393 includes a field 1301 for storing the file name, a field 1302 for storing the sender name of the mail, and a field 1303 for storing the hash value of the file described in the field 1301.
- the identifier 1311 indicating the acquisition source can be realized as data in the ini file format using “alternate stream” in the case of Microsoft NTFS. If the file is obtained from the mail server 114, the sender's mail address is described in the From line. If the file is obtained from the file server 115, the server name or IP address of the file server is described in the Server line. If it is a file obtained from an internal Web server, the URL indicating the obtained file is described. Unused lines may be erased, or after the equal may be blank.
- the content included in the identifier 1311 indicating the source can be transmitted to the management server 111 as an alert by the second means.
- the acquisition date and time can also be included in the contents of the alert.
- a time information field for storing the time when the mail including the attached file is received may be added as a field of the source DB 393.
- the TCP communication module 360 registers the reception time described in the mail header in the time information field, and in steps 610 and 710 for acquiring file attributes, also acquires the recording time of the time information field,
- the configuration may be such that time information is given to the acquisition source identifier 1311.
- FIG. 14 is an example of a flowchart showing an outline of processing executed by the browser monitoring module 330.
- the browser monitoring module 330 is started when the Web browser is started, sets the monitoring of user operation events for the Web browser described in FIGS. 4, 5, and 8 (1401), and determines whether an event has occurred. Enter the loop (1402). When the occurrence of an event is detected, the browser monitoring module 330 executes a step of determining whether or not the page has been changed by the user's left click operation (1403).
- the browser monitoring module 330 executes the step (1404) of transmitting the URL to the dialog monitoring module 340 after executing the step (1404) of acquiring the URL after the transition. To do.
- the browser monitoring module 330 executes a step (1405) of acquiring coordinate information on the browser of the mouse event from the file operation monitoring module 350.
- the browser monitoring module 330 executes a step (1406) of acquiring an HTML anchor tag positioned under the mouse cursor, and executes a step (1407) of extracting a URL selected by the mouse cursor.
- the buzzer monitoring module 330 executes a step (1404) of transmitting a URL to the dialog monitoring module 340.
- FIG. 15 is an example of a flowchart showing an outline of processing executed by the dialog operation monitoring module 340.
- the dialog operation monitoring module 340 is activated when the user logs on to the client PC 121.
- the dialog operation monitoring module 340 monitors file operations using the dialog described in FIGS. 4, 5, 6, 8, 9, and 11. For example, a setup (1501) such as timer monitoring is performed. After doing so, monitor the event for which the dialog appears (1502).
- the dialog operation monitoring module 340 checks whether an upload dialog or a download dialog is displayed (1503). If any dialog is displayed, the dialog is displayed. Determine the type of the application (1504). If the application is a mailer, a step (1505) of generating a mailer check thread is executed, and if it is a Web browser, a step (1506) of generating a Web browser check thread is executed.
- step 1503 if the displayed dialog is neither an upload dialog nor a download dialog, the dialog operation monitoring module 340 determines whether the displayed dialog is a print dialog (1507). . In the case of a dialog for printing, the dialog operation monitoring module 340 performs a step (1508) of generating a print check thread.
- the dialog operation monitoring module 340 After executing the step of generating each thread, the dialog operation monitoring module 340 returns to the step (1502) of monitoring the event in which the dialog is displayed.
- FIG. 16 is an example of a flowchart showing an outline of the mailer check thread generation step 1505 in the processing executed by the dialog operation monitoring module 340.
- the dialog operation monitoring module 340 checks whether either the upload dialog or the download dialog is displayed (1601), and if any dialog is displayed, it is displayed in the dialog.
- the folder name is acquired from the character string (1602) and the file name is acquired (1603).
- the dialog operation monitoring module 340 configures the full path of the file to be uploaded or downloaded (1604), and returns to Step 1601.
- step 1611 when the user clicks a dialog save button or the like to hide the dialog, the processing from step 1611 is executed.
- the dialog operation monitoring module 340 determines whether a full path has been acquired in step 1604 and a file indicated by the full path exists (1611). The dialog operation monitoring module 340 executes the processing from step 1612 onward when the file exists, and returns to step 1601 when the file does not exist.
- the dialog operation monitoring module 340 first determines whether it is a download dialog (1612), and if it is a download dialog, calculates the hash value of the file specified in step 1604 (1613). . As shown in FIGS. 6 and 7, the dialog operation monitoring module 340 searches the information registered in the acquisition source DB 393 by the TCP communication monitoring module 360 (1614), and the acquisition source is another user in the organization. If the predetermined condition is met, the acquisition source information is written in the file specified by the full path acquired in step 1604 (1609).
- the dialog operation monitoring module 340 receives the destination information from the TCP communication module 360 (1621) as shown in FIGS. 9 and 10, and the file specified in the upload dialog is attached to the mail. If it is transmitted, the source information of the file specified in step 1604 is read (1622). The dialog operation monitoring module 340 checks the alert condition, generates an alert, and transmits the alert to the management server 111 as necessary (1623).
- FIG. 17 is an example of a flowchart showing an outline of the Web browser check thread generation step 1506 among the processes executed by the dialog operation monitoring module 340.
- the dialog operation monitoring module 340 checks whether either the upload dialog or the download dialog is displayed (1701), and if any dialog is displayed, it is displayed in the dialog.
- the folder name is acquired from the character string (1702) and the file name is acquired (1703), the full path of the file to be uploaded or downloaded is configured (1704), and the process returns to step 1701. Thereafter, when the user clicks a dialog save button or the like to hide the dialog, the processing from step 1705 is executed.
- the dialog operation monitoring module 340 determines whether a full path has been acquired in step 1704 and a file indicated by the full path exists (1705). The dialog operation monitoring module 340 executes the processing from step 1706 if the file exists, and returns to step 1701 if the file does not exist.
- the dialog operation monitoring module 340 first determines whether or not it is a download dialog (1706). If the file is a download dialog, the browser monitoring module 330 displays the download dialog as shown in FIGS.
- the download source information to be held is obtained (1707), and if the obtained source matches with a predetermined condition such as being another user in the organization, the obtained source information is written in the file indicated by the full path acquired in step 1704 ( 1708).
- the dialog operation monitoring module 340 obtains the upload destination information held by the browser monitoring module 330 from the browser monitoring module 330 as shown in FIG. 8 (1709).
- the dialog operation monitoring module 340 reads the source information of the file specified by the full path acquired in step 1704 (1710), and whether or not the alert condition is met. An alert is generated by checking and an alert is transmitted to the management server 111 as needed (1711).
- FIG. 18 is an example of a flowchart showing an outline of step 1508 of generating a print check thread by the application among the processes executed by the dialog operation monitoring module 340.
- the dialog operation monitoring module 340 checks whether the print dialog is displayed (1801). If the dialog is displayed, the process ID of the application program of the print source is acquired (1802). Further, the file name is acquired from the list of files opened by the application program specified by the process ID (1803). The dialog operation monitoring module 340 configures the full path of the file to be printed (1804) and returns to step 1801.
- the dialog operation monitoring module 340 reads the source information of the file to be printed (1805), checks the alert condition, and sends an alert. Generate and send an alert to the management server 111 as needed (1806).
- FIG. 19 is an example of a flowchart showing an outline of processing executed by the file operation monitoring module 350.
- the file operation monitoring module 350 is activated when the user logs on to the client PC 121, starts a mouse event hook (1901), and then performs the file operation using the mouse described in FIGS. Monitor. When detecting the event, the file operation monitoring module 350 determines whether or not the detected mouse operation event is a right click (1902).
- the file operation monitoring module 350 obtains the mouse cursor coordinates in the foreground window (1903), executes conversion processing to the browser window coordinates (1904), and sends the browser monitoring module 330 to the step 1904. Processing for notifying the acquired coordinates is executed (1905), and the process returns to event monitoring.
- step 1902 if it is determined in step 1902 that the mouse operation event is not a right click, the file operation monitoring module 350 executes processing for determining whether it is a drag event (1911). Returns to event monitoring.
- the file operation monitoring module 350 detects an event where the dragged object is dropped, and determines whether the dragged file is dropped on the mailer (1912). ).
- step 1912 the file operation monitoring module 350 proceeds to step 1921 described later. If YES in step 1912, the file operation monitoring module 350 acquires the drag source file path (1913), reads the source information of the file specified by the full path acquired in step 1913 (1914), and alerts. After checking the conditions, an alert is transmitted to the management server 111 as necessary (1915).
- step 1912 If it is determined in step 1912 that the object is dropped on the mailer, the file operation monitoring module 350 determines whether the drag and drop event is dragged on the mailer and dropped on the file explorer (1921).
- step 1921 is determined to be No, the file operation monitoring module 350 returns to event monitoring. If it is determined to be Yes in step 1921, the file operation monitoring module 350 acquires the file path to which the file attached to the email is dropped ( 1922). Next, the file operation monitoring module 350 calculates the hash value of the file from which the full path is acquired in Step 1922 (1923), and searches the information registered in the acquisition source DB 393 (1924). The file operation monitoring module 350 writes the acquisition source information in the file indicated by the full path acquired in step 1922 when the acquisition source matches a predetermined condition such as when the acquisition source is another user in the organization (1915).
- processing of the file operation monitoring module 350 for the sequence shown in FIG. 12 is also performed in accordance with steps 1922 and 1925 when the drag source is the file server 115 and the drop destination is the local file system 204. Is the local file system 204 and the drop destination is a removable medium, the processing according to steps 1913 and 1915 may be performed.
- step 1915 may be performed.
- FIG. 20 is an example of a flowchart showing an outline of processing executed by the TCP communication monitoring module 360.
- the TCP communication monitoring module 360 is activated when the user logs on to the client PC 121, and monitors communication data in each protocol of SMTP, POP3, and IMAP4.
- the TCP communication monitoring module 360 starts monitoring socket communication (2001), and determines whether the data is transmission / reception data in any of the above protocols (2002). If Step 2002 is No, the process returns to the monitoring of socket communication. If Yes, the processes after Step 2003 are performed.
- the TCP communication monitoring module 360 analyzes mail data.
- the sender and recipient information can be analyzed from the header area of the mail data, and further information such as the presence / absence of an attached file and the file name can be obtained by analyzing the MIME (Multipurpose Internet Mail Extension) part.
- MIME Multipurpose Internet Mail Extension
- the TCP communication monitoring module 360 identifies whether there is an attached file in the mail (2004), and if it is attached, the protocol type is either POP3 or IMAP4 for receiving mail, or It is determined whether it is SMTP for mail transmission (2005). In the case of mail reception, the TCP communication monitoring module 360 obtains the sender name and the attached file name (2006), decodes the attached file data, calculates the hash value (2007), and further sends it to the source DB 393. After registering, return to monitoring socket communication.
- the TCP communication monitoring module 360 acquires the sender name and the attached file name (2009), and acquires them in the dialog monitoring module 350 and the file monitoring module 360 in step 2009. Send the information (2010).
- the source is also indicated in the post-processing information (including the copied information)
- the file system for example, Microsoft's NTFS
- the file system for example, Microsoft's NTFS
- Sending emails with attached files (3) Printing with application programs, (4) Copy and move to removable media, Can be sent to the management server 111.
- the alert condition for sending an alert using this system may be determined based on the content of the identifier 1311 indicating the source. For example, if the information is imported by downloading using a Web browser, all Web servers in the organization may be targeted, or if the Web server storing important information can be identified It may be set in the security policy 392 so that only the case where the URL of the Web server is included in the identifier 1311 indicating the acquisition source.
- the operation exported outside the organization can be detected as an unauthorized operation. Is possible. Therefore, in this embodiment, an operation with a high risk that leads to information leakage performed by the user can be detected as an unauthorized operation.
- in-file trace information for managing the history of file operations is stored in each file, and the same information as the in-file trace information is also stored in the management server 111.
- management server 111 stores the management server 111.
- FIG. 23 shows how in-file trace information is generated.
- the in-file trace information is, for example, information indicating which generation of what generation of which file is copied, and is recorded in, for example, an NTFS alternative data stream (hereinafter referred to as an alternative stream).
- an alternative stream an NTFS alternative data stream
- the file creation is detected by the file operation monitoring module 350.
- the file operation monitoring module 350 creates in-file trace information (3001).
- the created in-file trace information is stored in an alternative stream of the file 3002.
- the agent program 122 transmits the created in-file trace information to the manager 112.
- the same information as the in-file trace information is also stored in the PC management DB (3101 in FIG. 29).
- the in-file trace information includes, for example, a file storage identifier (FID), an operation identifier (OID), and a count.
- the file storage identifier is information set when the file is stored in the file system 204 of the client PC 121, and is information for uniquely identifying the file.
- the operation identifier corresponds to “operation generation information” and is information indicating the number of file operations (generation).
- the count corresponds to “copy number information” and indicates the number of times the file has been copied. In other words, the count indicates the number of systems branched from the file.
- the “count” shown in the file 3002 is also used to generate the next operation identifier.
- the system increments by one each time it is copied, so the count value in the operation source file indicates the operation of the operation destination file to indicate the number of operations of the file of which system. Inherited by identifier.
- the file operation monitoring module 350 acquires in-file trace information from the alternative stream of the file 3002, and creates in-file trace information after the copy operation (3003).
- the created in-file trace information (3003) is stored in an alternative stream of the copy destination file 3004. Further, the same information as the in-file trace information is associated with the copy destination file and stored in the PC management DB.
- the count value of the copy source file 3002 is updated from “0” to “1”. Copying a file means creating a new file having the same contents while leaving the copy source. That is, a plurality of files having the same contents coexist. Therefore, the count value is updated according to the number of copies, and the system for each copy is distinguished.
- the file operation is a copy
- the operation source file 3002 is a copy source file
- the operation destination file 3004 is a copy destination file.
- the copy source file 3002 and the copy destination file 3004 have the same file data. Accordingly, the file storage identifier of the copy source file 3002 and the file storage identifier of the copy destination file 3004 are the same.
- the operation identifier of the copy source file 3002 is “0”.
- the operation identifier of the copy destination file 3004 is “00”. Each time the number of operations increases by one, the number of digits of the operation identifier increases by one.
- the operation identifier of the operation destination file is composed of the operation identifier and count of the operation source file.
- the operation identifier of the operation source file 3002 is “0”, and the count is also “0”. Therefore, the operation identifier of the operation destination file 3004 is created as “00” by arranging the operation identifier “0” of the operation source file 3002 and the count “0” of the operation source file 3002.
- the operation identifier indicates both the number of operations and the system (number of branches).
- the number of digits of the operation identifier indicates the number of operations. Two digits indicate that this is the second operation.
- the first operation is file creation.
- a number (or character) other than “0” included in the operation identifier indicates how many times the copy is a descendant. For example, the file 3006 with the operation identifier “000” is a direct descendant of the file 3002 with the operation identifier “0”, and is a file created by the third operation.
- the file operation in this case is a name change.
- the operation source file is the file 3004 of the name change source (before the name change).
- the operation destination file is the file 3006 of the name change destination (after the name change).
- the file operation monitoring module 350 acquires the in-file trace information from the alternative stream of the file 3004, and creates the in-file trace information after the name change (3005).
- the created in-file trace information (3005) is stored in an alternative stream of the renamed file 3006.
- the same information as the in-file trace information is stored in the PC management DB in association with the name change destination file 3006.
- the rename destination file 3006 has only the name changed, and has the same file data as the file 3004. Accordingly, the file storage identifier of the rename source file 3004 and the file storage identifier of the rename destination file 3006 are the same.
- the operation identifier “000” of the rename destination file 3006 is generated by arranging the operation identifier “00” and the count “0” of the rename source file 3004. Since the operation identifier “000” of the name change source file 3006 has three digits, it can be seen that the file 3006 is a file created by the third operation counting from the creation of the file 3002 as the starting point. Note that “0” is set in the count of the name change destination file 3006.
- the file operation here is file deletion.
- the operation source file is the file 3006 to be deleted.
- the operation destination file does not exist. This is because it is deleted.
- the operation destination file does not exist, but in-file trace information 3007 for the operation destination file is created.
- the file storage identifier is the same as the file storage identifier of the deletion target file 3004.
- the operation identifier “0000” is created by arranging the operation identifier “000” and the count “0” of the deletion target file 3004.
- the same information as the in-file trace information 3007 created for the operation destination file is stored in the PC management database.
- the file operation is file movement
- the operation source file is the movement source file 3002
- the operation destination file is the movement destination file 3009.
- the file operation monitoring module 350 detects the file movement
- the file operation monitoring module 350 acquires the in-file trace information of the movement source file 3002, and creates the in-file trace information 3008 of the movement destination file 3009 based on the in-file trace information.
- the file storage identifier is the same as the file storage identifier of the migration source file 3002.
- the operation identifier “01” is generated by arranging the operation identifier “0” and the count “1” of the migration source file 3002. As described above, the initial value “0” is set for the count of the transfer destination file 3009.
- the movement source file 3002 disappears and only the movement destination file 3009 remains in the file system 204.
- in-file trace information 3001 related to the migration source file 3002 is continuously stored in the PC management DB.
- the destination file 3009 is deleted.
- the file operation in this case is file deletion, and the operation source file is the deletion target file 3009. Since the file is deleted, the operation destination file does not exist.
- in-file trace information 3010 for the operation destination file is created and stored in the PC management DB.
- the operation identifier “010” is generated by arranging the operation identifier “0” and the count “1” of the deletion target file 3002.
- the count value of the in-file trace information 3010 is set to “0” that is an initial value.
- FIG. 23 The file operation history described in FIG. 23 will be described again with reference to FIGS. 24-28, each file operation shown in FIG. 23 will be described one by one. However, only one duplicate file operation (file deletion) among the file operations shown in FIG. 23 is shown in FIGS.
- FIGS. 24-28 show the relationship between in-file trace information and the contents stored in the PC management DB.
- the left side of FIG. 24 shows an initial state. In the initial state, no file is stored in the file system 204 of the client PC 121, and no record is recorded in the PC management DB.
- FIG. 24 shows a state where one file 3002 is stored in the file system.
- files downloaded from the Web servers 116 and 131, files downloaded from the file server 115, files copied from the removable media 125, files attached to e-mails, and the like are stored in the file system. .
- in-file trace information 3001 for the file is created.
- “0” is set as the operation identifier, and the initial value “0” is also set as the count.
- the PC management DB stores the same information as the in-file trace information 3001. Further, the contents of the file operation (information indicating where the file is obtained from) are also stored in the PC management DB.
- the left side of FIG. 25 is the same as the right side of FIG. Therefore, the state on the right side of FIG. 25 will be described.
- the right side of FIG. 25 shows a state where the first file 3002 (C: ⁇ test.txt) stored in the file system on the right side of FIG. 24 is copied to another directory.
- the in-file trace information 3003 of the copy destination file 3004 C: ⁇ test ⁇ test.txt
- OID operation identifier
- the file storage identifier (FID) is the same as before copying.
- the same information 3003 as the in-file trace information of the copy destination file 3004 and the operation contents are stored in association with each other.
- the counter value included in the in-file trace information of the first file 3002 is It changes from “0” to “1”.
- the record corresponding to the in-file trace information of the first file 3002 stored in the PC management DB is not changed before and after the copy operation.
- the in-file trace information of the first file 3002 stored in the PC management DB is not changed at all. In other words, the same information as the in-file trace information after the file operation is stored in the PC management DB, and after that, even if the file corresponding to the in-file trace information is further operated, The content of the record corresponding to the file trace information does not change.
- FIG. 26 shows a state where the file name of the file 3004 copied on the right side of FIG. 25 is changed from “text.txt” to “text2.txt”.
- In-file trace information of the rename destination file 3006 (C: ⁇ test ⁇ text2.txt) is created based on the in-file trace information of the rename source file 3004 (C: ⁇ test ⁇ text.txt).
- the created in-file trace information is stored in an alternative stream of the name change destination file 3006. Furthermore, the same information 3005 as the created in-file trace information is also stored in the PC management DB.
- the operation identifier is set to “000”.
- the operation identifier “00” and the count “0” of the name change source file 3004 are arranged into three digits.
- the operation identifier “000” regarding the name change destination file 3006 is generated.
- An initial value “0” is set in the count related to the name change destination file 3006.
- in-file trace information relating to the first file 3002 (more precisely, information obtained by adding operation contents to the same information as the in-file trace information). The same applies to the following), and in-file trace information related to the copied file 3004 and in-file trace information related to the renamed file 3006 are stored in total.
- the contents of each in-file trace information stored in the PC management DB are not changed regardless of subsequent file operations. This is because the transition (history) of file operations is detected and visualized based on each in-file trace information stored in the PC management DB.
- FIG. 27 shows a state where the first file 3002 (C: ⁇ text.txt) has been moved to another directory (D: ⁇ ).
- the in-file trace information related to the destination file 3009 (D: ⁇ text.txt) is created based on the in-file trace information of the source file 3002 (C: ⁇ text.txt). Stored. Similarly to the above, the same information as the in-file trace information is transmitted and stored in the PC management DB.
- the operation identifier “01” related to the transfer destination file 3009 is created by arranging the operation identifier “0” and the count “1” of the transfer source file 3002 in two digits.
- the initial value “0” is set as the count value. Note that the file storage identifier does not change through FIGS. 24-28.
- FIG. 28 Since the left side of FIG. 28 is the same as the right side of FIG. 27, the state of the right side of FIG. 28 will be described.
- the right side of FIG. 28 shows a state where the file 3009 moved on the right side of FIG. 27 is deleted from the file system.
- the in-file trace information of the deleted file is created based on the in-file trace information of the file 3009 (D: ⁇ text.txt) to be deleted.
- the same information 3010 as the created in-file trace information is transmitted and stored in the PC management DB.
- the created in-file trace information is not stored in the alternative stream. This is because the file has been deleted and there is no alternative stream to be stored.
- the operation identifier “010” related to the deleted file is created by arranging the operation identifier “01” and the count “0” of the deletion target file 3009 into three digits.
- the initial value “0” is set in the count regarding the deleted file. Since the file has already been deleted, the count value will not increase.
- FIG. 29 shows a storage example of the PC management DB.
- the PC management DB has records 3101-3106 corresponding to each file operation.
- Each record of the PC management DB includes, for example, a file storage identifier field 3110, an operation identifier field 3111, an operation type field 3112, an operation source path field 3113, and an operation destination path field 3114.
- information such as the file operation date and time and the user who operated the file can be managed by the PC management DB.
- the file storage identifier field 3110 and the operation identifier field 3111 are essential information for tracking and visualizing file operations.
- the other fields are information indicating the contents of the file operation.
- the user When the user (administrator) wishes to output a file operation history, the following processing is executed.
- the user selects in-file trace information as a starting point.
- the manager 112 in the management server 111 searches the PC management DB with the file storage identifier included in the in-file trace information selected by the user. As a result, only the record having the file storage identifier selected by the user is extracted. Furthermore, the manager 112 rearranges each record having the file storage identifier selected by the user based on the operation identifier.
- the information obtained in this way indicates the history of file operations originating from the same file.
- the in-file trace information in which the digits from the beginning of the operation identifier to the one before the last digit are common belongs to the operation of the same system.
- In-file trace information in which the number of digits of the operation identifier (the number of characters of the operation identifier) is one more in the in-file trace information belonging to the file operation of the same system indicates the next operation.
- FIG. 30 shows an example of in-file trace information stored in the alternative stream.
- a file identifier, an operation identifier, and a count are stored in an ini file format.
- UUID Universally Unique Identifier
- the operation identifier has 32 digits
- the range of characters that can be used for the operation identifier is 0-9, AZ, and az. The range is from 0 to 60.
- FIG. 31 shows a sequence for monitoring file operations.
- a file operation for example, file creation, movement, copying, renaming, or deletion
- an application program such as Explorer (1201)
- the file operation monitoring module 350 detects the file operation. To do.
- file copy will be mainly described.
- the file operation monitoring module 350 confirms the copy source and the copy destination (1202), and writes the acquisition source information in the alternative stream of the operated file as necessary (1203). Then, the file operation monitoring module 350 writes the in-file trace information in the alternative stream of the operated file (3301).
- the file operation monitoring module 350 creates in-file trace information of the operation destination, transmits the in-file trace information of the operation destination to the manager 112 and stores it in the PC management DB, and further, if necessary, the in-file of the operation source Update trace information. Details of the operation of the in-file trace information will be described later.
- FIG. 34 is a flowchart showing details of the processing 3301 for manipulating the in-file trace information shown in FIG.
- the file operation monitoring module 350 determines whether or not the operation is a starting point of the file operation (3401).
- the operation that is the starting point of the file operation means creation of a file. For example, an operation for downloading a file from a Web server or the like to the client PC 121 corresponds to an operation that is a starting point of the file.
- the monitoring module 350 When it is determined that the file operation is the starting point, the monitoring module 350 newly creates in-file trace information (3402), and the newly created in-file trace information is added to the alternative stream of the newly created file. Write (3403). Further, the monitoring module 350 transmits the newly created in-file trace information to the manager 112 and stores it in the PC management DB (3404).
- the monitoring module 350 attempts to acquire in-file trace information from the alternative stream of the file that is the operation source (3410). The monitoring module 350 determines whether in-file trace information has been acquired from the alternative stream of the operation source file (3411). If the in-file trace information cannot be acquired from the alternative stream of the operation source file, the monitoring module 350 newly creates in-file trace information for the operation source file (3412).
- in-file trace information is not written in an alternative stream of a file existing before the file operation history management system according to the present embodiment is introduced into the computer system. Accordingly, in-file trace information is newly created in such a file and written in the alternative stream (3412, 3418).
- the monitoring module 350 creates in-file trace information related to the operation destination file, and further updates the in-file trace information related to the operation source file when the update is necessary (3413). If in-file trace information can be acquired from the alternative stream of the operation source file in step 3411, the process proceeds to step 3413.
- the monitoring module 350 executes the file operation desired by the user (3414), and determines whether or not the operation destination file exists (3415). If the operation destination file exists, the monitoring module 350 writes the in-file trace information regarding the operation destination file created in step 3413 to the alternative stream of the operation destination file (3416).
- the monitoring module 350 determines whether or not the operation source file exists (3417). If the operation source file exists, the monitoring module 350 writes the in-file trace information created in step 3413 to the alternative stream of the operation source file if update is necessary (3418). For example, in the case of file copy, it is necessary to increase the count value in the in-file trace information regarding the operation source file (copy source file).
- the monitoring module 350 displays the in-file trace information regarding the operation destination file in the manager 112. And store it in the PC management DB (3419).
- the operation source file does not exist.
- the operation source file exists only when the file is created or copied.
- FIG. 33 shows details of step 3402 in FIG.
- the monitoring module 350 generates a UUID (3501), and sets the UUID in the file storage identifier in the in-file trace information (3502).
- the monitoring module 350 sets an initial value “0” for the operation identifier (3503), and further sets an initial value “0” for the count (3504).
- FIG. 34 is a flowchart showing details of step 3413 in FIG.
- the monitoring module 350 creates a copy of the in-file trace information related to the operation source file and uses it as a basis for the in-file trace information of the operation destination (3601).
- the monitoring module 350 determines whether the number of digits of the operation identifier of the in-file trace information related to the operation destination file is smaller than 31 digits (3602). As described above, the operation identifier increases by one each time it is operated, and its upper limit is 32.
- the monitoring module 350 determines whether or not the count value in the in-file trace information regarding the operation destination file is smaller than 60 (3603). As described above, the count increases by 1 each time it is copied, and its upper limit is 60. When the count value is less than 60, the monitoring module 350 adds one character converted from the count for the operation source file to the end of the operation identifier for the operation destination file (3604).
- the operation identifier related to the operation destination file is a value in which the operation identifier related to the operation source file and the count related to the operation source file are arranged.
- the monitoring module 350 sets an initial value “0” to the count relating to the operation destination file (3605), and if the count needs to be updated, the count value relating to the operation source file is incremented by one. Increase (3606). That is, when a file is copied, the count value of the operation source file is increased by one. In the case of other file operations, the count value of the operation source file does not change.
- the monitoring module 350 determines whether the operation is an unauthorized operation (3607). As described in the first embodiment, for example, when a file in which an acquisition source identifier is set is output to an external server or a removable medium, it can be determined that the operation is unauthorized.
- the monitoring module 350 sets “z” in the last digit (60th digit) of the operation identifier related to the operation destination file (3608). “0” is set in the count relating to the operation destination file (3609).
- the monitoring module 350 sets “y” in the last digit (60th digit) of the operation identifier related to the operation destination file (3610). “0” is set in the count relating to the operation destination file (3611).
- the monitoring module 350 determines whether an illegal file operation has been performed (3613). If it is not an illegal file operation, this process ends. When an illegal file operation is performed, the monitoring module 350 adds “0” to the last digit of the operation identifier related to the operation destination file to generate a 32-digit operation identifier (3614).
- step 3607 and step 3613 The reason why it is determined in step 3607 and step 3613 whether or not the file operation is illegal is described. For example, when a file is written to the removable medium 125 or a file is uploaded to the Web server 131 outside the organization, the in-file trace information cannot be written to the alternative stream of the operation destination file. This is because the operation destination file exists outside the file system 204 of the client PC 121. Therefore, the operation destination file when operated illegally corresponds to the leaf at the end of the tree structure.
- the number of digits of the operation identifier is 32 digits (32 characters), and the range of characters that can be used as the operation identifier is limited to 0-9, AZ, az is doing.
- the value ( State) when the number of digits of the operation identifier reaches 32 characters (3614) and when the operation identifier ends with “z” (3608), the value ( State). In the case of an operation other than an illegal operation, transition is made to a state where the number of digits of the operation identifier in each previous state becomes 31 characters or a state where the character “y” is added to the operation identifier.
- FIG. 36 shows a tree structure of a file operation history when the same file is copied many times.
- the characters assigned to the operation identifiers related to the copy destination file increase to 0, 1, 2, and so on, and eventually reach the upper limit “y” (3802).
- FIG. 37 shows a case where the operation destination file is further operated.
- the number of digits of the operation identifier increases, and the number of digits of the operation identifier eventually reaches the upper limit of 31 digits (3901).
- the operation identifier is not updated (3902, 3903).
- “0” is set as the operation identifier for the taken-out file.
- the operation identifier becomes 32 digits and becomes a leaf of the tree structure as in the case where “z” is added to the operation identifier. Therefore, if the tree structure is seen, it is immediately understood that the operation is illegal.
- FIG. 38 shows a state in which the history of file operations is visualized as a tree structure using management information 4001-4008 stored in the PC management DB.
- the user selects a file to be tracked from among the operations stored in the PC management DB.
- the manager 112 of the management server 111 searches the PC management DB using the file storage identifier of the file selected by the user as a search key, and extracts a record having the selected file storage identifier. Furthermore, the manager 112 sorts the extracted records based on the operation identifier.
- the rearranged result is a table 4010 shown on the upper side of FIG.
- the result of Table 4010 is the depth-first search of the tree structure (Depth First In order to indicate the order of (Search), the tree structure 4020 can be easily drawn based on the result of the table 4010. Trace information obtained by removing the last character of the operation identifier becomes the parent trace information. For example, the parent operation of the operation whose operation identifier is “0010” (the parent operation is the operation immediately before) is an operation having the operation identifier “001”. In the tree display screen 4020 and the table 4010, 4001 and 4011, 4002 and 4012, 4003 and 4013, 4004 and 4014, 4005 and 4015, 4006 and 4016, 4007 and 4017, and 4008 and 4018 respectively correspond.
- file operation history monitoring has been described focusing on file operations on the file system 204.
- the present embodiment is not limited to file operations on the file system, but in cases such as uploading or downloading files using a web browser, sending / receiving files using e-mail, printing from application programs, etc. Is also applicable.
- File operations are not limited to the above-described file creation, movement, copying, renaming, and deletion. For example, (1) File download using a web browser (2) Uploading files using a web browser (3) Receiving e-mail with attached files, (4) Saving attached files (5) Sending an email with an attached file, (6) Printing can be managed as a file operation.
- the relationship between the operation source file and the operation destination file is as follows.
- the operation source file is abbreviated as the operation source
- the operation destination file is abbreviated as the operation destination.
- (1) File download with Web browser (1A) Operation source ⁇ Download source URL (obtained in steps 403 and 502) (1B) Operation destination ⁇ save destination file path (obtained in steps 406 and 510) (2) File upload with Web browser (2A) Operation source ⁇ Upload file path (obtained at step 807) (2B) Operation destination ⁇ Upload destination URL (obtained in step 808)
- Receiving an email with an attached file (3A) Operation source ⁇ Sender's email address (sender name in steps 604 and 704) (3B) Operation destination ⁇ Input source DB393 (4) Save attached file (4A) Operation source ⁇ Input source DB393 (4B) Operation destination ⁇ Save destination file path (obtained in steps 609 and 709) (5) Send email with attached file
- FIG. 39 shows a configuration example of the input source DB 393.
- the input source DB 393 can manage the file storage identifier, the operation identifier, and the count so that the operation source is the input source DB 393. Therefore, a file storage identifier field 4101, an operation identifier field 4102, and a count field 4103 are added to the input source DB 393.
- the operation source is the input source DB 393, so that even when a file attached to an e-mail is copied to the file system 204 multiple times, the original operation (reception of an e-mail with an attached file) can be identified. Because. (4) Storage of attached file In step 3401, “No” is determined. In step 3410, in-file trace information is acquired from the input source DB 393 instead of acquiring in-file trace information from the alternative stream of the operation source. Similarly, in step 3418, the in-file trace information is stored in the input source DB 393. (5) Transmission of mail with attached file In step 3401, “No” is determined. In step 3415, it is determined “No” because the operation destination is the mail address (external). (6) Printing In step 3401, “No” is determined. In step 3415, it is determined “No” because the operation destination is a paper medium (external).
- FIG. 40 shows a table 4210 extracted from the PC management DB according to the conditions selected by the user, and a file operation history tree structure 4220 drawn based on the table 4210.
- the history of file operations can be efficiently managed. Furthermore, by using the file storage identifier and the operation identifier, the file operation history can be easily displayed in a tree structure.
- DB For a DB that does not have a file storage identifier or operation identifier, after reading the operation source file from the DB, search the operation source file field in the operation source file, and use the searched file name to search the operation source file field. It is necessary to repeat the operation such as searching again and again. Accordingly, the number of accesses to the DB is greatly increased, and it takes time to create a table from which an operation history is extracted and to display a tree structure.
- the operation history of the file selected by the user can be easily extracted and displayed in a tree structure simply by reading the file storage identifier and the operation identifier from the PC management DB. Therefore, usability is improved.
- the file storage identifier, the operation identifier, and the count are written in the alternative stream of the file (further, as described in the first embodiment, the acquisition source identifier may be written in the alternative stream). Therefore, even if the PC management DB is temporarily stopped or a part of the record is damaged, the file operation history is managed by reading the in-file trace information stored in the alternate stream of the file. can do.
- information for managing the history of file operations may be stored and managed in the DB in the client PC, instead of being stored in the alternate stream of the file.
- the operation history of files input to and output from the client PC can be monitored using a DB configured as shown in FIG.
- an attached data area such as a resource fork may be used.
- the attached data area is a data area attached to a file, and is an area to be operated together with the file data when the file is operated.
- data can be read and written by using a function different from the read function or write function for file data, or by specifying an unusual argument to the read function or write function. .
- the URL or mail address and the full path on the file system 204 are acquired by acquiring a user operation on a Web browser or an input character string to a dialog.
- another method is used to detect the correspondence between the file path information (full path) and the URL or mail address.
- FIG. 41 shows the configuration of the client PC 121.
- the disk 209 stores a file system 204, a system policy 391, a security policy 392, a browser input DB 4901, a browser output DB 4902, a mail input DB 4903, and a mail output DB 4904.
- FIG. 42 shows the configuration of the agent program 122.
- a process monitoring module 310 a printer monitoring module 320, a file I / O monitoring module 370, an HTTP communication monitoring module 380, and a TCP communication monitoring module 360 are provided.
- the file I / O monitoring module 370 writes a source information (source identifier) in a file I / O detection function 371 that detects file input / output generated by the Web browser 305 or various application programs, and an alternative stream of the file. Acquisition source information adding function 372.
- HTTP communication monitoring module 380 includes a socket reception detection function 381 that detects file transmission / reception, a protocol analysis function 382 that analyzes data transmitted / received via socket 308, and a function that assigns and inspects registration and source information. 383.
- the function 383 for performing registration, notification, and the like adds acquisition source information to the file and registers it in the browser input DB 4901.
- the TCP communication monitoring module 360 and the HTTP communication monitoring module 380 monitor communication on the communication network.
- the TCP communication monitoring module 360 monitors transmission / reception of mail (POP3 / IMAP / SMTP).
- the HTTP communication monitoring module 380 monitors HTTP communication.
- the file I / O monitoring module 370 monitors file reading and writing using a Web browser or a mailer.
- DB4901-4904 using hash values of the file data as keys is provided. .
- the TCP communication monitoring module 360 or the HTTP communication monitoring module 380 can acquire the download source information (URL or email address) and download data.
- the download source information and the hash value of the downloaded data are stored in the input DB (see FIGS. 48 and 50).
- FIG. 48 shows a configuration example of the browser input DB 4901.
- the browser input DB 4901 manages files downloaded via a web browser.
- the browser input DB 4901 includes, for example, an acquisition source URL field 4901A, a hash value field 4901B, a file storage identifier field 4901C, an operation identifier field 4901D, and a count field 4901E.
- the URL from which the file is downloaded is stored in the source URL field 4901A.
- the hash value 4901B stores a hash value calculated from the downloaded file data.
- the file storage identifier field 4901C stores a file storage identifier assigned to the downloaded file.
- the operation identifier field 4901D stores an operation identifier set in the downloaded file.
- the count field 4901E stores a count relating to the downloaded file. The same applies to hash values, file storage identifiers, operation identifiers, and counts for other DBs described later.
- FIG. 50 shows an example of the DB 4903 that manages files (files attached to e-mails) acquired via the mailer.
- the mail input DB 4903 includes, for example, a file name field 4903A, a sender name field 4903B, a hash value field 4903C, a file storage identifier field 4903D, an operation identifier field 4903E, and a count field 4903F.
- the file name field 4903A the name of the file attached to the e-mail is stored.
- the sender name field 4903B stores the sender name of the e-mail attached with the file.
- the hash value, file storage identifier, operation identifier, and count are the same as those in FIG.
- the downloaded file data is written on the file system of the client PC.
- the file I / O monitoring module 370 detects writing of file data to the file system 204.
- the file I / O monitoring module 370 obtains the hash value of the file data stored by the browser or mailer, and searches for a record having the same hash value in the input DBs 4901 and 4903 (FIGS. 48 and 50). When a record having the same hash value exists, the record indicates a downloaded file. Therefore, corresponding input source information and in-file trace information are added to the file specified by the hash value.
- the user can send the file to the outside of the client PC using a Web browser or electronic mail.
- the browser or mailer reads the file data to be uploaded.
- the file I / O monitoring module 370 detects reading of the file data.
- the file I / O monitoring module 370 obtains the path and hash value of the file read by the browser or mailer and stores them in the output DBs 4902 and 4904 (FIGS. 49 and 51).
- FIG. 49 shows a DB 4902 that manages files output to the outside of the client PC 121 using a browser.
- the browser output DB 4902 includes, for example, an upload file field 4902A, a hash value 4902B, a transmission source field 4902C, a server field 4902D, a URL field 4902E, a file storage identifier field 4902F, an operation identifier field 4902G, and a count field 4902H.
- the upload file field 4902A path information indicating the storage location of the uploaded file is stored.
- the transmission source field 4902C stores the name of the user who uploaded the file.
- the server field 4902D stores the upload destination server name.
- the URL field 4902E stores the upload destination URL.
- the browser or mailer When the browser or mailer reads the file data, it uploads the file data.
- the TCP communication monitoring module 360 or the HTTP communication monitoring module 380 detects file upload.
- the TCP communication monitoring module 360 or the HTTP communication monitoring module 380 acquires the data of the uploaded file and obtains its hash value.
- the TCP communication monitoring module 360 or the HTTP communication monitoring module 380 searches the output DBs 4902 and 4904 for records having the same hash value as the obtained hash value. If records with the same hash value exist, it can be determined that the user uploaded the file. When it is determined that the file has been uploaded, as described in the first embodiment, whether or not the alert condition is met, transmission of the alert, operation of in-file trace information, and the like are performed.
- FIG. 43 shows a sequence for downloading a file using a browser.
- the HTTP communication monitoring module detects the header of HTTP communication and analyzes the header (5102). If the result of the analysis is a reception operation, step 5103 and subsequent steps are executed. If it is a transmission operation, step 5212 and subsequent steps in FIG. 44 are executed.
- the HTTP communication monitoring module acquires the acquisition source URL and the acquisition data (download file) from the analysis result in step 5102 (5103).
- the HTTP communication monitoring module calculates the hash value of the obtained data acquired in step 5103 (5104).
- the HTTP communication monitoring module operates the in-file trace information shown in FIG. 32 (5105). Here, since the file is downloaded by the browser, in-file trace information is newly created.
- the HTTP communication monitoring module stores the source URL, the hash value of the acquired data, and the in-file trace information in the browser input DB 4901 (5106).
- the browser When the file download is started, the browser receives the download data from the socket 308 and writes the download data to the file system 204 (5111).
- the file I / O monitoring module detects the operation of step 5111 using a method such as an API (Application Programming Interface) hook (5112).
- the file I / O monitoring module obtains a hash value of data written by the browser to the file system 204 (5113).
- the file I / O monitoring module acquires a file write destination path by the browser (5114).
- the file I / O monitoring module searches the browser input DB 4901 using the hash value obtained in step 5113 as a search key. When a record having the same hash value is found, the file managed by the record is a file downloaded by the user. Therefore, the file I / O monitoring module acquires file attributes (source URL, file operation trace information) from the browser input DB 4901 and executes step 5116 and subsequent steps.
- file attributes source URL, file operation trace information
- the file I / O monitoring module writes the source information (1311 in FIG. 13) to the alternative stream of the file found based on the hash value (5116). Further, the file I / O monitoring module writes in-file trace information (3201 in FIG. 30) in the alternative stream of the file (5117).
- FIG. 44 is a sequence showing file upload processing using a browser.
- the browser reads the file to be uploaded (5202).
- the file I / O monitoring module detects the operation of step 5202 using a method such as an API hook (5203).
- the file I / O monitoring module obtains the hash value of the file read by the browser (5204).
- the file I / O monitoring module acquires the source information from the alternative stream of the file (5205).
- the file I / O monitoring module acquires in-file trace information from the alternative stream of the file (5206).
- the file I / O monitoring module stores the file path, file hash value, source information, and in-file trace information in the browser output DB 4902 (FIG. 49).
- the browser When the browser completes reading of the upload file, the browser uploads the file via the socket 308. This transmission operation is detected by the HTTP communication monitoring module (5211).
- the HTTP communication monitoring module analyzes the HTTP header (5211), and if it is a transmission operation, executes step 5212 and subsequent steps. If the operation is a reception operation, the processing after 5103 in FIG. 43 is executed.
- the HTTP communication monitoring module acquires the upload destination URL and the upload data from the header analysis result in step 5211 (5212).
- the HTTP communication monitoring module calculates the hash value of the upload data acquired in step 5212 (5213).
- the HTTP communication monitoring module searches the browser output DB 4902 based on the hash value obtained in step 5213, and acquires a record having the same hash value as the hash value of the uploaded file.
- the file managed by the record is a file uploaded by the user. Accordingly, the HTTP communication monitoring module acquires the file attributes (file path, source information, file operation trace information (FID, OID, count)) from the record (5214), and executes Step 5215 and subsequent steps. If no record with the same hash value is found, the process ends because the communication is by a program other than the browser to be monitored.
- the HTTP communication monitoring module operates the in-file trace information for the file detected based on the hash value (5215). Further, the HTTP communication monitoring module checks whether the file upload by the browser matches the alert condition, and transmits an alert if necessary (5216).
- FIG. 45 is a sequence related to reception of a file using a mailer and storage of the received file.
- the TCP communication monitoring module detects the header of TCP communication and analyzes the header (5302).
- Step 5303 If the file is attached to the received mail as a result of the analysis, execute Step 5303 and subsequent steps. If a file is attached to the mail to be transmitted, 5412 and subsequent steps in FIG. 44 are executed. In the case of mail transmission / reception with no attached file or communication other than mail transmission / reception, this processing is terminated.
- the TCP communication monitoring module obtains the sender name of the mail, the file name of the attached file, and the data of the attached file from the analysis result in step 5302 (5303). Subsequently, the TCP communication monitoring module calculates the hash value of the attached file data acquired in step 5303 (5304).
- the TCP communication monitoring module operates the in-file trace information shown in FIG. 32 (5305). Since this is a case where an email with an attached file is received, new in-file trace information is created.
- the TCP communication monitoring module stores the attached file name, sender name, hash value of attached file data, and in-file trace information in the mail input DB 4903 (FIG. 50) (5306).
- the mailer When the user saves the file attached to the mail (5310), the mailer writes the attached file to the file system 204 (5311).
- the file I / O monitoring module detects the operation of step 5311 using a method such as an API hook (5312).
- the file I / O monitoring module obtains a hash value of the file data written by the mailer (5313). Further, the file I / O monitoring module acquires the path where the mailer has written the file (5314).
- the file I / O monitoring module searches the mail input DB 4903 (FIG. 50) based on the hash value obtained in step 5313.
- the file corresponding to the record is a file attached to the mail. Therefore, the file I / O monitoring module acquires file attributes (attached file name, sender name, file operation trace information) from the record (5315) and executes step 5316 and subsequent steps.
- step 5311 is not the file write that occurred in the download operation of the attached file (5310), so this process ends.
- the file I / O monitoring module operates in-file trace information (5316).
- the file operation trace information is written in the alternative stream of the saved file (the foul attached to the mail and stored in the file system 204) (5316). Further, the file I / O monitoring module gives the source information (1311 in FIG. 13) to the alternative stream of the saved file.
- FIG. 46 shows a sequence in the case of sending a file with a file attached.
- the mailer reads the file attached to the email from the file system 204 (5402).
- the file I / O monitoring module detects the file read in step 5402 by a method such as an API hook (5403).
- the file I / O monitoring module obtains the hash value of the file read by the mailer (5404).
- the file I / O monitoring module acquires the acquisition source information from the alternative stream of the file (5405).
- the file I / O monitoring module acquires in-file trace information from the alternative stream of the file (5406).
- the file I / O monitoring module stores the file path, file hash value, acquisition source information, and in-file trace information in the mail output DB 4904 (FIG. 51) (5407).
- the mailer When the user sends an email with a file attached (5410), the mailer sends an email with the file attached via the socket 308.
- the TCP communication monitoring module detects the mail transmission and analyzes the TCP header (5411). If a mail with a file attached is transmitted, step 5412 and subsequent steps are executed. If a mail with a file attached is received, 5303 and subsequent steps in FIG. 45 are executed. In the case of transmission or reception of mail without a file attached, or in the case of communication other than mail transmission / reception, this processing is terminated.
- the TCP communication monitoring module obtains the destination email address and the file data attached to the email from the header analysis result in step 5411 (5412).
- the TCP communication monitoring module calculates the hash value of the file data acquired in step 5412 (5413).
- the TCP communication monitoring module searches the mail output DB 4904 and the mail input DB 4903 based on the hash value obtained in Step 5413, and acquires the file attribute (5414). The reason for searching the mail output DB 4904 and the mail input DB 4903 will be described later.
- the TCP communication monitoring module operates the in-file trace information for the file detected based on the hash value (5415), checks the alert condition, and transmits an alert if necessary (5416).
- FIG. 47 shows a sequence for transferring a mail with a file attached.
- the processing for transferring a mail with a file attached is the same as the processing from step 5410 to step 5416 shown in FIG. That is, steps 5510-5516 in FIG. 47 are the same as steps 5410-5416 in FIG.
- the TCP communication monitoring module only monitors communication, and determines whether the monitored communication is communication corresponding to FIG. 46 (mail transmission) or communication corresponding to FIG. 47 (mail transfer). Can not. Therefore, in this embodiment, both the mail output DB 4904 and the mail input DB 4903 are searched regardless of whether the mail is transmitted or forwarded.
- communication between the client PC and the network is monitored, and input / output to the file system is monitored. Then, the file is identified by comparing the hash value of the file detected by communication with the hash value of the file managed by the file system. Associate source information and in-file trace information with the specified file.
- the file can be specified relatively easily compared to the configuration in which the file is specified based on the user operation using the browser or based on the character string input to the dialog.
- an email address or URL can be associated with a file.
- the type of browser used by the user may change, or the browser may be upgraded.
- the configuration of the dialog changes due to version upgrade of the application program, or a completely new application program is installed in the client PC 121.
- the communication monitoring result and the monitoring result of input / output to the system are associated with each other by a common hash value. Therefore, the influence of the environmental change as described above can be reduced, and the system can be maintained and operated relatively easily.
- This embodiment can be combined with the first embodiment or the second embodiment.
- this invention is not limited to the Example mentioned above.
- a person skilled in the art can make various additions and changes within the scope of the present invention.
- the second embodiment can be combined with the first embodiment or can be configured independently of the first embodiment. That is, the history of file operations can be managed and visualized in a tree structure within one client PC or within a group including a plurality of client PCs.
- 111 ... Management server, 114 ... Mail server, 115 ... File server, 116 ... Internal web server, 121 ... Client PC, 122 ... Agent program, 123 ... Network printer 123, 204 ... Local file system, 310 ... Process monitoring module, 320 ... Printer monitoring module, 330 ... Browser monitoring module, 340 ... Dialog operation monitoring module, 350 ... File operation monitoring module, 360 ... TCP communication monitoring module, 370 ... File I / O monitoring module, 380 ... HTTP communication monitoring module, 393 ... source DB, 1311 ... identifier indicating source, 3201 ... in-file trace information.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
さらに、本発明では、不正なファイル操作を検出するための不正操作検知システムを備える。不正操作検知システムは、監視装置と管理端末とを備える。監視装置は、クライアントコンピュータのマイクロプロセッサを監視対象として、監視対象に接続された出力装置の画面上の情報に対する操作を監視する。管理端末は、監視装置を管理対象として、監視装置の監視結果を管理する。
監視装置は、監視対象に情報を入力するための操作に応答して、監視対象に入力される入力情報の入手元を識別するとともに、入力情報に、当該入力情報の入手元を示す識別子を付与し、監視対象から情報を出力するための操作に応答して、監視対象から出力される出力情報の出力先を識別するとともに、出力情報の入手元を示す識別子を検索し、識別された出力情報の出力先と検索された出力情報の入手元の組み合わせが不正操作の条件に適合するか否かを判定し、この判定結果に従ってアラートを生成する。
(709)、ファイル名およびファイルのハッシュ値をキーとして入手元DB393を検索し、ファイルの送信者名などの属性を取得する(710)。ステップ710においてファイルの送信者が組織内の別ユーザであった場合、前記ファイルに入手元を示す識別子を付与する(711)。
所定のアラート条件は、ファイルのアップロード先サーバが組織外Webサーバ131のような監視対象であって、かつ、アップロード対象のファイルが管理対象である場合にアラートを送信するように設定されている。
(1)Webブラウザでのダウンロード、
(2)受信メールに添付されたファイル
(3)ファイルエクスプローラを用いた、ファイルサーバからローカルファイルシステム204へのコピーおよび移動、
がある。
それらのいずれの操作でも、インポートされた情報には、インポート元に関する情報を含む入手元を示す識別子1311が付与される。
本実施例の不正操作検知システムが想定する、情報エクスポート操作として、
(1)Webブラウザでのファイルアップロード、
(2)添付ファイル付きメールの送信、
(3)アプリケーションプログラムでの印刷、
(4)リムーバブルメディアへのコピーおよび移動、
が行われる際に、アラートを管理サーバ111に送信可能である。
管理サーバ111のマネージャ112は、ユーザにより選択されたファイルのファイル格納識別子を検索キーとしてPC管理DBを検索し、選択されたファイル格納識別子を有するレコードを抽出する。さらに、マネージャ112は、抽出された各レコードを操作識別子に基づいてソートする。並び替えた結果が、図38の上側に示すテーブル4010である。
Search)した順を示すため、テーブル4010の結果に基づいて容易にツリー構造4020を描画できる。操作識別子の最後の文字を取り除いたトレース情報が、親のトレース情報となる。例えば、操作識別子が”0010” である操作の親の操作(親の操作とは、それよりも一つ前の操作)は、操作識別子”001”を有する操作となる。ツリー表示画面4020とテーブル4010とにおいて、4001と4011、4002と4012、4003と4013、4004と4014、4005と4015、4006と4016、4007と4017、4008と4018が、それぞれ対応する。
(1)Webブラウザを用いたファイルのダウンロード、
(2)Webブラウザを用いたファイルのアップロード、
(3)添付ファイル付き電子メールの受信、
(4)添付ファイルの保存、
(5)添付ファイル付き電子メールの送信、
(6)印刷
を、ファイル操作として管理できる。
(1)Webブラウザでのファイルダウンロード
(1A)操作元→ダウンロード元のURL(ステップ403、502で取得)
(1B)操作先→保存先のファイルパス(ステップ406、510で取得)
(2)Webブラウザでのファイルアップロード
(2A)操作元→アップロードするファイルパス(ステップ807で取得)
(2B)操作先→アップロード先のURL(ステップ808で取得)
(3)添付ファイル付きメールの受信
(3A)操作元→送信元のメールアドレス(ステップ604、704の送信者名)
(3B)操作先→入力元DB393
(4)添付ファイルの保存
(4A)操作元→入力元DB393
(4B)操作先→保存先のファイルパス(ステップ609、709で取得)
(5)添付ファイル付きメールの送信
(5A)操作元→送信するファイルパス(ステップ907、1007で取得)
(5B)操作先→送信先のメールアドレス(ステップ904、1004の送信者名)
(6)印刷
(6A)操作元→印刷元のファイルパス(ステップ1105で取得)
(1)Webブラウザでのファイルダウンロード
この操作はファイルの起点となる操作であるから、ステップ3401の判定は必ず”Yes”となる。
(2)Webブラウザでのファイルアップロード
起点となる操作であるため、ステップ3401では”No”と判定される。
ステップ3415のチェックでは、操作先がURL(外部)となるため、”No”と判定される。
(3)添付ファイル付きメールの受信
この操作はファイルの起点となる操作であり、ステップ3401の判定では必ず”Yes”となる。
ステップ3403の処理では操作先が入力元DB393であるため、ファイルの代替ストリームにトレース情報を書き込むのではなく、入力元DB393にインファイルトレース情報を格納する。操作先を入力元DB393にするのは、電子メールに添付されたファイルが複数回ファイルシステム204にコピーされた場合でも、大元の操作(添付ファイル付き電子メールの受信)を特定できるようにするためである。
(4)添付ファイルの保存
ステップ3401では”No”と判定される。
ステップ3410では、操作元の代替ストリームからインファイルトレース情報を取得するのではなく、入力元DB393からインファイルトレース情報を取得する。
ステップ3418も同様に、入力元DB393にインファイルトレース情報を格納する。
(5)添付ファイル付きメールの送信
ステップ3401では”No”と判定される。
ステップ3415では、操作先がメールアドレス(外部)のため”No”と判定される。
(6)印刷
ステップ3401では”No”と判定される。
ステップ3415では、操作先が紙媒体(外部)のため”No”と判定される。
Claims (15)
- ファイルを記憶するクライアントコンピュータと、前記クライアントコンピュータを管理するための管理装置とを含む計算機システムの管理方法であって、
前記ファイルの操作に関するメタ情報を、前記クライアントコンピュータと前記管理装置の有する管理情報とに記憶し、
前記ファイルが操作される場合、操作元のファイルに関するメタ情報を前記クライアントコンピュータから取得し、
前記操作元のファイルに関する前記メタ情報に基づいて、操作先のファイルに関するメタ情報を生成し、
前記操作先のファイルに関する前記メタ情報を、前記クライアントコンピュータと前記管理情報とに記憶し、
前記クライアントコンピュータに記憶されている、前記操作元のファイルに関する前記メタ情報を、前記操作元のファイルの操作内容に応じて更新し、
前記操作元のファイル及び/または前記操作先のファイルの操作履歴を、前記管理情報に基づいて検出し、検出された前記操作履歴を出力させる、
計算機システムの管理方法。
- 前記クライアントコンピュータに記憶される前記メタ情報は、前記ファイル内の所定領域に記憶される、
請求項1に記載の計算機システムの管理方法。
- 前記メタ情報には、
前記ファイルが前記クライアントコンピュータの有するファイルシステムに格納される場合に前記ファイルに設定される識別情報であって、前記ファイルを特定するためのファイル格納識別情報と、
前記ファイルが操作された回数を示す操作世代情報と、
前記ファイルのコピー回数を示すコピー回数情報と、
が含まれている、請求項2に記載の計算機システムの管理方法。
- 前記操作世代情報は、前記操作元のファイルが操作される度に桁数が増加するように構成されており、
前記操作先のファイルに関する前記メタ情報に含まれる前記操作世代情報は、前記操作元のファイルに関する前記メタ情報に含まれる前記操作世代情報と前記コピー回数情報とに基づいて設定される、
請求項3に記載の計算機システムの管理方法。
- 前記操作世代情報の桁数が所定値に達した場合は、前記操作先のファイルの出力先が所定の出力先であると判定されるまでの間、前記操作元のファイルが操作されても前記操作先のファイルに関する前記操作世代情報を更新せず、前記操作先のファイルの出力先が前記所定の出力先であると判定された場合は、前記操作先のファイルに関する前記操作世代情報を更新させる、
請求項4に記載の計算機システムの管理方法。
- 前記コピー回数情報の値が他の所定値に達した場合、前記操作先のファイルの出力先が前記所定の出力先であると判定されたときは、前記操作先のファイルに関する前記メタ情報に含まれる前記操作世代情報に所定コードを追加する、
請求項5に記載の計算機システムの管理方法。
- 前記操作履歴を検出する場合は、
前記管理情報の各レコードを前記各ファイル格納識別情報毎にまとめ、
前記各ファイル格納識別情報毎の前記各レコードを前記操作世代情報に基づいて並び替えることにより、前記操作履歴を検出する、
請求項6に記載の計算機システムの管理方法。
- 前記操作履歴をツリー構造で表示出力させる、請求項7に記載の計算機システムの管理方法。
- 前記計算機システムは、不正操作を検知する不正操作検知システムを含んでおり、
(1)前記不正操作検知システムは、
(1-1)前記クライアントコンピュータのマイクロプロセッサを監視対象として、前記監視対象に接続された出力装置の画面上の情報に対する操作を監視する監視装置と、
(1-2)前記監視装置を管理対象として、前記監視装置の監視結果を管理する管理端末と、を有し、
(2)前記監視装置は、
(2-1)前記監視対象に情報を入力するための操作に応答して、前記監視対象に入力される入力情報の入手元を識別するとともに、前記入力情報に、当該入力情報の入手元を示す識別子を付与し、
(2-2)前記監視対象から情報を出力するための操作に応答して、前記監視対象から出力される出力情報の出力先を識別するとともに、前記出力情報の入手元を示す識別子を検索し、前記識別された出力情報の出力先と前記検索された出力情報の入手元の組み合わせが不正操作の条件に適合するか否かを判定し、この判定結果に従ってアラートを生成するようになっている、
請求項8に記載の計算機システムの管理方法。
- 管理装置により管理されるクライアントコンピュータであって、
前記管理装置は、
前記クライアントコンピュータと通信するための通信インターフェースと、
前記クライアントコンピュータを管理するための管理情報と管理プログラムとを記憶するメモリと、
前記メモリに記憶された前記管理プログラムを読み込んで実行することにより、前記メモリに記憶された前記管理情報に基づいて前記クライアントコンピュータを管理するマイクロプロセッサとを、含んでおり、
前記クライアントコンピュータは、
前記管理装置の有する前記通信インターフェースを介して前記管理装置と通信するための他の通信インターフェースと、
複数のファイルを記憶するファイルシステムと、
他の管理プログラムを記憶する他のメモリと、
前記他の管理プログラムを読み込んで実行することにより、前記各ファイルに関するメタ情報を管理する他のマイクロプロセッサとを、含んでおり、
前記他のマイクロプロセッサは、
前記ファイルシステムに記憶されるファイルの操作に関するメタ情報を、他の管理情報と前記管理装置の有する前記管理情報とに記憶させ、
前記ファイルシステムに記憶されるファイルが操作される場合、操作元のファイルに関するメタ情報を、前記他の管理情報から取得し、
前記操作元のファイルに関する前記メタ情報に基づいて、操作先のファイルに関するメタ情報を生成し、
前記操作先のファイルに関する前記メタ情報を、前記他の管理情報と前記管理装置の有する前記管理情報とに記憶させ、
前記他の管理情報に記憶されている、前記操作元のファイルに関する前記メタ情報を、前記操作元のファイルの操作内容に応じて更新させる、
クライアントコンピュータ。
- 前記他の管理情報は、前記ファイル内または前記メモリ内のいずれか一方に設けられている、請求項10に記載のクライアントコンピュータ。
- 前記メタ情報には、
前記ファイルが前記ファイルシステムに格納される場合に前記ファイルに設定される識別情報であって、前記ファイルを特定するためのファイル格納識別情報と、
前記ファイルが操作された回数を示す操作世代情報と、
前記ファイルのコピー回数を示すコピー回数情報と、
が含まれている、請求項11に記載のクライアントコンピュータ。
- 前記操作世代情報は、前記操作元のファイルが操作される度に桁数が増加するように構成されており、
前記操作先のファイルに関する前記メタ情報に含まれる前記操作世代情報は、前記操作元のファイルに関する前記メタ情報に含まれる前記操作世代情報と前記コピー回数情報とに基づいて設定される、
請求項12に記載のクライアントコンピュータ。
- 前記操作世代情報の桁数が所定値に達した場合は、前記操作先のファイルの出力先が所定の出力先であると判定されるまでの間、前記操作元のファイルが操作されても前記操作先のファイルに関する前記操作世代情報を更新せず、前記操作先のファイルの出力先が前記所定の出力先であると判定された場合は、前記操作先のファイルに関する前記操作世代情報を更新させる、
請求項13に記載のクライアントコンピュータ。
- 前記ファイルシステムに入出力される第1ファイルのデータに基づいて当該第1ファイルを特定するための第1ハッシュ値を生成し、
前記他の通信インターフェースを介して入出力される第2ファイルのデータに基づいて当該第2ファイルを特定するための第2ハッシュ値を生成し、
前記第1ハッシュ値と前記第2ハッシュ値とを比較し、
前記第1ハッシュ値と前記第2ハッシュ値とが一致する場合は、前記第1ファイルと前記第2ファイルが同一であると判定し、前記第1ファイルを示すパス情報を前記第2ファイルに対応付け、さらに、前記第1ファイルに関する前記メタ情報を前記第2ファイルに関連付けるか、あるいは、前記第2ファイルに関する前記メタ情報を前記第1ファイルに関連付けるかのいずれかを実行させる、
請求項14に記載のクライアントコンピュータ。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/934,235 US9124616B2 (en) | 2010-04-02 | 2010-06-28 | Computer system management method and client computer |
PCT/JP2010/061000 WO2012001763A1 (ja) | 2010-06-28 | 2010-06-28 | 計算機システムの管理方法及びクライアントコンピュータ |
JP2012522369A JP5417533B2 (ja) | 2010-06-28 | 2010-06-28 | 計算機システムの管理方法及びクライアントコンピュータ |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2010/061000 WO2012001763A1 (ja) | 2010-06-28 | 2010-06-28 | 計算機システムの管理方法及びクライアントコンピュータ |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012001763A1 true WO2012001763A1 (ja) | 2012-01-05 |
Family
ID=45353538
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2010/061000 WO2012001763A1 (ja) | 2010-04-02 | 2010-06-28 | 計算機システムの管理方法及びクライアントコンピュータ |
Country Status (3)
Country | Link |
---|---|
US (1) | US9124616B2 (ja) |
JP (1) | JP5417533B2 (ja) |
WO (1) | WO2012001763A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015176393A (ja) * | 2014-03-17 | 2015-10-05 | 日本電気株式会社 | ストレージ装置、ストレージシステム、ストレージシステムの制御方法および制御プログラム |
WO2016072310A1 (ja) * | 2014-11-05 | 2016-05-12 | キヤノン電子株式会社 | 特定装置、その制御方法、及びプログラム |
US10318727B2 (en) | 2016-03-10 | 2019-06-11 | Fujitsu Limited | Management device, management method, and computer-readable recording medium |
US10326792B2 (en) | 2012-12-07 | 2019-06-18 | Canon Denshi Kabushiki Kaisha | Virus intrusion route identification device, virus intrusion route identification method, and program |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5327240B2 (ja) * | 2011-01-31 | 2013-10-30 | ブラザー工業株式会社 | 通信装置および通信装置システム |
JP5183770B2 (ja) * | 2011-05-20 | 2013-04-17 | キヤノン株式会社 | 文書管理プログラム、情報処理装置 |
US20130097122A1 (en) * | 2011-10-12 | 2013-04-18 | Jeffrey Liem | Temporary File Storage System and Method |
US8413236B1 (en) * | 2012-06-04 | 2013-04-02 | Robert Hansen | Clickjacking protection |
EP2796954B1 (de) * | 2013-04-23 | 2015-11-25 | Siemens Aktiengesellschaft | Numerische Steuerung mit Benachrichtigung eines CAM-Systems bei Änderung des Teileprogramms |
JP5737469B1 (ja) * | 2014-08-22 | 2015-06-17 | 富士ゼロックス株式会社 | 制御装置およびプログラム |
US10225158B1 (en) * | 2014-12-22 | 2019-03-05 | EMC IP Holding Company LLC | Policy based system management |
US9870482B1 (en) | 2015-09-30 | 2018-01-16 | Open Text Corporation | Method and system for managing and tracking content dissemination in an enterprise |
US10671370B2 (en) * | 2018-05-30 | 2020-06-02 | Red Hat, Inc. | Distributing file system states |
JP7031569B2 (ja) * | 2018-11-29 | 2022-03-08 | 日本電信電話株式会社 | 情報作成装置、情報作成方法、および、情報作成プログラム |
CN113407416B (zh) * | 2021-06-29 | 2022-06-24 | 杭州默安科技有限公司 | 一种文件操作ip溯源方法和系统 |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08292961A (ja) * | 1995-04-20 | 1996-11-05 | Fuji Xerox Co Ltd | 文書複写関係管理システム |
JPH0944432A (ja) * | 1995-05-24 | 1997-02-14 | Fuji Xerox Co Ltd | 情報処理方法および情報処理装置 |
JPH0954735A (ja) * | 1995-06-07 | 1997-02-25 | Fuji Xerox Co Ltd | 情報処理方法及び情報処理装置 |
JPH11259459A (ja) * | 1998-03-06 | 1999-09-24 | Fuji Xerox Co Ltd | 文書管理装置 |
JP2005189995A (ja) * | 2003-12-24 | 2005-07-14 | Hitachi Ltd | ファイル授受プロセス管理方法、および、ファイル授受プロセス可視化方法、ならびに、ファイル授受システムにおけるファイル授受プロセス管理装置、および、ユーザ端末 |
JP2008052570A (ja) * | 2006-08-25 | 2008-03-06 | Hitachi Software Eng Co Ltd | 操作履歴管理システム |
JP2008181446A (ja) * | 2007-01-26 | 2008-08-07 | Fuji Xerox Co Ltd | 文書管理装置、情報処理装置、文書管理システム及びプログラム |
JP2009187374A (ja) * | 2008-02-07 | 2009-08-20 | Toshiba Corp | 情報ライフサイクル管理システム、情報管理サーバ装置、電子媒体制御装置及びプログラム |
JP2010003051A (ja) * | 2008-06-19 | 2010-01-07 | Fuji Xerox Co Ltd | 文書情報処理装置、及びプログラム |
WO2010074094A1 (ja) * | 2008-12-26 | 2010-07-01 | 株式会社 東芝 | 情報ライフサイクル管理システム、情報管理サーバ装置、情報媒体制御装置及びプログラム |
Family Cites Families (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6412017B1 (en) * | 1996-07-01 | 2002-06-25 | Microsoft Corporation | Urgent replication facility |
US6408336B1 (en) | 1997-03-10 | 2002-06-18 | David S. Schneider | Distributed administration of access to information |
US6119208A (en) * | 1997-04-18 | 2000-09-12 | Storage Technology Corporation | MVS device backup system for a data processor using a data storage subsystem snapshot copy capability |
US6067541A (en) * | 1997-09-17 | 2000-05-23 | Microsoft Corporation | Monitoring document changes in a file system of documents with the document change information stored in a persistent log |
JP2003044297A (ja) | 2000-11-20 | 2003-02-14 | Humming Heads Inc | コンピュータリソースの制御を行なう情報処理方法および装置、情報処理システム及びその制御方法並びに記憶媒体、プログラム |
US7062649B2 (en) | 2001-01-12 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | System and method for categorizing security profile rules within a computer system |
JP3927376B2 (ja) | 2001-03-27 | 2007-06-06 | 日立ソフトウエアエンジニアリング株式会社 | データ持ち出し禁止用プログラム |
US6996672B2 (en) * | 2002-03-26 | 2006-02-07 | Hewlett-Packard Development, L.P. | System and method for active-active data replication |
US6889231B1 (en) * | 2002-08-01 | 2005-05-03 | Oracle International Corporation | Asynchronous information sharing system |
EP1563402A4 (en) | 2002-10-30 | 2010-11-10 | Portauthority Technologies Inc | METHOD AND SYSTEM FOR ADMINISTRATING CONFIDENTIAL INFORMATION |
US7353533B2 (en) | 2002-12-18 | 2008-04-01 | Novell, Inc. | Administration of protection of data accessible by a mobile device |
JP2004334574A (ja) * | 2003-05-08 | 2004-11-25 | Hitachi Ltd | ストレージの運用管理プログラム、運用管理方法及び管理計算機 |
JP2005078612A (ja) * | 2003-09-04 | 2005-03-24 | Hitachi Ltd | ファイル共有システム及びファイル共有装置間のファイル移行方法 |
US20050134894A1 (en) | 2003-10-31 | 2005-06-23 | Information Handling Services Inc. | Remote access printing systems and methods |
JP3758661B2 (ja) | 2003-11-17 | 2006-03-22 | 株式会社インテリジェントウェイブ | 不正監視プログラム、不正監視の方法及び不正監視システム |
US7730026B2 (en) * | 2004-07-01 | 2010-06-01 | Apple Inc. | Method and system using reusable state information for synchronization and maintenance of data |
US8180743B2 (en) | 2004-07-01 | 2012-05-15 | Emc Corporation | Information management |
US8011003B2 (en) | 2005-02-14 | 2011-08-30 | Symantec Corporation | Method and apparatus for handling messages containing pre-selected data |
JP2006302170A (ja) | 2005-04-25 | 2006-11-02 | Hitachi Ltd | ログ管理方法及び装置 |
US7933870B1 (en) * | 2005-10-12 | 2011-04-26 | Adobe Systems Incorporated | Managing file information |
US7778980B2 (en) * | 2006-05-24 | 2010-08-17 | International Business Machines Corporation | Providing disparate content as a playlist of media files |
JP4737762B2 (ja) | 2006-06-12 | 2011-08-03 | 株式会社日立ソリューションズ | 機密情報の管理プログラム |
JP2007183911A (ja) | 2006-08-17 | 2007-07-19 | Intelligent Wave Inc | 不正操作監視プログラム、不正操作監視方法、及び不正操作監視システム |
JP4518056B2 (ja) | 2006-09-25 | 2010-08-04 | 富士ゼロックス株式会社 | 文書操作認証装置、及びプログラム |
US8181036B1 (en) | 2006-09-29 | 2012-05-15 | Symantec Corporation | Extrusion detection of obfuscated content |
US7788235B1 (en) | 2006-09-29 | 2010-08-31 | Symantec Corporation | Extrusion detection using taint analysis |
JP4742010B2 (ja) | 2006-10-20 | 2011-08-10 | 日立キャピタル株式会社 | 個人情報ファイルの監視システム |
JP2008109380A (ja) | 2006-10-25 | 2008-05-08 | Media Exchange Inc | 電子メール送受信システム |
US7653664B2 (en) * | 2006-11-03 | 2010-01-26 | Microsoft Corporation | Anchor for database synchronization excluding uncommitted transaction modifications |
US7966426B2 (en) * | 2006-11-14 | 2011-06-21 | Microsoft Corporation | Offline synchronization capability for client application |
JP5456462B2 (ja) | 2007-04-18 | 2014-03-26 | 株式会社日立ソリューションズ | 電子メールのフィルタリング手段を備えた機器 |
JP4058467B1 (ja) | 2007-05-17 | 2008-03-12 | クオリティ株式会社 | 電子メールシステムおよび電子メール送受信プログラム |
KR100912870B1 (ko) * | 2007-06-12 | 2009-08-19 | 삼성전자주식회사 | 컨텐츠 및 메타데이터의 무결성 보장 시스템 및 방법 |
JP5179792B2 (ja) | 2007-07-13 | 2013-04-10 | 株式会社日立システムズ | 操作検知システム |
WO2009068074A1 (de) * | 2007-11-26 | 2009-06-04 | Hyperstone Gmbh | VERFAHREN ZUR GLEICHMÄßIGEN NUTZUNG MEHRERER FLASHSPEICHERCHIPS |
US8370948B2 (en) | 2008-03-19 | 2013-02-05 | Websense, Inc. | System and method for analysis of electronic information dissemination events |
JP2009237804A (ja) | 2008-03-26 | 2009-10-15 | Sky Co Ltd | 電子メールシステム |
JP5390911B2 (ja) | 2008-06-03 | 2014-01-15 | 株式会社日立製作所 | ファイル管理システム |
WO2009147855A1 (ja) | 2008-06-03 | 2009-12-10 | 株式会社 日立製作所 | ファイル管理システム |
JP5456425B2 (ja) | 2008-10-22 | 2014-03-26 | 株式会社日立ソリューションズ | コンテンツ認可装置 |
US8286253B1 (en) | 2009-11-23 | 2012-10-09 | Trend Micro Incorporated | Data leakage prevention for resource limited device |
US8843567B2 (en) | 2009-11-30 | 2014-09-23 | International Business Machines Corporation | Managing electronic messages |
US8832802B2 (en) | 2010-02-01 | 2014-09-09 | Protextion Technologies, Llc | System for distribution permissions for network communications |
US8407341B2 (en) | 2010-07-09 | 2013-03-26 | Bank Of America Corporation | Monitoring communications |
US9158621B2 (en) * | 2011-08-29 | 2015-10-13 | Sandisk Technologies Inc. | System and method of copying data |
-
2010
- 2010-06-28 JP JP2012522369A patent/JP5417533B2/ja active Active
- 2010-06-28 US US12/934,235 patent/US9124616B2/en active Active
- 2010-06-28 WO PCT/JP2010/061000 patent/WO2012001763A1/ja active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08292961A (ja) * | 1995-04-20 | 1996-11-05 | Fuji Xerox Co Ltd | 文書複写関係管理システム |
JPH0944432A (ja) * | 1995-05-24 | 1997-02-14 | Fuji Xerox Co Ltd | 情報処理方法および情報処理装置 |
JPH0954735A (ja) * | 1995-06-07 | 1997-02-25 | Fuji Xerox Co Ltd | 情報処理方法及び情報処理装置 |
JPH11259459A (ja) * | 1998-03-06 | 1999-09-24 | Fuji Xerox Co Ltd | 文書管理装置 |
JP2005189995A (ja) * | 2003-12-24 | 2005-07-14 | Hitachi Ltd | ファイル授受プロセス管理方法、および、ファイル授受プロセス可視化方法、ならびに、ファイル授受システムにおけるファイル授受プロセス管理装置、および、ユーザ端末 |
JP2008052570A (ja) * | 2006-08-25 | 2008-03-06 | Hitachi Software Eng Co Ltd | 操作履歴管理システム |
JP2008181446A (ja) * | 2007-01-26 | 2008-08-07 | Fuji Xerox Co Ltd | 文書管理装置、情報処理装置、文書管理システム及びプログラム |
JP2009187374A (ja) * | 2008-02-07 | 2009-08-20 | Toshiba Corp | 情報ライフサイクル管理システム、情報管理サーバ装置、電子媒体制御装置及びプログラム |
JP2010003051A (ja) * | 2008-06-19 | 2010-01-07 | Fuji Xerox Co Ltd | 文書情報処理装置、及びプログラム |
WO2010074094A1 (ja) * | 2008-12-26 | 2010-07-01 | 株式会社 東芝 | 情報ライフサイクル管理システム、情報管理サーバ装置、情報媒体制御装置及びプログラム |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10326792B2 (en) | 2012-12-07 | 2019-06-18 | Canon Denshi Kabushiki Kaisha | Virus intrusion route identification device, virus intrusion route identification method, and program |
JP2015176393A (ja) * | 2014-03-17 | 2015-10-05 | 日本電気株式会社 | ストレージ装置、ストレージシステム、ストレージシステムの制御方法および制御プログラム |
WO2016072310A1 (ja) * | 2014-11-05 | 2016-05-12 | キヤノン電子株式会社 | 特定装置、その制御方法、及びプログラム |
JPWO2016072310A1 (ja) * | 2014-11-05 | 2017-08-17 | キヤノン電子株式会社 | 特定装置、その制御方法、及びプログラム |
US10382477B2 (en) | 2014-11-05 | 2019-08-13 | Canon Denshi Kabushiki Kaisha | Identification apparatus, control method therefor, and storage medium |
US10318727B2 (en) | 2016-03-10 | 2019-06-11 | Fujitsu Limited | Management device, management method, and computer-readable recording medium |
Also Published As
Publication number | Publication date |
---|---|
JP5417533B2 (ja) | 2014-02-19 |
US9124616B2 (en) | 2015-09-01 |
US20110320508A1 (en) | 2011-12-29 |
JPWO2012001763A1 (ja) | 2013-08-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5417533B2 (ja) | 計算機システムの管理方法及びクライアントコンピュータ | |
US8533850B2 (en) | Fraudulent manipulation detection method and computer for detecting fraudulent manipulation | |
CN102959558B (zh) | 用于文档策略实施的系统和方法 | |
JP5396314B2 (ja) | 不正操作検知システム及び不正操作検知方法 | |
JP5623537B2 (ja) | ポータルのためのユーザ定義のプロファイル・タグ、ルール、および推奨 | |
JP2009116884A (ja) | デジタル資産を管理するシステムおよび方法 | |
US20100332550A1 (en) | Platform For Configurable Logging Instrumentation | |
US8706778B2 (en) | Methods and systems for an action-based interface for files and other assets | |
WO2013145125A1 (ja) | コンピュータシステム及びセキュリティ管理方法 | |
US10803093B2 (en) | Systems and methods for enabling a file management label to persist on a data file | |
JP2020502699A (ja) | コンピュータファイルメタデータの収集および表示を実施するためのアーキテクチャ、方法および装置 | |
US20130007769A1 (en) | Tracking File-Centric Events | |
JP5340563B2 (ja) | ダウンロード・ロケーションに基づいてファイルを編成する方法および装置 | |
WO2012111144A1 (ja) | 不正操作検知方法、不正操作検知システム及び計算機読み取り可能な非一時的記憶媒体 | |
US11354081B2 (en) | Information processing apparatus with concealed information | |
JP2013175132A (ja) | 文書管理サーバ装置、文書管理装置、文書管理システム、及び文書管理プログラム | |
US20070061276A1 (en) | Device and method for registering a plurality of types of information | |
JP2009265962A (ja) | 操作ログ情報管理システム | |
US11797752B1 (en) | Identifying downloadable objects in markup language | |
KR20120116293A (ko) | 문서 등록 관리 장치 및 방법 | |
Martini et al. | Detecting and manipulating compressed alternate data streams in a forensics investigation | |
US20240111601A1 (en) | Enhanced migration of objects among computing environments | |
Easttom et al. | Windows File Artifacts: Chuck Easttom, Ph. D., D. Sc. | |
CN111143848A (zh) | 一种记录样本行为及制定病毒规则的系统 | |
Bumgarner et al. | Implementing Splunk |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 12934235 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10854060 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012522369 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10854060 Country of ref document: EP Kind code of ref document: A1 |