CONFIDENTIAL INFORMATION LEAKAGE PREVENTION SYSTEM, CONFIDENTIAL INFORMATION LEAKAGE PREVENTION METHOD, AND CONFIDENTIAL INFORMATION LEAKAGE PREVENTION PROGRAM
First Claim
1. A confidential information leakage prevention system in which a client and a server are configured to be capable of communicating with each other via a network,wherein the client includes:
- a network access control unit for controlling a network access request sent from an application program to the server, based on a security level assigned to the application program; and
a first authentication unit for executing authentication processing of authenticating, with the server, that the network access control unit is installed, andwherein the server includes;
a second authentication unit for executing the authentication processing with the client, and permitting the network access request sent from the client when the authentication processing is successful.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is a confidential information leakage prevention system in which a client 100 and a server 200 are configured to be capable of communicating with each other via a network, wherein the client 100 includes network access control unit 106 for controlling a network access request sent from an application program to the server 200, based on a security level assigned to this application program, and first authentication unit 107 for executing authentication processing of authenticating, with the server 200, that the network access control unit 106 is installed, and wherein the server 200 includes second authentication unit 202 for executing the authentication processing with the client 100, and permitting the network access request sent from the client when the authentication processing is successful.
55 Citations
7 Claims
-
1. A confidential information leakage prevention system in which a client and a server are configured to be capable of communicating with each other via a network,
wherein the client includes: -
a network access control unit for controlling a network access request sent from an application program to the server, based on a security level assigned to the application program; and a first authentication unit for executing authentication processing of authenticating, with the server, that the network access control unit is installed, and wherein the server includes; a second authentication unit for executing the authentication processing with the client, and permitting the network access request sent from the client when the authentication processing is successful. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A confidential information leakage prevention method in a confidential information leakage prevention system in which a client and a server are configured to be capable of communicating with each other via a network,
wherein the client executes: -
a control step of controlling a network access request sent from an application program to the server, based on a security level assigned to the application program; and a first authentication step of executing authentication processing of authenticating, with the server, that a network access control program for executing the control step is installed, and wherein the server executes; a second authentication step of executing the authentication processing with the client; and a step of permitting the network access request sent from the client when the authentication processing is successful.
-
-
7. A program for causing a client, which is configured to be capable of communicating with a server via a network, to execute:
-
a control step of controlling a network access request sent from an application program to the server, based on a security level assigned to the application program; and a first authentication step of executing authentication processing of authenticating, with the server, that a network access control program for executing the control step is installed, and causing the server to execute; a second authentication step of executing the authentication processing with the client; and a step of permitting the network access request sent from the client when the authentication processing is successful.
-
Specification