Sign In to Follow Application
View All Documents & Correspondence

Security Management Device Central Security Management Device Security Management Method And Security Management Program

Abstract: A second communication unit ( 411) of a security management apparatus (201) exterally receives dependency infrmation (412) indicating a dependence relation between infrmation assets individually held by a frst system and a second system. Then, a selection unit (415) of the security management apparatus (201) selects a security measure to be implemented, fom among candidates fr a security measure against a threat to an infrmation asset held by the fst system, in accordance with a dependence relation indicated by the dependency infrmation (412) received by the second comunication unit ( 411 ).

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
12 November 2018
Publication Number
46/2018
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
patent@depenning.com
Parent Application

Applicants

MITSUBISHI ELECTRIC CORPORATION
7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310

Inventors

1. NEGI, Tomonori
c/o Mitsubishi Electric Corporation, 7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310
2. KAWAUCHI, Kiyoto
c/o Mitsubishi Electric Corporation, 7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310
3. NAKAJIMA, Junko
c/o Mitsubishi Electric Corporation, 7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310
4. IZUMI, Yukio
c/o Mitsubishi Electric Corporation, 7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310
5. SAKAKIBARA, Hiroyuki
c/o Mitsubishi Electric Corporation, 7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310
6. KITAZAWA, Shigeki
c/o Mitsubishi Electric Corporation, 7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310
7. ONO, Kazuhiro
c/o Mitsubishi Electric Corporation, 7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310
8. ASAI, Takeshi
c/o Mitsubishi Electric Corporation, 7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310
9. IJIRO, Hideaki
c/o Mitsubishi Electric Corporation, 7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310
10. NISHIKAWA, Hiroki
c/o Mitsubishi Electric Corporation, 7-3, Marunouchi 2-chome, Chiyoda-ku, Tokyo 1008310

Specification

We Claim:
[Claim I]
A security management apparatus comprising:
a communication unit to exterally receive dependency infrmation indicating a dependence relation among infrmation assets idividually held by a fst system and one or more second systems diferent fom the fst system; and
a selection unit to select a security measure to be implemented fom candidates fr a security measure against a threat to an infrmation asset held by the frst system, in accordance with a dependence relation indicated by the dependency infrmation received by the comunication unit.
[Claim 2]
The security management apparatus according to claim l, wherein the selection unit selects, as a security measure to be implemented, a security measure that is to limit an access source to a frst infrmation asset that is an infrmation asset held by the frst system, to a second system holding a second infrmation asset that is an infrmation asset dependent on the frst infrmation asset.
[Claim 3]
The security management apparatus according to claim 1 or 2, frher compnsmg:
a generation unit to generate a relation tree that is data to defne the dependence relation in a tree strcture, fom the dependency infrmation, wherein
the selection unit refrs to a relation tree generated by the generation unit to specify the dependence relation.

[Claim 4]
The security management apparatus according to any one of claims 1 to 3, wherein
the dependency information includes information indicating an importance of an information asset held by the first system with respect to an information asset of a dependent source,
the security management apparatus further comprises a calculation unit to calculate an evaluation value of the candidates from an importance indicated with the dependency information, and
the selection unit selects a security measure to be implemented in accordance with not only the dependence relation, but also an evaluation value calculated by the calculation unit.
[Claim 5]
The security management apparatus according to any one of claims 1 to 4, further comprising an extraction unit to extract, for each security measure, an index value of each of the candidates from a database storing an index values for selecting a security measure, wherein
the selection unit selects, as a security measure to be implemented, a security measure whose index value extracted by the extraction unit satisfies a condition.
[Claim 6]
The security management apparatus according to claim 5, wherein the communication unit externally receives information indicating the

condition.
[Claim 7]
The security management apparatus according to any one of claims 1 to 6, further comprising a detection unit to detect a change in a configuration of the first system, wherein
the selection unit selects a security measure to be implemented in accordance with not only the dependence relation, but also a change detected by the detection unit.
[Claim 8]
The security management apparatus according to any one of claims 1 to 7, wherein
the security management apparatus is included in the first system, and shares the dependency information with other security management apparatus included in the one or more second systems.
[Claim 9]
A central security management apparatus for aggregating the dependency information from the security management apparatus according to any one of claims 1 to 7 included in the first system, and from other security management apparatus included in the one or more second systems.
[Claim 10]
A security management method comprising:
externally receiving, by a communication unit, dependency information

indicating a dependence relation among information assets individually held by a first system and one or more second systems different from the first system; and
selecting, by a selection unit, a security measure to be implemented from candidates for a security measure against a threat to an information asset held by the first system, in accordance with a dependence relation indicated by the dependency information received by the communication unit.
[Claim 11]
A security management program for causing
a computer to execute:
processing for externally receiving dependency information indicating a dependence relation among information assets individually held by a first system and one or more second systems different from the first system; and
processing for selecting a security measure to be implemented from candidates for a security measure against a threat to an information asset held by the first system, in accordance with a dependence relation indicated by the dependency information.

Documents

Application Documents

# Name Date
1 201847042378-FER.pdf 2021-10-17
1 201847042378-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [12-11-2018(online)].pdf 2018-11-12
2 201847042378-FORM 3 [12-04-2019(online)].pdf 2019-04-12
2 201847042378-STATEMENT OF UNDERTAKING (FORM 3) [12-11-2018(online)].pdf 2018-11-12
3 201847042378-REQUEST FOR EXAMINATION (FORM-18) [12-11-2018(online)].pdf 2018-11-12
3 201847042378-AMMENDED DOCUMENTS [19-11-2018(online)].pdf 2018-11-19
4 201847042378-PROOF OF RIGHT [12-11-2018(online)].pdf 2018-11-12
4 201847042378-FORM 13 [19-11-2018(online)].pdf 2018-11-19
5 201847042378-POWER OF AUTHORITY [12-11-2018(online)].pdf 2018-11-12
5 201847042378-MARKED COPIES OF AMENDEMENTS [19-11-2018(online)].pdf 2018-11-19
6 201847042378-RELEVANT DOCUMENTS [19-11-2018(online)].pdf 2018-11-19
6 201847042378-FORM 18 [12-11-2018(online)].pdf 2018-11-12
7 Correspondence by Agent_Form1_15-11-2018.pdf 2018-11-15
7 201847042378-FORM 1 [12-11-2018(online)].pdf 2018-11-12
8 201847042378.pdf 2018-11-13
8 201847042378-DRAWINGS [12-11-2018(online)].pdf 2018-11-12
9 201847042378-CLAIMS UNDER RULE 1 (PROVISIO) OF RULE 20 [12-11-2018(online)].pdf 2018-11-12
9 201847042378-DECLARATION OF INVENTORSHIP (FORM 5) [12-11-2018(online)].pdf 2018-11-12
10 201847042378-COMPLETE SPECIFICATION [12-11-2018(online)].pdf 2018-11-12
11 201847042378-CLAIMS UNDER RULE 1 (PROVISIO) OF RULE 20 [12-11-2018(online)].pdf 2018-11-12
11 201847042378-DECLARATION OF INVENTORSHIP (FORM 5) [12-11-2018(online)].pdf 2018-11-12
12 201847042378-DRAWINGS [12-11-2018(online)].pdf 2018-11-12
12 201847042378.pdf 2018-11-13
13 201847042378-FORM 1 [12-11-2018(online)].pdf 2018-11-12
13 Correspondence by Agent_Form1_15-11-2018.pdf 2018-11-15
14 201847042378-FORM 18 [12-11-2018(online)].pdf 2018-11-12
14 201847042378-RELEVANT DOCUMENTS [19-11-2018(online)].pdf 2018-11-19
15 201847042378-MARKED COPIES OF AMENDEMENTS [19-11-2018(online)].pdf 2018-11-19
15 201847042378-POWER OF AUTHORITY [12-11-2018(online)].pdf 2018-11-12
16 201847042378-FORM 13 [19-11-2018(online)].pdf 2018-11-19
16 201847042378-PROOF OF RIGHT [12-11-2018(online)].pdf 2018-11-12
17 201847042378-AMMENDED DOCUMENTS [19-11-2018(online)].pdf 2018-11-19
17 201847042378-REQUEST FOR EXAMINATION (FORM-18) [12-11-2018(online)].pdf 2018-11-12
18 201847042378-FORM 3 [12-04-2019(online)].pdf 2019-04-12
19 201847042378-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [12-11-2018(online)].pdf 2018-11-12
19 201847042378-FER.pdf 2021-10-17

Search Strategy

1 2021-01-2113-09-19E_21-01-2021.pdf