[go: up one dir, main page]

CN107103216B - Service information protection device - Google Patents

Service information protection device Download PDF

Info

Publication number
CN107103216B
CN107103216B CN201610822526.7A CN201610822526A CN107103216B CN 107103216 B CN107103216 B CN 107103216B CN 201610822526 A CN201610822526 A CN 201610822526A CN 107103216 B CN107103216 B CN 107103216B
Authority
CN
China
Prior art keywords
application
information
user
access
job
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610822526.7A
Other languages
Chinese (zh)
Other versions
CN107103216A (en
Inventor
池浦规之
盛永谦一郎
桥本淳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nomura Research Institute Ltd
Original Assignee
Nomura Research Institute Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nomura Research Institute Ltd filed Critical Nomura Research Institute Ltd
Priority to CN201610822526.7A priority Critical patent/CN107103216B/en
Publication of CN107103216A publication Critical patent/CN107103216A/en
Application granted granted Critical
Publication of CN107103216B publication Critical patent/CN107103216B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供一种业务信息防护装置,其能够提高业务信息系统的信息安全性,并且容易管理其访问规则。如果是有效的作业申请,则登记判定部(131B)赋予用于唯一识别作业的申请号。作业预定信息保持部(136)保持被登记判定部(131B)正式登记的作业预定信息。日志保持部(152)将在登记判定部(131B)被赋予的申请号和与该申请号对应的作业申请内容的访问日志绑定并保持。作业验证部(151B)对日志保持部(152)的访问日志的内容和与该访问日志所绑定的申请号对应的作业预定保持部(136)的作业预定信息进行比较,检查是否为非法访问。

Figure 201610822526

The present invention provides a business information protection device, which can improve the information security of the business information system and easily manage its access rules. If it is a valid job application, the registration determination unit (131B) assigns an application number for uniquely identifying the job. The job schedule information holding unit (136) holds the job schedule information officially registered by the registration determination unit (131B). The log holding unit (152) binds and holds the application number assigned by the registration determination unit (131B) and the access log of the job application content corresponding to the application number. The job verification unit (151B) compares the content of the access log of the log holder (152) with the job schedule information of the job schedule holder (136) corresponding to the application number bound to the access log, and checks whether the access is illegal .

Figure 201610822526

Description

业务信息防护装置business information protection device

本申请是申请号为201110081078.7、申请日为2011.03.25、发明名称为“业务信息防护装置”的分案申请。This application is a divisional application with the application number of 201110081078.7, the filing date of 2011.03.25, and the name of the invention as "business information protection device".

技术领域technical field

本发明涉及业务信息防护装置,特别是涉及能够提高业务信息系统的信息安全性的业务信息防护装置。The invention relates to a business information protection device, in particular to a business information protection device capable of improving the information security of a business information system.

背景技术Background technique

支持企业或公共设施等运行的业务信息系统、所谓的企业系统(EnterpriseSystem)现在已经成为各种大小组织的基础。业务信息系统通过对从终端节点(node)或数据库获得的数据进行合计、积累、解析、加工,并在此基础上输出附加值更高的信息,由此支持复杂的组织管理。Business information systems, so-called enterprise systems, that support the operation of enterprises or public facilities, etc., have now become the basis of organizations of all sizes. The business information system supports complex organizational management by summing, accumulating, analyzing, and processing data obtained from terminal nodes or databases, and then outputting information with higher added value on this basis.

这样的业务信息系统在运转后也要进行操作监控、故障应对、功能扩充或功能变更等各种维修作业。通常,引进业务信息系统的客户企业将该维修作业委托给外部管理公司。多数情况下是管理公司的SE(System Engineer,系统工程师)远程登录业务信息系统,进行维修作业。After operation of such a business information system, various maintenance operations such as operation monitoring, troubleshooting, function expansion, and function change are also performed. Usually, a client company that has introduced a business information system entrusts the maintenance work to an external management company. In many cases, the SE (System Engineer) of the management company logs into the business information system remotely and performs maintenance work.

近年来,美国通过的SOX(Sarbanes‐Oxley,萨班斯)法案强烈要求企业经营者或账目监察人员保证公开信息的合法性。日本也打算效仿该法而引入日本版SOX法,所以,可应对日本版SOX法的姿态的确立成为当务之急。In recent years, the SOX (Sarbanes-Oxley, Sarbanes-Oxley, Sarbanes-Oxley) Act passed in the United States strongly requires business operators or account inspectors to ensure the legality of public information. Japan also intends to follow the example of this law and introduce the Japanese version of the SOX law, so the establishment of a posture that can cope with the Japanese version of the SOX law has become a top priority.

鉴于这样的社会背景,专利文献1提出了下述技术,即涉及除了根据ID和密码进行用户认证以外还以管理者的授权访问为条件的访问规则(access rule)的技术。In view of such a social background, Patent Document 1 proposes a technology involving an access rule conditional on an administrator's authorized access in addition to user authentication based on an ID and a password.

【现有技术文献】【Existing technical documents】

【专利文献】【Patent Literature】

【专利文献1】日本特开2004-213475号公报[Patent Document 1] Japanese Patent Laid-Open No. 2004-213475

发明内容SUMMARY OF THE INVENTION

专利文献1中记载的访问规则在防止非法访问业务信息系统方面是有效的方法,但要求管理者立即应对作业申请,所以负担大。即,确立容易防止信息泄露的访问规则固然重要,但是存在为抑制人为误差的发生而必须考虑用户负担的问题。The access rule described in Patent Document 1 is an effective method for preventing unauthorized access to the business information system, but requires an administrator to immediately respond to a job application, so the burden is large. That is, it is important to establish an access rule that can easily prevent information leakage, but there is a problem that the burden on the user must be considered in order to suppress the occurrence of human error.

另外,企业所引进的业务信息系统不限于单一系统。例如,某一企业也许分别引进财务系统和顾客系统,或者也许这些系统被合并到更上位的系统。在这类运转多个业务系统的企业中,也需要能够提高各业务信息系统的信息安全性、并且容易管理它们的访问规则的架构。In addition, the business information system introduced by the enterprise is not limited to a single system. For example, a business may introduce separate financial and customer systems, or these systems may be merged into higher-level systems. In such a company that operates a plurality of business systems, an architecture capable of improving the information security of each business information system and easily managing their access rules is required.

本发明的目的是提供一种能够提高业务信息系统中的信息安全性的业务信息防护装置。The purpose of the present invention is to provide a business information protection device which can improve the information security in the business information system.

本发明的一个侧面的特征在于,具有:合法用户信息保持装置,其保持登记有可执行系统的规定处理的合法用户的合法用户信息;申请接收装置,其接收用于申请指定访问预定者和执行所述规定处理的申请信息;预定保持装置,其保持使所申请的所述规定处理和其访问预定者对应的预定信息;执行请求接收装置,在执行所述规定处理时,从终端接收确定访问者的用户识别信息;用户认证装置,其参照所述合法用户信息,判定所述访问者是否被登记为合法用户;申请状态判定装置,参照所述预定信息,判定所述访问者为访问预定者的规定处理是否进行过申请;访问控制装置,以所述用户认证装置的判定和所述申请状态判定装置的判定都为肯定判定作为条件,允许从所述终端至所述系统的访问以进行规定处理;日志记录装置,将从所述终端至所述系统的访问历史记录为日志信息;验证装置,将所述日志信息所示的访问和为进行所述预定信息中所申请的规定处理的访问进行对比,检测出所述日志信息所示的访问中的、与为进行所述预定信息所申请的规定处理的访问不符合的访问,作为非法访问。One aspect of the present invention is characterized in that it has: legal user information holding means for holding legal user information of legal users who are registered to execute predetermined processing of the system; application receiving means for receiving applications for specifying access reservations and executing Application information for the predetermined process; reservation holding means for holding reservation information corresponding to the predetermined process to be applied for and the person making the access reservation; execution request receiving means for receiving a confirmation access from a terminal when the predetermined process is executed user identification information of the visitor; a user authentication device, which refers to the legal user information, and determines whether the visitor is registered as a legal user; an application status determination device, which refers to the predetermined information and determines that the visitor is a visitor scheduled whether an application has been made for the prescribed processing; the access control means, on the condition that both the judgment of the user authentication means and the judgment of the application status judging means are positive judgments, allows access from the terminal to the system to make the prescribed processing; the log recording device records the access history from the terminal to the system as log information; the verification device records the access indicated by the log information and the access for the prescribed processing applied for in the predetermined information The comparison is performed, and among the accesses indicated by the log information, accesses that do not conform to the accesses for the predetermined processing applied for by the predetermined information are detected as illegal accesses.

还具有:申请通知装置,其向规定处理申请的授权者通知所申请的处理内容;授权获得装置,其受理来自所述授权者的授权输入,所述预定保持装置还使所申请的规定处理和其授权状态相对应地保持为所述预定信息,所述申请状态判定装置还能够判定被申请的规定处理是否已经授权。It also has: application notification means for notifying an authorizer of the prescribed processing application of the processing content of the application; authorization acquisition means for accepting an input of authorization from the authorizer, and the reservation holding means also causes the prescribed processing and The authorization status thereof is kept as the predetermined information correspondingly, and the application status determination device can also determine whether the prescribed processing being applied for has been authorized.

所述申请状态判定装置还能够规定处理的执行日期和时间是否在所申请的期间内。The application status determination means can also specify whether or not the execution date and time of the processing are within the application period.

还可以具有:执行条件保持装置,保持定义规定处理的执行条件的执行条件信息;申请登记判定装置,以被申请的处理内容与所述执行条件信息相符为条件,将被申请的规定处理登记在所述预定信息中。It may further include: execution condition holding means for holding execution condition information defining execution conditions of the prescribed processing; application registration determination means for registering the prescribed processing to be applied for in the condition that the content of the applied processing matches the execution condition information. in the predetermined information.

所述合法用户信息保持装置还保持表示可获得与通常的用户权限不同的特别权限的用户的升级用户信息,所述申请状态判定装置在指定特别权限作为对于被申请的规定处理的执行条件时,还对访问者是否是可获得特别权限的用户进行判定。The legitimate user information holding means also holds upgraded user information indicating a user who can obtain a special authority different from the normal user authority, and the application status determination means, when specifying the special authority as an execution condition for the prescribed process to be applied for, A determination is also made as to whether the visitor is a user with special privileges.

利用本发明能够提供一种能够提高业务信息系统的信息安全性的业务信息防护装置。The invention can provide a business information protection device which can improve the information security of the business information system.

附图说明Description of drawings

图1是表示本实施方式的业务信息系统的结构例的框图。FIG. 1 is a block diagram showing a configuration example of a business information system according to the present embodiment.

图2是表示业务信息防护装置的功能结构例的框图。FIG. 2 is a block diagram showing an example of a functional configuration of the business information protection device.

图3是表示执行条件保持部中的执行条件信息的数据结构例的图。FIG. 3 is a diagram showing an example of a data structure of execution condition information in an execution condition holding unit.

图4是表示日志保持部所保持的访问日志的记录内容例的图。FIG. 4 is a diagram showing an example of recorded contents of an access log held by a log holding unit.

图5是表示登录画面的显示例的图。FIG. 5 is a diagram showing a display example of a login screen.

图6是表示访问申请画面的显示例的图。FIG. 6 is a diagram showing a display example of an access application screen.

图7是表示访问授权画面的显示例的图。FIG. 7 is a diagram showing a display example of an access authorization screen.

图8是表示访问申请、授权级别设定画面的显示例的图。FIG. 8 is a diagram showing a display example of an access request and authorization level setting screen.

图9是表示访问日志检索画面的显示例的图。FIG. 9 is a diagram showing a display example of an access log search screen.

图10是表示检索结果画面的显示例的图。FIG. 10 is a diagram showing a display example of a search result screen.

图11是对访问检查处理进行说明的流程图。FIG. 11 is a flowchart explaining access check processing.

符号的说明Explanation of symbols

10 业务信息防护装置10 Business Information Guards

11 中继装置11 Repeater

12 登录接口处理部12 Login interface processing unit

12 用户认证装置12 User authentication device

13 申请管理装置13 Application management device

20 作业终端20 Work Terminal

40 客户环境40 Customer Environment

41 财务信息系统41 Financial Information Systems

42 顾客信息系统42 Customer Information System

43 库存管理系统43 Inventory Management System

44 授权终端44 Authorized Terminal

121 用户认证部121 User Authentication Department

122 合法用户信息保持部122 Legal User Information Retention Department

131 申请状态管理部131 Application Status Management Department

131A 作业申请部131A Job Application Department

131B 登记判定部131B Registration Judgment Section

131C 申请通知部131C Application Notification Division

131D 作业授权部131D Work Authorization Department

132 申请状态判定部132 Application Status Judgment Section

133 访问接口处理部133 Access interface processing section

135 执行条件保持部135 Execution condition holding section

136 作业预定保持部136 Job Schedule Holder

138 升级处理部138 Upgrade Processing Department

151 日志管理部151 Log Management Department

152 日志保持部152 Log Keeping Department

151A 日志记录部151A Logging Department

151B 作业验证部151B Job Verification Department

具体实施方式Detailed ways

[业务信息系统的结构][Structure of business information system]

图1是表示本实施方式的业务信息系统的结构例的图。该图所示业务信息系统中,业务信息防护装置10和作业终端20通过网络30连接,同时,客户环境40通过业务信息防护装置10与网络30连接。另外,日志管理装置15也与业务信息防护装置10连接。FIG. 1 is a diagram showing a configuration example of a business information system according to the present embodiment. In the business information system shown in the figure, the business information protection device 10 and the work terminal 20 are connected through the network 30 , and at the same time, the customer environment 40 is connected to the network 30 through the business information protection device 10 . In addition, the log management device 15 is also connected to the business information protection device 10 .

在图1所示的业务信息系统中,客户环境40表示某企业A的业务环境。客户环境40的各种业务系统在运转后也接受适当的维修作业。有时在客户环境40内进行该维修作业,但通常通过来自作业终端20的远程访问来执行该维修作业。以下将进行该远程维修作业的用户简称为“作业者”。作业者通常多数为与企业A签订了维修作业合同的管理公司的SE(Systems Engineer)。作业者操作作业终端20,并通过网络30及业务信息防护装置10远程登录客户环境40的各种业务信息系统。作业终端20和业务信息防护装置10之间的通信路径优选为利用VPN(Virtual Private Network,虚拟专用网)等的安全的通信路径。In the business information system shown in FIG. 1, the customer environment 40 represents the business environment of a certain company A. Various business systems of the customer environment 40 are also subjected to appropriate maintenance work after operation. The maintenance work is sometimes performed in the customer environment 40 , but is usually performed by remote access from the work terminal 20 . Hereinafter, the user who performs the remote maintenance work is simply referred to as "operator". Most of the operators are usually SE (Systems Engineer) of a management company that has signed a maintenance work contract with company A. The operator operates the work terminal 20 to remotely log in to various business information systems of the client environment 40 through the network 30 and the business information protection device 10 . The communication path between the work terminal 20 and the work information protection device 10 is preferably a secure communication path using a VPN (Virtual Private Network) or the like.

下面就网络30借助互联网或局域网(LAN)等公用线路的远程访问为前提进行说明,但业务信息防护装置10和客户环境40、作业终端20可以利用专用线路相互连接。The following description assumes remote access to the network 30 via a public line such as the Internet or a local area network (LAN).

另外,本说明书中对于通过运行各种业务信息系统来执行组织业务的企业使用“客户企业”或“客户环境40”的用语,其意思为从外部的作业终端20接受维修作业服务的客户。In this specification, the terms "customer company" or "customer environment 40" are used for companies that perform organizational work by operating various work information systems, and mean customers who receive maintenance work services from external work terminals 20 .

业务信息防护装置10是集中接收从作业终端20发送至客户环境40的远程登录请求的装置,被设置在网络安全接口。业务信息防护装置10进行TELNET(Telecommunicationnetwork,电信网)、SSH(Secure Shell,安全外壳)、FTP(File Transfer Protocol,文件传输协议)、HTTP(HyperText Transfer Protocol,超文本传输协议)、HTTPS(HypertextTransfer Protocol Security,超文本传输协议的安全版)、WindowsRDP(Remote DesktopProtocol,远程桌面协议)、CIFS(Common Internet File System,通用互联网文件系统)等通信协议的访问控制及获取日志的检查(后面进行详细描述)。The business information protection device 10 is a device that collectively receives a remote login request sent from the work terminal 20 to the client environment 40, and is installed in the network security interface. The service information protection device 10 performs TELNET (Telecommunication network, telecommunication network), SSH (Secure Shell, secure shell), FTP (File Transfer Protocol, file transfer protocol), HTTP (HyperText Transfer Protocol, hypertext transfer protocol), HTTPS (HypertextTransfer Protocol) Security, the secure version of the Hypertext Transfer Protocol), Windows RDP (Remote Desktop Protocol, Remote Desktop Protocol), CIFS (Common Internet File System, Common Internet File System) and other communication protocols access control and log acquisition checks (described in detail later) .

业务信息防护装置10以下面二个阶段的判定都为肯定判定作为条件,允许来自作业终端20的远程登录。The work information protection device 10 permits remote login from the work terminal 20 on the condition that both of the following two stages of determinations are affirmative determinations.

1.作业者是否是预先被登记的用户(以下称为“用户认证”)1. Whether the operator is a pre-registered user (hereinafter referred to as "user authentication")

2.作业者是否事先已经(正确地)申请过执行维修作业(以下称为“申请判定”)2. Whether the operator has previously (correctly) applied for the execution of maintenance work (hereinafter referred to as "application judgment")

业务信息防护装置10包括中继装置11、用户认证装置12、申请管理装置13及访问权管理装置14。业务信息防护装置10可以是使中继装置11、用户认证装置12、申请管理装置13及访问权管理装置14的各功能一体化而构成的单一装置,但在本实施方式中,基于以下理由,对业务信息防护装置10为这三个装置的集合体的情形进行说明。The service information protection device 10 includes a relay device 11 , a user authentication device 12 , an application management device 13 and an access right management device 14 . The business information protection device 10 may be a single device configured by integrating the functions of the relay device 11, the user authentication device 12, the application management device 13, and the access right management device 14, but in this embodiment, for the following reasons: The case where the business information protection device 10 is an aggregate of these three devices will be described.

一般情况下,系统构成通常如下:操作者从自己终端远程登录到终端服务器,以被该终端服务器进行用户认证作为条件,允许访问业务信息系统。在本实施方式中,除了这样的系统(以往的系统)以外,还引入了用户认证装置12、申请管理装置13及访问权管理装置14,由此实现了通过申请判定来提高信息安全性。即,图1所示的中继装置11可以是现有的终端服务器,下面对中继装置11是安装了WINDOWS(注册商标)的普通PC(PersonalComputer,个人电脑)终端的情形进行说明。In general, the system structure is usually as follows: the operator remotely logs in to the terminal server from his own terminal, and is allowed to access the business information system on the condition that the terminal server performs user authentication. In this embodiment, in addition to such a system (conventional system), a user authentication device 12, an application management device 13, and an access right management device 14 are introduced, thereby realizing improvement of information security by application determination. That is, the relay device 11 shown in FIG. 1 may be an existing terminal server, and the following describes the case where the relay device 11 is a general PC (Personal Computer) terminal on which WINDOWS (registered trademark) is installed.

当中继装置11被作业终端20经由网络30访问时,中继装置11对该作业终端20的IP地址和主机名等进行确认,在作业终端20为连接许可对象以外的对象的情况下,立即切断,不允许连接。另一方面,在作业终端20为连接许可对象的情况下,中继装置11要求作业终端20提供用户ID和密码,并将按照该要求而发送过来的用户ID和密码提供给用户认证装置12、申请管理装置13及访问权管理装置14,委托确认。When the relay device 11 is accessed by the work terminal 20 via the network 30, the relay device 11 confirms the IP address, host name, etc. of the work terminal 20, and immediately disconnects the work terminal 20 if the work terminal 20 is not a target of connection permission , the connection is not allowed. On the other hand, when the work terminal 20 is the target of connection permission, the relay device 11 requests the work terminal 20 to provide the user ID and password, and provides the user authentication device 12, The application management device 13 and the access right management device 14 request confirmation.

用户认证装置12代替中继装置11执行“用户认证”。首先,作业终端20的用户与以往相同地远程登录中继装置11。此时,用户ID和密码通过网络30被发送至中继装置11。用户认证装置12从中继装置11接收到用户ID和密码后执行用户认证,并将该结果返给中继装置11。The user authentication device 12 performs "user authentication" instead of the relay device 11 . First, the user of the work terminal 20 remotely logs in to the relay device 11 as in the past. At this time, the user ID and password are transmitted to the relay device 11 through the network 30 . The user authentication device 12 performs user authentication after receiving the user ID and password from the relay device 11 , and returns the result to the relay device 11 .

申请管理装置13从中继装置11接收到用户ID和密码后执行“申请判定”。作业者必须在远程登录业务信息系统之前,预先申请预定在何时执行何种作业。申请管理装置13统一管理这样的作业预定,并在接收到来自作业者的远程登录请求时,确认该作业者是否事先申请了某种维修作业。允许访问业务信息系统的条件是用户认证成功,并且已申请过作业。The application management device 13 executes "application determination" after receiving the user ID and password from the relay device 11 . The operator must pre-apply for what kind of work to be performed at what time before logging in to the business information system remotely. The application management device 13 collectively manages such work schedules, and when receiving a remote login request from an operator, confirms whether or not the operator has applied for a certain maintenance work in advance. The conditions for allowing access to the business information system are that the user has been authenticated successfully and has applied for a job.

访问权管理装置14代替中继装置11执行“访问权认证”。也就是说,访问权管理装置14从中继装置11接收到用户ID和密码及表示访问目的地的信息(IP地址和主机名等),执行是否允许该用户连接到访问目的地(是否有访问权)的认证,并将该结果返给中继装置11。The access right management device 14 performs "access right authentication" in place of the relay device 11 . That is, the access right management device 14 receives the user ID and password and information indicating the access destination (IP address, host name, etc.) from the relay device 11, and executes whether to allow the user to connect to the access destination (whether the user has the access right or not). ), and return the result to the relay device 11.

中继装置11、用户认证装置12、申请管理装置13及访问权管理装置14分别由正支和副支两台服务器构成,具有失效转移(failover)功能。即,构成为,在正支服务器因某理由出现故障时,正支服务器的IP地址被添加到副支服务器中。具体而言,正支服务器和副支服务器分别具有真实IP和虚拟IP,所以,在副支服务器监控正支服务器并检测到异常时,获取正支的虚拟IP。作业者可以访问虚拟IP,所以,在发生异常时,自动将对正支服务器的访问更换为对副支服务器的访问。由此,作业者能够利用副支服务器继续服务,而没有意识到正支服务器发生故障。The relay device 11 , the user authentication device 12 , the application management device 13 and the access right management device 14 are respectively composed of two servers, a main branch and a sub-branch, and have a failover function. That is, when the main branch server fails for some reason, the IP address of the main branch server is added to the sub-branch server. Specifically, the main branch server and the sub-branch server have real IPs and virtual IPs, respectively. Therefore, when the sub-branch server monitors the main branch server and detects an abnormality, the virtual IP of the main branch is obtained. Since the operator can access the virtual IP, when an abnormality occurs, the access to the primary server is automatically replaced with the access to the secondary server. As a result, the operator can continue the service using the sub-branch server without realizing that the main-branch server has failed.

作为本实施方式的业务信息防护装置10的主要优点,可以列举以下5点。The following five points can be listed as main advantages of the business information protection device 10 of the present embodiment.

1.由于除了进行用户认证,还进行申请判定,所以,增强了业务信息系统的信息安全性。1. In addition to user authentication, application judgment is also performed, so the information security of the business information system is enhanced.

2.容易导入已经运行的业务信息系统中。2. It is easy to import into the already running business information system.

3.能够减轻与申请判定相关联的用户的负载。3. The load of the user associated with the application determination can be reduced.

4.能够利用单一的业务信息防护装置10对多种业务信息系统进行统一管理。4. A single business information protection device 10 can be used for unified management of various business information systems.

5.由于绑定申请内容和访问日志,所以容易进行访问检查。5. Since the application content and the access log are bound, the access check is easy.

日志管理装置15获取并管理在中继装置11中进行的访问内容。例如,获取并管理访问日期和时间或IP地址之类的“概要日志”或收发的数据的“全文日志”。The log management device 15 acquires and manages the content of the access performed in the relay device 11 . For example, "summary logs" such as access date and time or IP addresses or "full-text logs" of data sent and received are acquired and managed.

日志管理装置15将申请管理装置13所管理的作业申请内容和日志管理装置15所管理的访问日志绑定,进行管理,所以,能够容易地进行访问检查。所谓访问检查,是搜索访问日志,并检查是否正在进行所申请的访问的日志。The log management device 15 binds and manages the job application content managed by the application management device 13 and the access log managed by the log management device 15, so that access checks can be easily performed. The so-called access check is to search the access log and check whether the requested access is being performed.

在作业终端20被作业者输入用于远程登录客户环境40的用户ID和密码时,将该用户ID和密码作为远程登录请求,通过网络30发送给业务信息防护装置10。When an operator inputs a user ID and password for logging in to the client environment 40 remotely on the work terminal 20 , the user ID and password are transmitted to the business information protection device 10 via the network 30 as a remote login request.

客户环境40包括财务信息系统41、顾客信息系统42、库存管理系统43的三种业务信息系统和一个以上授权终端44。财务信息系统41是管理企业A的财务信息的系统。顾客信息系统42是管理企业A的顾客信息的系统。库存管理系统43是管理企业A的商品库存状态的系统。授权终端44是安装了Web浏览器的普通PC终端。授权终端44不一定属于客户环境40,可以是笔记本电脑等便携式终端。The customer environment 40 includes three business information systems of a financial information system 41 , a customer information system 42 , and an inventory management system 43 and one or more authorization terminals 44 . The financial information system 41 is a system that manages the financial information of the company A. The customer information system 42 is a system for managing customer information of the company A. The inventory management system 43 is a system that manages the inventory status of products of the company A. The authorized terminal 44 is an ordinary PC terminal with a Web browser installed. The authorized terminal 44 does not necessarily belong to the client environment 40, but may be a portable terminal such as a notebook computer.

图2是表示业务信息防护装置10及日志管理装置15的功能结构例的框图。FIG. 2 is a block diagram showing an example of the functional configuration of the business information protection device 10 and the log management device 15 .

对于图2所示的各框,在硬件方面,可以通过包括计算机的CPU在内的元件或机械装置实现,在软件方面,可以通过计算机程序等实现,但是,在这里,图2所示的各框表示通过硬件和软件的联合而实现的功能块。因此,这些功能块能够利用硬件、软件的组合以各种形式实现。Each block shown in FIG. 2 can be realized by components or mechanical devices including a CPU of a computer in terms of hardware, and realized by a computer program or the like in terms of software. However, here, each block shown in FIG. 2 Blocks represent functional blocks implemented by a combination of hardware and software. Therefore, these functional blocks can be realized in various forms using a combination of hardware and software.

A:中继装置11A: Relay device 11

中继装置11的登录接口处理部111接收来自作业终端20的远程登录请求。该远程登录请求中含有用户ID和密码。中继装置11传输接收到的用户ID和密码,从而利用用户认证装置12进行用户认证处理,利用申请管理装置13进行申请判定处理,利用访问权管理装置14进行访问权认证处理。另外,登录接口处理部111在从作业终端20获取了表示访问目的地的信息(IP地址和主机名等)时,传输获取的信息,从而利用访问权管理装置14进行访问权认证处理。并且,登录接口处理部111从用户认证装置12、申请管理装置13及访问权管理装置14接收各自的判定结果。以下将类似用户ID或密码的用于识别用户的数据称为“用户识别信息”。作为变型例,用户识别信息可以是指纹和虹膜等生物信息。The login interface processing unit 111 of the relay device 11 receives a remote login request from the work terminal 20 . The remote login request contains the user ID and password. The relay device 11 transmits the received user ID and password to perform user authentication processing by the user authentication device 12 , application determination processing by the application management device 13 , and access right authentication processing by the access right management device 14 . In addition, when the login interface processing unit 111 acquires the information indicating the access destination (IP address, host name, etc.) from the work terminal 20 , it transmits the acquired information to perform access authorization authentication processing by the access authorization management device 14 . Then, the login interface processing unit 111 receives the respective determination results from the user authentication device 12 , the application management device 13 , and the access right management device 14 . Hereinafter, data for identifying a user like a user ID or password is referred to as "user identification information". As a modification example, the user identification information may be biometric information such as fingerprints and irises.

中继装置11可以不是单独的装置。例如,可以分别是用于财务信息系统41的中继装置11和用于顾客信息系统42的中继装置11。或者,作业者可以通过多个中继装置11中的任意中继装置11访问目标业务信息系统。从分散负载和有效性方面考虑,优选设置多个中继装置11。同样,从分散负载和有效性方面考虑,也可以设置多个用户认证装置12、申请管理装置13及访问权管理装置14。The relay device 11 may not be a separate device. For example, the relay device 11 for the financial information system 41 and the relay device 11 for the customer information system 42 may be respectively. Alternatively, the operator can access the target business information system through any relay device 11 among the plurality of relay devices 11 . From the viewpoint of load distribution and effectiveness, it is preferable to provide a plurality of relay apparatuses 11 . Similarly, from the viewpoint of load distribution and effectiveness, a plurality of user authentication devices 12, application management devices 13, and access rights management devices 14 may be provided.

B:用户认证装置12B: User authentication device 12

用户认证装置12包括用户认证部121和合法用户信息保持部122。在中继装置11的登录接口处理部111接收到远程登录请求时,用户认证部121从登录接口处理部111获取该用户ID和密码。并且,通过判定该发送源的用户是否作为合法的用户被登记在合法用户信息保持部122来进行用户认证。合法用户信息保持部122保持有使用户ID和密码对应的合法用户信息。该合法用户信息中登记的用户称为“合法用户”。用户认证部121不仅对作业者执行用户认证,对授权者也执行用户认证,后面进行详细描述。另外,用户信息保持部122安装在用户认证装置12的内部,但并不限定于此,例如可以是LDAP(Lightweight DirectoryAccess Protocol,轻量级目录访问协议)服务器等外部装置。The user authentication device 12 includes a user authentication unit 121 and an authorized user information holding unit 122 . When the login interface processing unit 111 of the relay device 11 receives the remote login request, the user authentication unit 121 acquires the user ID and password from the login interface processing unit 111 . Then, user authentication is performed by determining whether or not the user of the transmission source is registered in the authorized user information holding unit 122 as an authorized user. The authorized user information holding unit 122 holds authorized user information associated with a user ID and a password. The users registered in the legal user information are called "legal users". The user authentication unit 121 performs user authentication not only on the operator but also on the authorizer, which will be described in detail later. The user information holding unit 122 is installed inside the user authentication device 12, but is not limited thereto, and may be an external device such as an LDAP (Lightweight Directory Access Protocol) server, for example.

在对业务信息系统进行的维修作业中,也包括如断开(release)作业一类的对业务信息系统影响特别大的作业。为了执行这类维修作业,需要通过与管理员一样的用户权限进行访问,而不是以通常的用户权限进行访问。但是,从提高业务信息系统的信息安全性方面来看,不优选轻易地赋予这样的特别用户权限(以下简称为“特别权限”)。在后面描述详细架构,但业务信息防护装置10能够严格管理处于能够获取该特别权限的状态的用户(以下称为“可升级用户”)。合法用户信息保持部122除了保持合法用户信息以外,还保持表示可升级用户的升级用户信息。将被登记在升级用户信息中成为可升级用户称为“升级”,将从升级用户信息中删除,不再是可升级用户称为“降级”。The maintenance work on the business information system also includes work that has a particularly large impact on the business information system, such as release work. In order to perform such maintenance work, access is required with the same user rights as the administrator, not with the usual user rights. However, from the viewpoint of improving the information security of the business information system, it is not preferable to give such special user authority (hereinafter simply referred to as "special authority") easily. The detailed structure will be described later, but the business information protection device 10 can strictly manage users in a state in which the special authority can be acquired (hereinafter referred to as "upgradable users"). The authorized user information holding unit 122 holds, in addition to the authorized user information, upgrade user information indicating an upgradeable user. To be registered in the upgrade user information to become an upgradeable user is called "upgrade", it will be deleted from the upgrade user information, and it is no longer an upgradeable user called "downgrade".

本实施方式的用户认证装置12是单一装置,统一管理用户识别信息。通过利用单一的用户认证装置12执行联系多个业务信息系统和多个关系者的用户认证,从而形成容易管理用户认证策略(policy)的结构。The user authentication device 12 of the present embodiment is a single device that manages user identification information in a unified manner. By using a single user authentication device 12 to perform user authentication in connection with a plurality of business information systems and a plurality of related parties, a structure for easy management of a user authentication policy (policy) is formed.

C:申请管理装置13C: Application management device 13

申请管理装置13包括申请状态管理部131、申请状态判定部132、访问接口处理部133、执行条件保持部135、作业预定保持部136及升级处理部138。The application management device 13 includes an application status management unit 131 , an application status determination unit 132 , an access interface processing unit 133 , an execution condition storage unit 135 , a job schedule storage unit 136 , and an upgrade processing unit 138 .

作业者为了访问业务信息系统,必须预先申请维修作业的执行。申请状态管理部131承担与该作业的申请相关的处理。申请状态管理部131包括作业申请部131A、登记判定部131B、申请通知部131C及作业授权部131D。In order to access the business information system, an operator must apply for execution of maintenance work in advance. The application status management unit 131 is in charge of processing related to the application for the job. The application state management unit 131 includes a work application unit 131A, a registration determination unit 131B, an application notification unit 131C, and a work authorization unit 131D.

作业者在开始作业前通过作业终端20向申请管理装置13发送作业申请信息。所谓作业申请信息,是作业目的、作业日期和时间、项目名、成为访问对象的系统名等输入数据的集合,但此外还可以包括申请者的邮件地址、申请日期和时间或申请者的IP地址等输入数据以外的附带信息。另外,从作业终端20发送作业申请信息,但并不限于此,例如,可以从不同于作业终端20的申请终端(未图示)发送。The operator transmits the job application information to the application management device 13 through the operation terminal 20 before starting the operation. Job application information is a collection of input data such as job purpose, job date and time, project name, and system name to be accessed, but may also include applicant's email address, application date and time, or applicant's IP address Incidental information other than input data. In addition, although the job application information is transmitted from the operation terminal 20, it is not limited to this, For example, it may be transmitted from an application terminal (not shown) different from the operation terminal 20.

作业申请部131A从作业终端20接收作业申请信息。The work request unit 131A receives work request information from the work terminal 20 .

登记判定部131B判定作业申请部131A接收到的作业申请信息是否与被登记在执行条件保持部135的执行条件信息(后面参照图3进行描述)相符。登记判定部131B判定为作业申请信息与执行条件信息不符时,拒绝申请,并将该结果通知作业终端20的作业者。登记判定部131B判定为作业申请信息符合执行条件信息时,在作业预定保持部136的作业预定信息中登记被申请的作业。将被登记在作业预定信息中的作业申请称为“有效的作业申请”。作业预定信息的内容与作业申请信息的内容可以实质上相同。即,接到的作业申请信息中,只有满足作为有效的作业申请的要件的作业申请信息才作为“作业预定信息”被正式登记在作业预定保持部136。The registration determination unit 131B determines whether or not the job application information received by the job application unit 131A matches execution condition information (described later with reference to FIG. 3 ) registered in the execution condition holding unit 135 . When the registration determination unit 131B determines that the work application information does not match the execution condition information, it rejects the application, and notifies the operator of the work terminal 20 of the result. When the registration determination unit 131B determines that the job application information matches the execution condition information, the requested job is registered in the job schedule information of the job schedule holding unit 136 . The job application registered in the job schedule information is referred to as a "valid job application". The content of the job reservation information and the content of the job application information may be substantially the same. That is, among the received job application information, only the job application information satisfying the requirements as a valid job application is officially registered in the job schedule holding unit 136 as “job schedule information”.

如果是有效的作业申请,则登记判定部131B赋予用于唯一识别作业的申请号(作业ID)。在作业预定信息中申请号、作业预定日期和时间、作业内容、作业者名、授权状态等被对应。If it is a valid job application, the registration determination unit 131B assigns an application number (job ID) for uniquely identifying the job. In the job schedule information, an application number, job schedule date and time, job content, worker name, authorization status, and the like are associated.

不仅存在只要进行有效作业申请,就可开始作业的那一类维修作业,还存在没有获得授权就不能开始作业的那一类维修作业。作为执行条件信息的一部分,可以像这样进行定义。There is not only a type of maintenance work that can be started as long as a valid work application is made, but also a type of maintenance work that cannot be started without authorization. As part of the execution condition information, it can be defined like this.

另外,对于被登记在作业预定保持部136的作业预定信息中已经过作业预定日期和时间的作业,成为过去提出的申请历史的状态,对于被拒绝的申请,成为申请状态被记录为“拒绝”的状态。In addition, the job whose job schedule date and time has passed in the job schedule information registered in the job schedule holding unit 136 is in the status of the application history made in the past, and the application status that has been rejected is recorded as "rejected". status.

在有效的作业申请被登记在作业预定保持部136时,申请通知部131C参照执行条件保持部135登记的执行条件信息判定该申请的作业内容是否需要授权。在维修作业被申请了的情况下,申请通知部131C将其申请号通知给授权者。本实施方式的申请通知部131C向授权终端44发送表示申请号的电子邮件。授权者如果接收到通知,则操作授权终端44的未图示的输入部,基于申请号,访问业务信息防护装置10的申请管理装置13,输入是否授权。When a valid job application is registered in the job reservation holding unit 136 , the application notification unit 131C refers to the execution condition information registered in the execution condition holding unit 135 to determine whether or not authorization is required for the job content of the application. When the maintenance work is applied for, the application notification unit 131C notifies the authorizer of the application number. The application notification unit 131C of the present embodiment transmits an electronic mail indicating the application number to the authorization terminal 44 . When the authorizer receives the notification, he operates the input unit (not shown) of the authorization terminal 44, accesses the application management device 13 of the business information protection device 10 based on the application number, and inputs whether or not to authorize.

作业授权部131D从授权终端44接收是否授权。如果被授权,则作业授权部131D将作业预定保持部136所登记的作业预定信息中的授权状态从“未授权”变更为“授权”。拒绝的情况下,作业授权部131D将拒绝申请的结果通知给作业者,同时,将在作业预定保持部136所登记的作业预定信息的申请状态记录为“拒绝”。The work authorization unit 131D receives from the authorization terminal 44 whether or not to authorize. If authorized, the job authorization unit 131D changes the authorization status in the job schedule information registered in the job schedule holding unit 136 from "unauthorized" to "authorized". In the case of rejection, the job authorization unit 131D notifies the operator of the result of rejecting the application, and records the application status of the job schedule information registered in the job schedule holding unit 136 as "rejected".

申请状态判定部132执行申请判定。当从作业者接收到远程登录请求时,参照从登录接口处理部111获取的用户识别信息和作业预定保持部136所登记的作业预定信息,判定是否申请过作业。另外,申请状态判定部132还对远程登录请求的接收日期和时间是否在所申请的作业时间内进行判定。The application status determination unit 132 performs application determination. When a remote login request is received from the operator, it is determined whether or not a job has been requested by referring to the user identification information acquired from the login interface processing unit 111 and the job schedule information registered in the job schedule holding unit 136 . In addition, the application state determination unit 132 determines whether or not the date and time of receipt of the remote login request is within the requested work time.

例如,当指定“10:00~11:00”的作业预定时间进行申请时,在10:00前和11:00后即使提出远程登录请求,申请判定的结果也是“否定”,不允许远程登录。For example, when an application is made by specifying a job schedule of "10:00 to 11:00", even if a remote login request is made before 10:00 and after 11:00, the result of the application judgment is "negative" and remote login is not allowed. .

在用户认证和申请判定都是肯定判定时,访问接口处理部133允许用于从作业终端20访问客户环境40的通信路径。当然,需要授权的维修作业被申请时,不经授权不允许访问。When both the user authentication and the application determination are positive determinations, the access interface processing unit 133 allows a communication path for accessing the client environment 40 from the work terminal 20 . Of course, when maintenance work that requires authorization is requested, access is not allowed without authorization.

执行条件保持部135将对维修作业的访问规则作为执行条件信息进行保持。维修作业为如应对故障、调查、运转监控、断开作业等,其目的各种各样。可以将维修作业如此分为多个种类(以下简称为“作业种类”)。例如对业务信息系统增加模块的断开作业有时希望仅在营业时间以外允许。这种情况下,业务信息系统的管理负责人设定执行条件,使得只能在营业时间以外执行断开作业。后面参照图3对执行条件保持部135的数据结构进行描述。The execution condition holding unit 135 holds the access rule for the maintenance work as execution condition information. Maintenance work has various purposes such as troubleshooting, investigation, operation monitoring, and disconnection work. In this way, maintenance work can be classified into a plurality of types (hereinafter simply referred to as "work types"). For example, disconnection of a business information system add-on module is sometimes desired to be permitted only outside business hours. In this case, the person in charge of management of the business information system sets the execution conditions so that the disconnection operation can be executed only outside business hours. The data structure of the execution condition holding unit 135 will be described later with reference to FIG. 3 .

作业预定保持部136保持被申请状态管理部131的登记判定部131B正式登记的、满足作为有效的作业申请的要件的作业预定信息。The job schedule holding unit 136 holds job schedule information that is officially registered by the registration determination unit 131B of the application-requested state management unit 131 and that satisfies the requirements as a valid job application.

升级处理部138按规定的时间从作业预定保持部136读取作业预定信息,判定是存在应当升级的用户还是存在应当降级的用户。The upgrade processing unit 138 reads the job schedule information from the job schedule holding unit 136 at a predetermined time, and determines whether there is a user who should be upgraded or a user who should be demoted.

本实施方式的申请管理装置13是单一装置,统一执行申请判定。利用单一的申请管理装置13执行与多个业务信息系统相关的申请判定,由此构成为容易管理执行条件和作业预定信息。The application management device 13 of the present embodiment is a single device, and performs application determination in a unified manner. By executing the application determination regarding a plurality of business information systems by a single application management device 13, it is configured that the execution conditions and the work schedule information can be easily managed.

图3是表示执行条件保持部135中的执行条件信息的数据结构的例子的图。FIG. 3 is a diagram showing an example of a data structure of execution condition information in the execution condition holding unit 135 .

执行条件信息是各业务信息系统的管理负责人制定的访问规则。规则ID栏135A表示用于唯一识别访问规则的ID(以下称为“规则ID”)。访问规则被登记时,分配规则ID。年月日栏135B表示访问规则的适用日期。时间栏135C表示访问规则的适用时间。例如,在适用规则ID“1”的访问规则时,作为企业A的营业日为“6:00~16:00”的时间段。作业种类栏135D表示适用访问规则的维修作业的作业种类。是否需要授权栏135E表示为了执行该作业是否需要授权。The execution condition information is an access rule established by the person in charge of management of each business information system. The rule ID column 135A indicates an ID for uniquely identifying an access rule (hereinafter referred to as "rule ID"). When an access rule is registered, a rule ID is assigned. The year-month-day column 135B indicates the date of application of the access rule. The time column 135C indicates the applicable time of the access rule. For example, when the access rule of the rule ID "1" is applied, the business day of the company A is the time period of "6:00 to 16:00". The work type column 135D shows the work type of the maintenance work to which the access rule is applied. The authorization required column 135E indicates whether authorization is required in order to execute the job.

在图3的例子中,例如适用规则ID“1”的访问规则的维修作业是以“营业日”的“6:00~16:00”中的作业种类“01”的“应对故障”为目的的维修作业和以作业种类“02”的“调查”为目的的维修作业,针对这些维修作业不需要授权。即,进行以营业日的“6:00~16:00”作为作业预定日期和时间、以应对故障为目的的维修作业时,作业者只预先进行表示其主旨的作业申请即可,无需授权。另外,适用规则ID“2”的访问规则的维修作业是以“营业日”的“6:00~16:00”中的作业种类“03”的“运转监控”为目的的维修作业和以作业种类“04”的“断开作业”为目的的维修作业,这些维修作业需要授权。即,在营业日的“6:00~16:00”,在执行以“运转监控”或“断开作业”为目的的维修作业时,不仅需要作业申请,如果不授权,则不能访问。In the example of FIG. 3 , for example, the maintenance work to which the access rule of the rule ID "1" is applied is aimed at "responding to trouble" of the work type "01" in "6:00 to 16:00" of "business day" maintenance work and maintenance work for the purpose of "investigation" of work type "02", authorization is not required for these maintenance work. That is, when performing maintenance work for the purpose of responding to failures with "6:00 to 16:00" of the business day as the scheduled work date and time, the operator only needs to submit a work application indicating the purpose in advance, and no authorization is required. In addition, the maintenance work to which the access rule of the rule ID "2" is applied is maintenance work for the purpose of "operation monitoring" of work type "03" in "6:00 to 16:00" of "business day" and work Maintenance work for the purpose of "disconnection work" of category "04" requires authorization. That is, when performing maintenance work for the purpose of "operation monitoring" or "disconnection work" from "6:00 to 16:00" on a business day, not only a work application is required, but access is not possible without authorization.

例如假设作业者A在营业日的“6:00~16:00”中的日期和时间T提出远程访问请求。此时,基于图3的例子中所示的执行条件信息得到的申请判定结果如下所示。For example, it is assumed that the remote access request is made by the operator A at the date and time T in "6:00 to 16:00" on a business day. At this time, the application determination result obtained based on the execution condition information shown in the example of FIG. 3 is as follows.

1.未进行如含有日期和时间T为作业预定时间的作业的申请时,为否定判定。1. Negative judgment is made when an application for a job including the date and time T as the job scheduled time has not been made.

2.已申请如含有日期和时间T作为作业预定时间的应对故障作业时,为肯定判定。2. A positive judgment has been made when an application has been made to deal with a faulty operation that includes the date and time T as the scheduled operation time.

3.已申请含有日期和时间T作为作业预定时间的运转监控作业时,申请状态判定部132参照作业预定保持部136,如果申请的运转监控作业被授权过,则为肯定判定。在未授权或拒绝的情况下为否定判定。3. When the operation monitoring job including the date and time T as the job scheduled time has been applied for, the application status determination unit 132 refers to the job schedule holding unit 136, and makes a positive determination if the applied operation monitoring job is authorized. Negative determination in the case of unauthorized or denied.

另外,登记判定部131B在同一作业者在同一日期和时间申请不同的作业时,自动拒绝这样的申请。因此,作业者不能以日期和时间T为对象同时申请应对故障作业和运转监控作业两者。In addition, when the same operator applies for a different job on the same date and time, the registration determination unit 131B automatically rejects such an application. Therefore, the operator cannot apply for both the failure response work and the operation monitoring work at the same time for the date and time T.

执行条件保持部135可以按每一业务信息系统分别保持执行条件信息,但是在本实施方式中,是统一的执行条件信息,即针对财务信息系统41、顾客信息系统42、库存管理系统43定义了共同的访问规则。另外,在本实施方式中所说明的情形为,执行作业种类“04”的“断开作业”时需要特别权限,但其以外的作业不需要特别权限。The execution condition holding unit 135 may hold the execution condition information for each business information system, but in this embodiment, the execution condition information is unified, that is, the financial information system 41 , the customer information system 42 , and the inventory management system 43 are defined. Common access rules. In addition, in the case described in this embodiment, special authority is required to execute "disconnection job" of job type "04", but special authority is not required for other jobs.

D:访问权管理装置14D: Access right management device 14

访问权管理装置14包括访问权认证部141和访问权信息保持部142。在中继装置11的登录接口处理部111接收到远程登录请求时,访问权认证部141从登录接口处理部111获取用户ID和密码及表示访问目的地的信息(IP地址和主机名等),并基于访问权信息保持部142所登记的访问申请状况判定是否允许该发送源的用户连接访问目的地(是否有访问权)。访问权信息保持部142保持与用户ID及表示访问目的地的信息对应的访问申请状况。The access right management device 14 includes an access right authentication unit 141 and an access right information holding unit 142 . When the login interface processing unit 111 of the relay device 11 receives the remote login request, the access right authentication unit 141 acquires the user ID and password and information indicating the access destination (IP address, host name, etc.) from the login interface processing unit 111, Based on the access application status registered in the access right information holding unit 142, it is determined whether or not the user of the transmission source is permitted to connect to the access destination (whether or not he has the access right). The access right information holding unit 142 holds the access application status corresponding to the user ID and the information indicating the access destination.

E:日志管理装置15E: log management device 15

日志管理部151管理从作业终端20访问客户环境40的访问日志。日志管理部151包括日志记录部151A和作业验证部151B。日志记录部151A将远程登录请求的执行、作业终端20和业务信息系统之间收发的命令或数据、该执行的日期和时间记录为访问日志。日志记录部151A在记录时将在申请状态管理部131的登记判定部131B被赋予的申请号和与该申请号对应的作业申请内容的访问日志联系起来。另外,日志记录部151A还记录认证失败或未申请、无访问权等拒绝历史的日志。The log management unit 151 manages access logs of the client environment 40 accessed from the work terminal 20 . The log management unit 151 includes a log recording unit 151A and a job verification unit 151B. The log recording unit 151A records the execution of the remote login request, the command or data transmitted and received between the work terminal 20 and the business information system, and the date and time of the execution as an access log. The log recording unit 151A associates the application number assigned by the registration determination unit 131B of the application state management unit 131 with the access log of the job application content corresponding to the application number at the time of recording. In addition, the log recording unit 151A also records a log of a history of rejection such as authentication failure, non-application, and lack of access rights.

作业验证部151B将保持在日志保持部152的访问日志的内容和与该访问日志所绑定的申请号对应的、被登记在作业预定保持部136的作业预定信息进行比较,检查是否是非法访问。The job verification unit 151B compares the contents of the access log held in the log holding unit 152 with the job schedule information registered in the job schedule holding unit 136 corresponding to the application number bound to the access log, and checks whether the access is illegal. .

例如,在进行了“运转监控”为目的的作业申请时,当执行文件的重写处理时,作业验证部151B参照日志保持部152所保持的访问日志,检测出这样的非法访问。作业验证部151B将存在非法访问或疑为非法访问的访问的结果通知给授权终端44。或者,在检测出非法访问的时间点,访问接口处理部133可以强行禁止远程访问。For example, when a job application for "operation monitoring" is performed, the job verification unit 151B refers to the access log held by the log holding unit 152 and detects such unauthorized access when the file rewriting process is executed. The job verification unit 151B notifies the authorization terminal 44 of the result of the unauthorized access or the access suspected to be the unauthorized access. Alternatively, the access interface processing unit 133 may forcibly prohibit remote access at the point of time when illegal access is detected.

日志保持部152将在申请状态管理部131的登记判定部131B被赋予的申请号和与该申请号对应的作业申请内容的访问日志绑定并保持。后面参照图4对日志保持部152所保持访问日志的记录内容进行说明。The log holding unit 152 binds and holds the application number assigned by the registration determination unit 131B of the application state management unit 131 and the access log of the job application content corresponding to the application number. The log content of the access log held by the log holding unit 152 will be described later with reference to FIG. 4 .

图4是表示日志保持部152所保持的访问日志的记录内容之一例的图。FIG. 4 is a diagram showing an example of the recorded contents of the access log held by the log holding unit 152 .

日志保持部152包括概要日志记录区域152A和全文日志记录区域152B,保持概要日志和全文日志二种日志。概要日志包括访问的开始、结束时刻、使用终端、访问目的地服务器的IP地址和主机名、用户ID、连接时间等。全文日志包括实际执行、操作命令等的内容。The log holding unit 152 includes a summary log recording area 152A and a full-text log recording area 152B, and holds two types of logs, a summary log and a full-text log. The summary log includes the start and end time of the access, the terminal used, the IP address and host name of the access destination server, the user ID, the connection time, and the like. The full-text log includes the content of actual executions, operational commands, and so on.

在图4的例子的情况下,在概要日志记录区域152A和全文日志记录区域152B分别按照各协议保持主要记录内容。例如,“TELNET”协议的情况下,在概要日志记录区域152A记录访问开始的日期和时间、端口(port)、连接源IP地址、用户ID、连接目的地IP地址、连接时间,在全文日志记录区域152B记录接收数据。In the case of the example of FIG. 4 , the main recording contents are held in the summary log recording area 152A and the full-text log recording area 152B according to the respective protocols. For example, in the case of the "TELNET" protocol, the date and time of access start, port, connection source IP address, user ID, connection destination IP address, and connection time are recorded in the summary log recording area 152A, and recorded in the full text log. The area 152B records received data.

以上所示的访问日志的记录内容与申请号绑定,保持在日志保持部152。另外,通过WindowsRDP获取的访问日志以动画形式被记录。The record content of the access log shown above is tied to the application number, and is held in the log holding unit 152 . In addition, access logs obtained through Windows RDP are recorded in animation.

图5是表示登录画面的显示例的图。FIG. 5 is a diagram showing a display example of a login screen.

当请求从作业终端20远程登录到中继装置11时,图5所示的登录画面50被显示在作业终端20。当中继装置11接收到远程登录请求时,在作业终端20的登录画面50内显示登录窗口51。即,中继装置11的登录接口处理部111提供作业终端20的用户接口画面。作业终端20的用户在显示在登录画面50内的登录窗口51上输入用户ID和密码。从用户侧看,用户接口与以往终端服务器提供的接口相同,但输入的用户识别信息通过用户认证装置12、申请管理装置13及访问权管理装置14被分别供应并用于用户认证、申请判定、访问权认证。When a remote login from the work terminal 20 to the relay device 11 is requested, the log-in screen 50 shown in FIG. 5 is displayed on the work terminal 20 . When the relay device 11 receives the remote login request, a login window 51 is displayed in the login screen 50 of the work terminal 20 . That is, the login interface processing unit 111 of the relay device 11 provides the user interface screen of the work terminal 20 . The user of the work terminal 20 inputs a user ID and a password on the login window 51 displayed in the login screen 50 . From the user side, the user interface is the same as the interface provided by the previous terminal server, but the input user identification information is supplied by the user authentication device 12, the application management device 13 and the access right management device 14 respectively and used for user authentication, application determination, and access. Right certification.

图6是表示访问申请画面的显示例的图。FIG. 6 is a diagram showing a display example of an access application screen.

当作业者为了作业申请而从作业终端20访问申请管理装置13时,在作业终端20显示图6所示的访问申请画面60。即,在从作业终端20进行访问时,申请状态管理部131的作业申请部131A使访问申请画面60在作业终端20显示为Web页面。When an operator accesses the application management device 13 from the work terminal 20 for a work application, the access application screen 60 shown in FIG. 6 is displayed on the work terminal 20 . That is, when accessing from the work terminal 20 , the work application unit 131A of the application state management unit 131 displays the access application screen 60 as a Web page on the work terminal 20 .

在申请者名区域61输入申请作业的用户名。当由自己以外的人进行作业时,申请者输入实际执行作业的预定的用户名。在项目名区域62输入申请的作业的项目名。从系统分类区域63选择成为对象的业务信息系统的类型。此处选择财务信息系统64。访问接口处理部133可以进行控制,从而禁止该用户在申请日期和时间对所选择的业务信息系统以外的系统进行访问。In the applicant name field 61, input the user name of the job application. When the job is performed by a person other than himself, the applicant inputs a predetermined user name who actually executes the job. In the project name field 62, the project name of the job to be applied for is input. The type of the target business information system is selected from the system classification area 63 . The financial information system 64 is selected here. The access interface processing unit 133 may control so as to prohibit the user from accessing systems other than the selected business information system on the application date and time.

系统名区域64表示业务信息系统的名称,作业种类区域65表示作业种类。内容输入区域66是用于自由描述作业内容等的区域。附件区域67是用于附加利用的协议书等电子文件的区域。访问预定日期和时间区域68表示作业预定日期和时间。作业者在申请画面60所示的各项目中输入数据后,点击申请按钮(button)69。这样,作业终端20将输入的数据作为作业申请信息发送给申请管理装置13。The system name area 64 indicates the name of the business information system, and the job type area 65 indicates the job type. The content input area 66 is an area for freely describing the content of work and the like. The attachment area 67 is an area for attaching electronic documents such as agreements for use. The access scheduled date and time field 68 indicates the job scheduled date and time. The operator clicks an application button 69 after inputting data in each item shown on the application screen 60 . In this way, the work terminal 20 transmits the input data to the application management device 13 as work application information.

在进行访问申请时,除了申请者名、项目名、系统分类、系统名、作业种类、内容及访问预定日期和时间以外,还附加记载有实际利用的协议书等的电子文件,由此能够将作业申请信息和附带的电子文件一起统一进行管理。When making a visit application, in addition to the applicant name, project name, system classification, system name, type of work, content, and planned visit date and time, an electronic file describing the actual use agreement, etc., is attached. Job application information is managed together with the attached electronic file.

图7是表示访问授权画面的显示例的图。FIG. 7 is a diagram showing a display example of an access authorization screen.

在进行需要授权的作业申请时,在授权终端44显示图7所示的访问授权画面70。即,在进行需要授权的作业申请时,申请状态管理部131的登记判定部131B将申请号通知给授权终端44。如果授权者指定申请号后访问申请管理装置13,则作业授权部131D使访问授权画面70在授权终端44显示为Web页面。When applying for a job requiring authorization, an access authorization screen 70 shown in FIG. 7 is displayed on the authorization terminal 44 . That is, when a job application requiring authorization is made, the registration determination unit 131B of the application state management unit 131 notifies the authorization terminal 44 of the application number. When the authorizer accesses the application management device 13 after specifying the application number, the work authorization unit 131D displays the access authorization screen 70 on the authorization terminal 44 as a Web page.

申请信息区域71表示访问申请画面60中所输入的申请内容。授权者名区域72是用于输入授权者名的区域。授权委托者名区域73是用于输入委托授权的用户名的区域。例如,具有授权权限的用户B将授权委托给用户C时,用户C代理用户B进行授权判断。这是用于应对用户B在休假中等特殊情况的措施。The application information area 71 shows the application content input on the access application screen 60 . The authorizer name area 72 is an area for inputting the authorizer name. The authorization delegator name area 73 is an area for inputting a user name for delegating authorization. For example, when user B with authorization authority delegates authorization to user C, user C performs authorization judgment on behalf of user B. This is a measure for special situations such as user B's vacation.

通信栏74是记载针对作业申请者的信息的栏,可以记载拒绝申请的理由,或者在授权申请时记载对作业内容的附加条件或注释。授权按钮75是授权时使用的按钮,拒绝按钮76是拒绝时使用的按钮。当点击授权按钮75和拒绝按钮76中任一个按钮时,输入内容和表示是否授权的数据被发送给申请管理装置13。作业授权部131D例如通过电子邮件将该数据发送给作业终端20。The communication column 74 is a column in which information for the job applicant is described, and the reason for rejecting the application can be described, or additional conditions or comments to the content of the job can be described when the application is authorized. The authorization button 75 is used for authorization, and the reject button 76 is used for rejection. When any one of the authorization button 75 and the reject button 76 is clicked, the input content and data indicating whether or not to authorize are sent to the application management device 13 . The work authorization unit 131D transmits the data to the work terminal 20 by e-mail, for example.

在申请例如“断开作业”那样的需要特别权限的维修作业时,基于是否授权和执行条件信息对升级用户信息进行更新。例如,假设以营业日的“6:00~16:00”中的时间段作为作业预定时间申请断开作业。如果被授权,则限于被申请的日期和时间,申请者升级。例如,假设以营业日“2006年9月28日”的“10:00~11:00”作为作业预定日期和时间,用户A申请了断开作业。如果授权该作业,则仅在以作业预定日期和时间所示的期间用户A成为可升级用户。即,当到达2006年9月28日10:00时,升级处理部138使用户A升级,并在合法用户信息保持部122的升级用户信息中进行登记。另外,当到达9月28日的11:00或者断开作业结束时,使用户A降级,并从升级用户信息中删除用户A。由此,在本实施方式中,特别权限是具有时间限制的权限。When applying for maintenance work that requires special authority, such as "disconnect work", the update user information is updated based on the authorization or execution condition information. For example, it is assumed that the disconnection job is applied for with the time period from "6:00 to 16:00" on a business day as the job scheduled time. If authorized, limited to the date and time being applied for, the applicant upgrades. For example, it is assumed that the user A applies for a disconnection job with "10:00 to 11:00" of the business day "September 28, 2006" as the scheduled job date and time. If the job is authorized, User A becomes an upgradeable user only during the period indicated by the job's scheduled date and time. That is, when reaching 10:00 on September 28, 2006, the upgrade processing unit 138 upgrades the user A and registers it in the upgraded user information of the legitimate user information holding unit 122 . In addition, when reaching 11:00 on September 28 or when the disconnection job ends, demote user A and delete user A from the upgraded user information. Therefore, in the present embodiment, the special authority is an authority with a time limit.

此处所说的特别权限也可以是所谓的超级(root)权限或管理员(administrator)权限。即,所谓可升级用户,可以是用自己的用户ID登录后,能够通过例如UNIX(注册商标)的所谓“su命令”等获取超级管理员权限的用户。The special authority mentioned here can also be the so-called super (root) authority or administrator (administrator) authority. That is, the so-called upgradeable user may be a user who can acquire super administrator authority through, for example, the so-called "su command" of UNIX (registered trademark) after logging in with his own user ID.

另外,可以利用与申请、授权过程不同的其他访问策略管理是否赋予特别权限。例如,可以以下述条件允许作业者B的作业:断开作业被作业者B申请,被授权者C授权作业,并且,另外的授权者D允许对作业者B赋予特别权限。像这样将“特别权限”这一重要权限的管理者与作业授权者分开,由此能够进一步增强业务信息防护装置10的信息安全性。In addition, whether to grant special rights can be managed by using other access policies different from the application and authorization process. For example, the work of the operator B may be permitted on the condition that the disconnection work is requested by the operator B, the authorizer C authorizes the work, and another authorizer D allows special authority to be given to the operator B. The information security of the business information protection device 10 can be further enhanced by separating the administrator of the important authority "special authority" from the work authorizer in this way.

升级处理部138可以在规定条件成立时使规定用户升级,而与作业申请无关。例如,当用户B是应对灾害的专家时,升级处理部138如果检测出地震的发生,则可以以规定时间为限使用户B升级。另外,在这样的紧急情况下,可以是省略作业申请手续的访问规则。即,可以以业务信息防护装置10具有的震度计测定到规定值以上的震动作为用户D的升级条件。The upgrade processing unit 138 can upgrade a predetermined user regardless of the job application when the predetermined condition is satisfied. For example, when the user B is an expert in dealing with disasters, the upgrade processing unit 138 may upgrade the user B within a predetermined period of time if the occurrence of an earthquake is detected. In addition, in such an emergency, an access rule that omits the job application procedure may be used. That is, it is possible to set the user D's upgrade condition as the vibration that the vibrometer included in the business information protection device 10 measures a predetermined value or more.

作为其他例子,可以以在业务信息系统检测到计算机病毒作为规定用户的升级条件。或者,在具有特别权限的用户C进行了超出作业申请范围的访问时,可以使用户C降级。即,可以以在业务信息防护装置10或客户环境40发生了规定事项作为升级、降级条件,执行升级或降级处理。管理负责人也可以从外部对升级处理部138设定升级、降级条件。因此,即使在上述紧急情况下,也能够使适当的用户在具有时间限制的条件下快速地升级。As another example, the detection of a computer virus in the business information system may be used as an upgrade condition for the prescribed user. Alternatively, when user C with special authority accesses beyond the scope of the job application, user C can be downgraded. That is, the upgrade or downgrade process may be executed under the condition that a predetermined event occurs in the business information protection device 10 or the client environment 40 as upgrade or downgrade conditions. The person in charge of management may set promotion and demotion conditions for the promotion processing unit 138 from the outside. Therefore, even in the above-mentioned emergency situation, it is possible to quickly escalate an appropriate user under a time-limited condition.

图8是表示访问申请、授权级别设定画面的显示例的图。FIG. 8 is a diagram showing a display example of an access request and authorization level setting screen.

在管理者预设作业申请信息的访问授权级别时,在授权终端44显示图8所示的访问申请、授权级别设定画面80。管理者可以在访问申请、授权级别设定画面80上,通过服务器设定,按每一个端口设定是否需要事先申请或授权。When the administrator presets the access authorization level of the job application information, the access application and authorization level setting screen 80 shown in FIG. 8 is displayed on the authorization terminal 44 . On the access application and authorization level setting screen 80 , the administrator can set whether or not prior application or authorization is required for each port through server settings.

协议、端口号区域81示出各协议的端口号。服务启动区域82是用于设定是否在被访问时自动启动用户接口等提供服务的区域。全文日志获取区域83是用于设定是否获取作业内容的全文日志的区域。访问授权级别区域84是设定是否需要事先申请或授权的授权级别的区域。The protocol and port number field 81 shows the port number of each protocol. The service activation area 82 is an area for setting whether to automatically activate a user interface or the like to provide services when accessed. The full-text log acquisition area 83 is an area for setting whether to acquire the full-text log of the job content. The access authorization level area 84 is an area for setting an authorization level that requires prior application or authorization.

在访问申请、授权级别设定画面80不只能够按照每一个协议、端口号设定授权级别,还能够设定概要日志的保存期间、全文日志的保存期间、访问申请、画面操作日志保存期间及服务器状态。由此能够从日志保持部152所保持的大量访问日志中勤恳地删除不需要的访问日志。In the access request and authorization level setting screen 80, not only the authorization level can be set for each protocol and port number, but also the storage period of the summary log, the storage period of the full text log, the storage period of the access request, the screen operation log, and the server can be set. state. As a result, unnecessary access logs can be diligently deleted from the large number of access logs held by the log holding unit 152 .

在图8的例子的情况下,TELNET通信协议的23号端口被设定为需要事先申请和授权。另一方面,TELNET通信协议的223号端口被设定为访问时不需要申请和授权的状态。这样也可以在通常利用的端口设定“事先申请和授权”,或者假设在紧急情况下授权者不在的情形,而设定仅“事先申请”。In the case of the example of FIG. 8 , the port No. 23 of the TELNET communication protocol is set to require prior application and authorization. On the other hand, port 223 of the TELNET communication protocol is set in a state where application and authorization are not required for access. In this way, it is also possible to set "pre-application and authorization" on a port that is normally used, or to set only "pre-application" if the authorizer is absent in an emergency.

图9是表示访问日志检索画面的显示例的图。FIG. 9 is a diagram showing a display example of an access log search screen.

图9所示的访问日志检索画面90在授权者进行访问检查(日志检查)时被显示于授权终端44。授权者为了确认许可的访问内容是否如同事先被申请的作业内容那样进行,而在访问日志检索画面90上设定希望检索的访问日志的检索条件。检索按钮91是用于以被设定的检索条件执行访问日志的检索的按钮。点击检索按钮91时,表示检索条件的数据被发送给日志管理装置15。日志管理装置15的日志管理部151(的作业验证部151B)基于表示检索条件的数据,抽取日志保持部152所登记的访问日志,同时抽取申请管理装置13的作业预定保持部136所登记的作业预定信息。The access log search screen 90 shown in FIG. 9 is displayed on the authorization terminal 44 when the authorizer performs an access check (log check). The authorizer sets the retrieval condition of the access log desired to be retrieved on the access log retrieval screen 90 in order to confirm whether the permissioned access content is performed as the job content requested in advance. The search button 91 is a button for executing a search of the access log under the set search condition. When the search button 91 is clicked, data indicating search conditions is sent to the log management device 15 . The log management unit 151 (the job verification unit 151B of the log management device 15 ) extracts the access log registered in the log holding unit 152 based on the data indicating the retrieval conditions, and simultaneously extracts the job registered in the job reservation holding unit 136 of the application management device 13 booking information.

图10是表示检索结果画面的显示例的图。FIG. 10 is a diagram showing a display example of a search result screen.

当点击访问日志检索画面90的检索按钮91时,在授权终端44显示图10所示的检索结果画面100。即,利用申请管理装置13和日志管理装置15检索满足授权者在访问日志检索画面90设定的检索条件的访问日志,该检索结果(访问日志和作业预定信息)被发送给授权终端44,并作为概要被一览显示在检索结果画面100上。When the search button 91 of the access log search screen 90 is clicked, the authorization terminal 44 displays the search result screen 100 shown in FIG. 10 . That is, the access log satisfying the search conditions set by the authorizer on the access log search screen 90 is searched by the application management device 13 and the log management device 15, the search result (access log and job reservation information) is sent to the authorization terminal 44, and It is displayed as a list on the search result screen 100 as a summary.

文件图标101是用于下载具体的作业内容的按钮。点击文件图标101时,执行命令的具体内容作为文本文件被获取并被显示。另外,文件命令102是用于下载申请内容的按钮。点击文件图标102时,具体的申请内容被获取并被显示。即,授权者能够容易地比较访问日志和申请内容,所以能够高效地进行日志检查。The file icon 101 is a button for downloading specific job content. When the file icon 101 is clicked, the specific content of the execution command is acquired and displayed as a text file. In addition, the file command 102 is a button for downloading the application content. When the file icon 102 is clicked, the specific application content is acquired and displayed. That is, since the authorizer can easily compare the access log and the application content, the log check can be performed efficiently.

另外,如果预先将根据申请内容被认为不需要的禁止命令等作为关键字(keyword)进行登记,则能够抽取含有该关键字记录行数和记录。例如,已知在访问申请时,在向访问分类申请“一般ID作业”的情况下,如果是一般ID的访问,则不仅不需要如获取特权ID之类的命令,当然也不发出增加用户的命令。所以,针对“一般ID作业”,预先以被禁止或不需要的“SU-”(用于获取特权ID的命令)及“useradd”(增加用户的命令)为关键字进行登记。由此,能够抽取含有根据申请内容被认为不需要的禁止命令等的访问日志,提供给授权者,所以能够高效地发现非法使用。In addition, if a prohibition command or the like, which is deemed unnecessary according to the content of the application, is registered as a keyword in advance, the number of records and records containing the keyword can be extracted. For example, it is known that when applying for a "general ID job" to the access classification at the time of access application, if the access is a general ID, it is known that not only commands such as acquiring a privileged ID are not required, but of course, no command to increase the user is issued. Order. Therefore, for the "general ID job", prohibited or unnecessary "SU-" (command for acquiring privilege ID) and "useradd" (command for adding user), which are prohibited or unnecessary, are registered in advance as keywords. As a result, it is possible to extract an access log including a prohibition command or the like that is deemed unnecessary based on the application content, and provide it to the authorizer, so that illegal use can be detected efficiently.

另外,如果利用邮件通知的功能,则在进行了符合关键字的操作时,能够向管理者发送电子邮件。这样能够仅通过进行访问检查就能够高效地进行日志检查。In addition, by using the function of email notification, when an operation matching the keyword is performed, an email can be sent to the administrator. This makes it possible to perform log checking efficiently only by performing an access check.

另外,此处,以能够比较访问日志和申请内容的方式,显示了检索结果,但日志管理部151的作业验证部151B也能够基于表示检索条件的数据,将申请管理装置13的作业预定保持部136所登记的作业预定信息和日志保持部152所登记的访问日志进行对比,并检测出上述日志信息中所示的访问中作为非法访问的不符合在上述作业预定信息中被申请的维修作业用访问的访问。Here, the retrieval result is displayed so that the access log and the application content can be compared, but the job verification unit 151B of the log management unit 151 can also store the job schedule holding unit of the application management device 13 based on the data indicating the retrieval condition. The work schedule information registered in 136 is compared with the access log registered in the log holding unit 152, and it is detected that among the accesses indicated in the log information, as unauthorized accesses, it does not correspond to the maintenance work requested in the above-mentioned job schedule information. access to access.

[关于作业申请处理][About job application processing]

此处,对作业终端20的作业者进行的作业申请处理进行说明。作业者首先在显示于作业终端20的图5所示的登录画面50上输入用户ID和密码。作业终端20随着所输入的用户识别信息直接访问申请管理装置13,而不经由中继装置11。申请管理装置13将用户识别信息传送给用户认证装置12。用户认证装置12的用户认证部121参照合法用户信息保持部122的合法用户信息进行用户认证,在认证失败的情况下,不执行后面的处理。Here, the work request processing performed by the operator of the work terminal 20 will be described. The operator first inputs a user ID and a password on the login screen 50 shown in FIG. 5 displayed on the work terminal 20 . The work terminal 20 directly accesses the application management device 13 according to the input user identification information, without going through the relay device 11 . The application management device 13 transmits the user identification information to the user authentication device 12 . The user authentication unit 121 of the user authentication device 12 performs user authentication with reference to the authorized user information in the authorized user information storage unit 122, and when the authentication fails, the subsequent processing is not performed.

在认证成功的情况下,用户认证装置12将认证成功的结果通知申请管理装置13。申请管理装置13的作业申请部131A将申请画面用数据发送给作业终端20。作业终端20显示图6所示的访问申请画面60。用户在访问申请画面60输入数据,所输入的数据作为作业申请信息被发送给申请管理装置13。When the authentication is successful, the user authentication device 12 notifies the application management device 13 of the successful authentication result. The work application unit 131A of the application management device 13 transmits the data for the application screen to the work terminal 20 . The work terminal 20 displays the access application screen 60 shown in FIG. 6 . The user inputs data on the access application screen 60, and the input data is transmitted to the application management device 13 as job application information.

申请管理装置13的登记判定部131B比较被申请的作业内容和执行条件保持部135的执行条件信息,判定是否可登记。如果不是有效的作业申请,则登记判定部131B拒绝申请,并将拒绝结果通知作业终端20,进而不执行后面的处理。另一方面,判定为是有效的作业申请的情况下,登记判定部131B在作业预定保持部136的作业预定信息中登记被申请的维修作业。如果是需要授权的作业,则申请通知部131C将请求授权的电子邮件发送给授权终端44。The registration determination unit 131B of the application management device 13 compares the job content to be applied for with the execution condition information of the execution condition holding unit 135, and determines whether or not registration is possible. If it is not a valid job application, the registration determination unit 131B rejects the application, notifies the job terminal 20 of the rejection result, and does not execute subsequent processing. On the other hand, when it is determined that the work application is valid, the registration determination unit 131B registers the requested maintenance work in the work schedule information of the work schedule holding unit 136 . If it is a job requiring authorization, the application notification unit 131C transmits an e-mail requesting authorization to the authorization terminal 44 .

通过以上处理,作业申请信息中仅有满足作为有效的作业申请的要件的作业申请信息作为“作业预定信息”被正式登记在作业预定保持部136。As a result of the above processing, only the job application information satisfying the requirements as a valid job application among the job application information is officially registered in the job schedule holding unit 136 as “job schedule information”.

[关于作业授权处理][About job authorization processing]

接下来,对通过作业申请处理申请的作业内容的授权处理进行说明。授权终端44在接收到申请已被提出的电子邮件后,访问申请管理装置13。授权者利用任意时间在图5所示的登录画面50上输入用户ID和密码。另外,授权者在输入用户ID和密码时,还指定申请号。授权终端44将被输入的授权者的用户ID和密码发送给用户认证装置12。用户认证装置12的用户认证部121从授权终端44获取用户ID和密码,参照合法用户信息保持部122所登记的合法用户信息,进行授权者的用户认证。用户认证失败的情况下,不执行后面的处理。Next, the authorization processing of the job content applied for by the job application processing will be described. The authorization terminal 44 accesses the application management device 13 after receiving the e-mail that the application has been made. The authorizer inputs the user ID and password on the login screen 50 shown in FIG. 5 at any time. In addition, the authorizer designates an application number when inputting the user ID and password. The authorization terminal 44 transmits the input user ID and password of the authorizer to the user authentication device 12 . The user authentication unit 121 of the user authentication device 12 acquires the user ID and password from the authorization terminal 44 , and performs user authentication of the authorizer with reference to the authorized user information registered in the authorized user information holding unit 122 . When user authentication fails, the subsequent processing is not performed.

认证成功的情况下,申请管理装置13的作业授权部131D基于从授权终端44获取的申请号,检索作业预定保持部136所登记的作业申请信息。申请管理装置13的作业授权部131D基于检索到的作业申请信息,将用于访问授权画面70的HTML(HyperText MarkupLanguage,超文本标记语言)数据发送给授权终端44。授权终端44显示与申请号所指定的作业相关的访问授权画面70(图7)。授权者确认访问授权画面70,并点击授权按钮75或拒绝按钮76时,被输入的数据被发送至申请管理装置13。申请管理装置13的作业授权部131D根据是否可授权来更新作业预定保持部136的作业预定信息。作业授权部131D通知作业终端20是否可授权。When the authentication is successful, the job authorization unit 131D of the application management device 13 searches for the job application information registered in the job schedule holding unit 136 based on the application number acquired from the authorization terminal 44 . The job authorization unit 131D of the application management device 13 transmits HTML (HyperText Markup Language) data for accessing the authorization screen 70 to the authorization terminal 44 based on the retrieved job application information. The authorization terminal 44 displays an access authorization screen 70 (FIG. 7) related to the job designated by the application number. When the authorizer confirms the access authorization screen 70 and clicks the authorization button 75 or the reject button 76 , the inputted data is sent to the application management device 13 . The job authorization unit 131D of the application management device 13 updates the job schedule information of the job schedule holding unit 136 according to whether or not authorization is possible. The work authorization unit 131D notifies the work terminal 20 whether or not authorization is possible.

通过以上处理对有效申请的作业进行授权。另外,当授权者访问申请管理装置13时,申请管理装置13一览显示待授权的作业申请,并且授权者可以是从其中选择成为授权对象的作业申请之类的用户接口。另外,也可以总括地授权或拒绝多个作业申请。Through the above process, the work of the valid application is authorized. In addition, when the authorizer accesses the application management device 13, the application management device 13 displays a list of job applications to be authorized, and the authorizer may be a user interface such as a job application to be authorized from there. In addition, it is also possible to collectively authorize or reject a plurality of job applications.

[关于远程登录处理][About remote login processing]

接下来说明对业务信息系统的远程登录处理。作业者从作业终端20首先访问中继装置11。中继装置11确认进行访问的作业终端20的IP地址,判断是否允许连接,并在判断为不允许的情况下切断连接。另一方面,允许作业终端20连接的情况下,中继装置11以适合于协议的形式向作业终端20请求用户识别信息(用户ID及密码)。作业终端20显示登录画面50(图5),并接受作业者输入的用户ID和密码。作业终端20将被输入的用户ID和密码发送给中继装置11。Next, remote login processing to the business information system will be described. The operator first accesses the relay device 11 from the work terminal 20 . The relay device 11 confirms the IP address of the access terminal 20, determines whether or not the connection is permitted, and disconnects the connection when it is determined that the connection is not permitted. On the other hand, when the connection of the work terminal 20 is permitted, the relay device 11 requests the work terminal 20 for user identification information (user ID and password) in a format suitable for the protocol. The work terminal 20 displays the login screen 50 ( FIG. 5 ), and accepts the user ID and password input by the operator. The work terminal 20 transmits the input user ID and password to the relay device 11 .

中继装置11将从作业终端20接收到的用户ID和密码供给用户认证装置12、申请管理装置13及访问权管理装置14。用户认证装置12的用户认证部121从中继装置11获取用户ID和密码,并参照合法用户信息保持部12所登记的合法用户信息,进行作业者的用户认证。在用户认证失败的情况下不执行后面的处理。The relay device 11 supplies the user ID and password received from the work terminal 20 to the user authentication device 12 , the application management device 13 , and the access right management device 14 . The user authentication unit 121 of the user authentication device 12 acquires the user ID and password from the relay device 11 , and performs user authentication of the operator with reference to the authorized user information registered in the authorized user information holding unit 12 . The subsequent processing is not performed in the case of user authentication failure.

在认证成功的情况下,中继装置11向作业终端20请求输入访问目的地。作业终端20接受作业者输入的访问目的地,并将表示访问目的地的信息(IP地址和主机名等)发送给中继装置11。中继装置11将从作业终端20接收到的表示访问目的地的信息发送给访问权管理装置14。访问权管理装置14的访问权认证部141基于表示访问目的地的信息,参照访问权信息保持部142所登记的访问申请状况,确认该用户对访问目的地的访问权。访问权认证部141判断为不适合的访问时,拒绝该用户对访问目的地的访问。另一方面,判断为适合访问时,允许该用户对访问目的地的访问。并且,所有的判断都为肯定时,作业者能够访问成为维修作业的对象的业务信息系统。When the authentication succeeds, the relay device 11 requests the work terminal 20 to input an access destination. The work terminal 20 receives the access destination input by the operator, and transmits information (IP address, host name, etc.) indicating the access destination to the relay device 11 . The relay device 11 transmits the information indicating the access destination received from the work terminal 20 to the access right management device 14 . The access right authentication unit 141 of the access right management device 14 refers to the access application status registered in the access right information holding unit 142 based on the information indicating the access destination, and confirms the access right of the user to the access destination. When the access right authentication unit 141 determines that the access is inappropriate, the user is denied access to the access destination. On the other hand, when it is determined that the access is suitable, the user is permitted to access the access destination. Then, when all the judgments are affirmative, the operator can access the business information system that is the target of the maintenance work.

通过以上处理,对业务信息系统进行远程登录时,如果被判断为非法访问,则登录失败,从而能够禁止访问。Through the above process, when it is determined that the access is illegally performed when the business information system is remotely logged in, the login fails, and the access can be prohibited.

[关于升级、降级判定处理][About upgrade and downgrade judgment processing]

接下来,对升级处理部138执行的用户的升级、降级处理进行说明。申请管理装置13的升级处理部138从作业预定保持部136读取作业预定信息,判定是否存在应当升级的用户。例如,用户A以营业日“2006年9月28日”的“10:00~11:00”作为作业预定日期和时间申请断开作业,并被授权。此时,如果到达2006年9月28日的10:00,则升级处理部138升级用户A。升级处理部138将可升级用户的用户识别信息发送给用户认证装置12,并在合法用户信息保持部122的升级用户信息中登记用户A。Next, user upgrade and downgrade processing performed by the upgrade processing unit 138 will be described. The upgrade processing unit 138 of the application management device 13 reads the job schedule information from the job schedule holding unit 136, and determines whether or not there is a user who should be upgraded. For example, the user A applies for the disconnection job using "10:00-11:00" of the business day "September 28, 2006" as the scheduled job date and time, and is authorized. At this time, when it reaches 10:00 on September 28, 2006, the upgrade processing unit 138 upgrades the user A. The upgrade processing unit 138 transmits the user identification information of the upgradeable user to the user authentication device 12 , and registers the user A in the upgrade user information of the legitimate user information holding unit 122 .

另外,升级处理部138判定作业预定信息中是否存在应当降级的用户。在上述例子的情况下,如果到达2006年9月28日的11:00,则降级用户A。升级处理部138将应当降级的用户的用户识别信息发送给用户认证装置12,并从合法用户信息保持部122的升级用户信息中删除用户A。Further, the upgrade processing unit 138 determines whether or not there is a user who should be downgraded in the job schedule information. In the case of the above example, if it reaches 11:00 on September 28, 2006, user A is downgraded. The upgrade processing unit 138 transmits the user identification information of the user to be downgraded to the user authentication device 12 , and deletes the user A from the upgraded user information in the legitimate user information holding unit 122 .

申请管理装置13按每一规定时间(例如按每1分钟)反复执行上述处理,由此能够定期更新升级用户信息。The application management device 13 can periodically update the upgrade user information by repeatedly executing the above-described processing every predetermined time (for example, every one minute).

如以上处理那样,利用带有时间限制的特别权限,能够进一步提高业务信息系统的信息安全性。用户可以在进行了远程登录后自己明示请求特别权限,但是,以何种条件允许升级,可以由升级处理部138基于规定的升级条件对此进行判定。As in the above processing, the information security of the business information system can be further improved by using the special authority with a time limit. The user may explicitly request the special authority after logging in remotely, but the upgrade processing unit 138 can determine the conditions under which the upgrade is permitted based on predetermined upgrade conditions.

另外,对于上述作业申请处理、作业授权处理、对业务信息系统的登录处理、升级、降级判定处理的详细说明,如同特开2008-117361号公报等中所记载的,是公知的技术。In addition, the detailed description of the above-mentioned job application processing, job authorization processing, registration processing to the business information system, upgrade, and downgrade determination processing is as described in Japanese Patent Laid-Open No. 2008-117361 and the like, and is a well-known technique.

[关于访问检查处理][About access check processing]

接下来,参照图11的流程图对访问检查处理进行说明。授权者为了确认允许访问的内容是否是按照事先被申请的作业内容进行,而使用授权终端44的输入部(未图示)指示执行访问检查(日志检查)。Next, the access check processing will be described with reference to the flowchart of FIG. 11 . The authorizer instructs the execution of an access check (log check) using an input unit (not shown) of the authorizing terminal 44 in order to confirm whether the content of the access permission is performed according to the work content requested in advance.

在步骤S1中,授权终端44基于来自授权者的指示,显示图9所示的访问日志检索画面90。授权者在访问日志检索画面90上设定希望检索的访问日志的检索条件。在步骤S2中,授权终端44受理由授权者所设定的访问日志的检索条件的输入。并且,当点击检索按钮91时,在步骤S3中,授权终端44将受理了输入的访问日志的检索条件数据发送给日志管理装置15。In step S1, the authorization terminal 44 displays the access log search screen 90 shown in FIG. 9 based on the instruction from the authorizer. On the access log search screen 90, the authorizer sets search conditions of the access log to be searched. In step S2, the authorization terminal 44 receives the input of the retrieval condition of the access log set by the authorizer. Then, when the search button 91 is clicked, in step S3 , the authorization terminal 44 transmits the search condition data of the access log that has received the input to the log management device 15 .

在步骤S4中,日志管理装置15的作业验证部151B从授权终端44接收到检索条件数据时,从申请管理装置13的作业预定保持部136读取与检索条件数据中所含的申请号对应的作业预定信息,并从日志保持部152读取与申请号绑定的访问日志,对二者进行核对,检查是否是非法访问。例如,如上所述,在进行了以“运转监控”为目的的作业申请时,当进行文件的重写处理时,成为非法访问。在步骤S5中,作业验证部151B从日志保持部152读取符合检索条件的访问日志,并将其作为访问检查结果通知给授权终端44。In step S4 , when the job verification unit 151B of the log management device 15 receives the retrieval condition data from the authorization terminal 44 , the job order holding unit 136 of the application management device 13 reads out the application number corresponding to the application number included in the retrieval condition data. The job reservation information is read, and the access log bound to the application number is read from the log holding unit 152, and the two are checked to check whether the access is illegal. For example, as described above, when a job application for the purpose of "operation monitoring" is performed, when a file rewriting process is performed, unauthorized access occurs. In step S5, the job verification unit 151B reads the access log that meets the retrieval condition from the log holding unit 152, and notifies the authorization terminal 44 of the access log as an access check result.

在步骤S6中,授权终端44基于从日志管理装置15接收到的访问检查结果,显示图10所示的检索结果画面100。另外,在以根据申请内容被认为不需要的禁止命令为关键字进行预先登记,并且检索到符合关键字的访问日志的情况下,能够利用邮件通知管理者检索到的符合关键字的记录行数和记录。In step S6 , the authorization terminal 44 displays the retrieval result screen 100 shown in FIG. 10 based on the access check result received from the log management device 15 . In addition, when an access log corresponding to the keyword is pre-registered with a prohibition command deemed unnecessary according to the content of the application as a keyword, and an access log corresponding to the keyword is retrieved, the administrator can be notified by mail of the number of rows of records corresponding to the keyword retrieved. and records.

[发明的实施方式的效果][Effect of Embodiment of Invention]

如上所述,本实施方式中除了用户认证,还进行申请判定,所以其构成容易防止非法访问。仅进行用户认证的情况下,用户识别信息的泄露容易直接关系到自业务信息系统的信息泄露。但是,由于业务信息防护装置10还要求作业申请手续,所以,用户识别信息的泄露不易直接关系到非法访问。原因在于,即使非法用户暂时非法取得了用户识别信息,也容易对要进行虚假作业申请程度的业务信息系统访问施加心理抑制。As described above, in this embodiment, application determination is performed in addition to user authentication, so the configuration is easy to prevent unauthorized access. When only user authentication is performed, the leakage of user identification information is likely to be directly related to information leakage from the business information system. However, since the work information protection device 10 also requires a job application procedure, the leakage of the user identification information is not likely to be directly related to unauthorized access. The reason is that even if the illegal user temporarily illegally obtains the user identification information, it is easy to psychologically inhibit the access to the business information system at the level of making a false job application.

另外,即使对于合法的管理公司的SE而言,也实现了一种限制对客户环境40的访问的架构。如上所述,由于作业的申请或授权作为日志被记录下来,所以容易进行事后的访问检查。因此,对于客户企业也具有容易证明自身系统与规格符合(compliance)的优点。利用这样的特征,业务信息防护装置10能够有助于SOX法案要求的“内部统一管理的增强”。In addition, a framework is implemented that restricts access to the customer environment 40 even for SEs of legitimate management companies. As described above, since the application or authorization of the job is recorded as a log, it is easy to perform an access check afterwards. Therefore, there is also an advantage in that it is easy for the client company to prove the compliance of its own system with the specification. With such a feature, the business information protection device 10 can contribute to the "enhancement of internal unified management" required by the SOX Act.

申请的作业内容不适合执行条件信息时,登记判定部131B将所进行的申请被质疑的意思通知给授权终端44,或者也可以暂时无效化该用户识别信息。通过使登记判定部131B进行这样的作业申请检查,能够自动拒绝非法的作业申请。并且,由于还能够定义不仅需要申请还需要授权的维修作业,所以能够进一步提高信息安全性。When the job content applied for is not suitable for the execution condition information, the registration determination unit 131B notifies the authorization terminal 44 that the applied application is challenged, or may temporarily invalidate the user identification information. By causing the registration determination unit 131B to perform such a job application check, it is possible to automatically reject an illegal job application. In addition, since it is possible to define maintenance work that requires not only an application but also an authorization, it is possible to further improve information security.

在执行需要特别权限的维修作业时,也可以通过对特别权限设置时间限制,使得业务信息防护装置10能够统一管理在何时对于何种用户授予特别权限。When performing maintenance operations that require special authority, a time limit can also be set for the special authority, so that the business information protection device 10 can uniformly manage when and what kind of user the special authority is granted.

通常,对于维修作业,预先确定执行时刻表。本实施方式中,通过进行事先的作业申请和在任意时间的授权,能够在不对作业者及授权者施加过度的心理负担的状态下实现业务信息系统的安全性管理。Generally, for maintenance work, an execution schedule is predetermined. In the present embodiment, security management of the business information system can be realized without imposing an excessive psychological burden on the operator and the authorizer by performing a prior work application and authorizing at an arbitrary time.

业务信息防护装置10还能够记录访问日志。另外,日志管理部151能够检查作业申请的内容和实际的作业内容是否出现不一致。因此,在访问被允许之后,也能够容易地检查事后是否发生非法访问。The business information protection device 10 can also record access logs. In addition, the log management unit 151 can check whether or not there is a mismatch between the content of the job application and the actual job content. Therefore, even after the access is permitted, it is possible to easily check whether or not illegal access has occurred afterwards.

这样,业务信息防护装置10从以下多个方面对业务信息系统进行防护。In this way, the business information protection device 10 protects the business information system from the following aspects.

1.用户认证1. User Authentication

2.执行条件和被申请的作业内容的适应性的判定2. Judgment of the suitability of execution conditions and the content of the work being applied for

3.远程登录请求时的申请判定3. Application Judgment at Remote Login Request

4.远程登录请求日期和时间和被申请的作业预定日期和时间的比较4. Comparison between the date and time of the remote login request and the scheduled date and time of the job being applied for

5.与特别权限相关的判定5. Judgments related to special authority

6.基于访问日志的非法访问检测6. Illegal access detection based on access logs

另外,业务信息防护装置10能够统一管理对多个业务信息系统的访问。因此容易针对多个业务信息系统适用统一的访问策略。并且,还具有对于已经被运行的业务信息系统,仅通过增加业务信息防护装置10就能实现的优点。In addition, the business information protection device 10 can centrally manage access to a plurality of business information systems. Therefore, it is easy to apply a unified access policy to multiple business information systems. In addition, there is also an advantage that can be achieved only by adding the business information protection device 10 to an already operating business information system.

以上以“维修作业”为例进行了说明,但本发明并不限于此,例如,在职员从外出地点进行访问的情况下也能够适用。In the above, "maintenance work" has been described as an example, but the present invention is not limited to this, and can be applied to, for example, a staff member visiting from an out-of-home location.

上述一系列处理可以通过硬件执行,也可以通过软件执行。在利用软件执行一系列处理时,可以从程序记录介质将构成该软件的程序安装到被组合进专用硬件中的计算机或通过安装各种程序来能够执行各种功能的例如通用的个人计算机等中。The above-described series of processing can be executed by hardware or by software. When executing a series of processing with software, the program constituting the software can be installed from a program recording medium into a computer incorporated into dedicated hardware or into a general-purpose personal computer or the like capable of executing various functions by installing various programs .

本发明并不限定于上述实施方式所描述的那样,可以在实施阶段在不脱离其要旨的范围内通过变型技术特征并使其具体化,或者适当组合实施实施方式中公开的多个技术特征,从而形成各种发明。例如,可以从实施方式中所示的所有构成要素中删除几个构成要素。并且,可以适当组合不同的实施方式中的构成要素。The present invention is not limited to what is described in the above-mentioned embodiments, and the technical features can be modified and embodied in the implementation stage within the scope of not departing from the gist thereof, or a plurality of technical features disclosed in the embodiments can be appropriately combined. Thus forming various inventions. For example, some constituent elements may be deleted from all the constituent elements shown in the embodiments. In addition, components in different embodiments may be appropriately combined.

Claims (5)

1.一种业务信息防护装置,其特征在于,具有1. A service information protection device, characterized in that it has 合法用户信息保持装置,其保持登记有可执行系统规定处理的合法用户的合法用户信息;A legal user information holding device, which holds legal user information registered with a legal user who can perform processing prescribed by the system; 申请接收装置,其接收用于申请指定访问预定者和执行所述规定处理的申请信息;an application receiving device that receives application information for applying for specifying a visit reservation person and executing the prescribed process; 预定保持装置,其保持使所申请的所述规定处理和所述访问预定者对应的预定信息;reservation holding means for holding reservation information corresponding to the prescribed process applied for and the visit reservation person; 执行请求接收装置,其在执行所述规定处理时,从终端接收确定访问者的用户识别信息;an execution request receiving device that, when executing the predetermined process, receives user identification information identifying a visitor from a terminal; 用户认证装置,其参照所述合法用户信息,判定所述访问者是否被登记为合法用户;a user authentication device, which refers to the legal user information and determines whether the visitor is registered as a legal user; 申请状态判定装置,其参照所述预定信息,判定将所述访问者设为访问预定者的规定处理是否进行过申请;和application state determination means for determining whether or not an application has been made in a predetermined process for setting the visitor as a visitor reservation person with reference to the reservation information; and 访问控制装置,以所述用户认证装置的判定和所述申请状态判定装置的判定都为肯定判定作为条件,允许从所述终端至所述系统的访问以进行规定处理,access control means for allowing access from the terminal to the system to perform predetermined processing on condition that both the determination by the user authentication means and the determination by the application status determination means are positive determinations, 所述合法用户信息保持装置还保持表示可获得与通常的用户权限不同的特别权限的用户的升级用户信息,The legitimate user information holding means also holds upgraded user information indicating a user who can obtain a special authority different from the normal user authority, 所述申请状态判定装置在指定特别权限作为对于被申请的规定处理的执行条件时,还对访问者是否是可获得特别权限的用户进行判定。The application state determination means further determines whether or not the visitor is a user who can obtain the special authorization when the special authorization is designated as the execution condition of the prescribed process to be applied for. 2.根据权利要求1所述的业务信息防护装置,其特征在于,还具有:2. The service information protection device according to claim 1, further comprising: 申请通知装置,向规定处理申请的授权者通知被申请的处理内容;和an application notification device that notifies the authorized person who prescribes the processing of the application of the processing content of the application; and 授权获得装置,其受理来自所述授权者的授权输入,authorization obtaining means, which accepts authorization input from said authorizer, 所述预定保持装置还使被申请的规定处理和其授权状态相对应地保持为所述预定信息,The predetermined holding means also holds the predetermined processing to be applied for and the authorization status thereof as the predetermined information, 所述申请状态判定装置还判定被申请的规定处理是否经过授权。The application state determining means also determines whether the prescribed processing being applied for is authorized. 3.根据权利要求1或2所述的业务信息防护装置,其特征在于,3. The business information protection device according to claim 1 or 2, characterized in that, 所述申请状态判定装置还判定规定处理的执行日期和时间是否在被申请的期间内。The application status determination means also determines whether or not the execution date and time of the prescribed process is within the period to be applied for. 4.根据权利要求1或2所述的业务信息防护装置,其特征在于,还具有:4. The business information protection device according to claim 1 or 2, characterized in that, further comprising: 执行条件保持装置,其保持定义规定处理的执行条件的执行条件信息;和an execution condition holding means that holds execution condition information that defines an execution condition of a prescribed process; and 申请登记判定装置,以被申请的处理内容与所述执行条件信息相符为条件,将被申请的规定处理登记在所述预定信息中。The application registration determination means registers the requested predetermined process in the predetermined information on condition that the content of the requested process matches the execution condition information. 5.根据权利要求1所述的业务信息防护装置,其特征在于,还具有:5. The service information protection device according to claim 1, further comprising: 升级条件设定装置,受理表示可获得特别权限的条件的升级条件的设定输入;和upgrade condition setting means for accepting input for setting upgrade conditions indicating conditions for obtaining special privileges; and 升级登记装置,当所述升级条件成立时,将成为升级条件对象的用户登记在所述升级用户信息中。The upgrade registration means, when the upgrade condition is satisfied, registers the user who becomes the target of the upgrade condition in the upgrade user information.
CN201610822526.7A 2011-03-25 2011-03-25 Service information protection device Active CN107103216B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610822526.7A CN107103216B (en) 2011-03-25 2011-03-25 Service information protection device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610822526.7A CN107103216B (en) 2011-03-25 2011-03-25 Service information protection device
CN201110081078.7A CN102693373B (en) 2011-03-25 2011-03-25 Business information protection device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201110081078.7A Division CN102693373B (en) 2011-03-25 2011-03-25 Business information protection device

Publications (2)

Publication Number Publication Date
CN107103216A CN107103216A (en) 2017-08-29
CN107103216B true CN107103216B (en) 2020-08-25

Family

ID=46858801

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201110081078.7A Active CN102693373B (en) 2011-03-25 2011-03-25 Business information protection device
CN201610822526.7A Active CN107103216B (en) 2011-03-25 2011-03-25 Service information protection device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201110081078.7A Active CN102693373B (en) 2011-03-25 2011-03-25 Business information protection device

Country Status (1)

Country Link
CN (2) CN102693373B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693373B (en) * 2011-03-25 2016-11-16 株式会社野村综合研究所 Business information protection device
CN105592027B (en) * 2014-11-18 2019-10-22 慧盾信息安全科技(苏州)股份有限公司 A security protection system and method for DNS anti-dragging library
CN106778345B (en) * 2016-12-19 2019-10-15 网易(杭州)网络有限公司 The treating method and apparatus of data based on operating right
JP6691085B2 (en) * 2017-09-20 2020-04-28 ファナック株式会社 Application security management system and edge server
JP7114719B2 (en) * 2018-09-03 2022-08-08 株式会社日立ハイテク Display device, information terminal, program and recording medium for recording it
CN110503334A (en) * 2019-08-23 2019-11-26 行吟信息科技(上海)有限公司 A kind of state machine control method and system
JP7362372B2 (en) * 2019-09-05 2023-10-17 日立チャネルソリューションズ株式会社 Remote maintenance system and remote maintenance method for banknote processing system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1630252A (en) * 2003-12-16 2005-06-22 华为技术有限公司 Broadband IP access device and method for realizing user log in the device
CN1959695A (en) * 2005-11-04 2007-05-09 佳能株式会社 Printing management system and printing management method
CN101170409A (en) * 2006-10-24 2008-04-30 华为技术有限公司 Method, system, service device and authentication server for realizing device access control
US7568107B1 (en) * 2003-08-20 2009-07-28 Extreme Networks, Inc. Method and system for auto discovery of authenticator for network login
CN101599977A (en) * 2009-07-17 2009-12-09 杭州华三通信技术有限公司 The management method of Network and system
US7987357B2 (en) * 2007-11-28 2011-07-26 Red Hat, Inc. Disabling remote logins without passwords
CN102693373B (en) * 2011-03-25 2016-11-16 株式会社野村综合研究所 Business information protection device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6151664A (en) * 1999-06-09 2000-11-21 International Business Machines Corporation Programmable SRAM and DRAM cache interface with preset access priorities
JP4434551B2 (en) * 2001-09-27 2010-03-17 株式会社東芝 Server computer protection device, server computer protection method, server computer protection program, and server computer
JP4007873B2 (en) * 2002-07-09 2007-11-14 富士通株式会社 Data protection program and data protection method
JP2005189969A (en) * 2003-12-24 2005-07-14 Kureo:Kk Data backup program, data backup method, portable terminal and data backup device
CN1564255A (en) * 2004-03-24 2005-01-12 华中科技大学 Digital memory media protecting method based on online controlled access tech, and its system
WO2007091492A1 (en) * 2006-02-06 2007-08-16 Matsushita Electric Industrial Co., Ltd. Secure processing device, method and program

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7568107B1 (en) * 2003-08-20 2009-07-28 Extreme Networks, Inc. Method and system for auto discovery of authenticator for network login
CN1630252A (en) * 2003-12-16 2005-06-22 华为技术有限公司 Broadband IP access device and method for realizing user log in the device
CN1959695A (en) * 2005-11-04 2007-05-09 佳能株式会社 Printing management system and printing management method
CN101170409A (en) * 2006-10-24 2008-04-30 华为技术有限公司 Method, system, service device and authentication server for realizing device access control
US7987357B2 (en) * 2007-11-28 2011-07-26 Red Hat, Inc. Disabling remote logins without passwords
CN101599977A (en) * 2009-07-17 2009-12-09 杭州华三通信技术有限公司 The management method of Network and system
CN102693373B (en) * 2011-03-25 2016-11-16 株式会社野村综合研究所 Business information protection device

Also Published As

Publication number Publication date
CN107103216A (en) 2017-08-29
CN102693373A (en) 2012-09-26
CN102693373B (en) 2016-11-16

Similar Documents

Publication Publication Date Title
JP5789390B2 (en) Business information protection device, business information protection method, and program
JP6140735B2 (en) Access control device, access control method, and program
US8904549B2 (en) Server system, control method, and storage medium for securely executing access to data of a tenant
CN107103216B (en) Service information protection device
US10325095B2 (en) Correlating a task with a command to perform a change ticket in an it system
US10027679B2 (en) Secondary asynchronous background authorization (SABA)
JP2008117316A (en) Business information protection device
WO2014184671A2 (en) Systems and methods for efficient network security adjustment
JP2005234729A (en) Unauthorized access prevention system and method
JP5952466B2 (en) Business information protection device, business information protection method, and program
JP2008117317A (en) Business information protection device
US7072969B2 (en) Information processing system
US7841005B2 (en) Method and apparatus for providing security to web services
JP2016173851A (en) Business information protection device, business information protection method, and program
JP5039402B2 (en) Business information protection device
JP2018152091A (en) Business information protection device, business information protection method, and program
US20220255970A1 (en) Deploying And Maintaining A Trust Store To Dynamically Manage Web Browser Extensions On End User Computing Devices
JP2020095750A (en) Business information protection device, business information protection method, and program
JP4814130B2 (en) Business information protection device
US11983289B2 (en) Method and system for managing login information during a debugging process
Rajba et al. Identity and Access Management Architecture in the SILVANUS Project
Cook et al. Security Guide for IBM i V6. 1
CN117714204A (en) Domain environment protection method, device, equipment and storage medium
TR2023008411A2 (en) A METHOD ON USER ACCOUNT MANAGEMENT WITH A RULE-BASED APPROACH
Shimoe et al. Security Solutions Provided by Fujitsu’s Middleware Products

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant