×

Security system design supporting method

  • US 7,089,581 B1
  • Filed: 08/17/2000
  • Issued: 08/08/2006
  • Est. Priority Date: 11/30/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A security system design supporting method, implemented in a security system design supporting tool including a processor which conducts processings on data stored in memory, for supporting designing of security requirements or security specifications based on an international security evaluation criteria during planning/designing of an information-related product or an information system, said method comprising the steps of:

  • providing, in the memory, a template case database for storing protection profiles (PPs) that have been internationally registered or PPs or STs (security targets) that have been generated, and that have not been internationally registered, in a class-tree structure based on an inheritance relation between types of products or systems as a target of evaluation (TOE) of said PPs or STs;

    specifying, to the processor, the PPs or STs related to the TOE by designating elements included in the products or systems, type and evaluation assurance level of the TOE, and retrieving a relevant class-tree structure from said database;

    generating, by the processor, a PP or ST draft of the TOE by integrally editing contents of a definition of the specified PPs or STs,wherein as to the generated PP/ST draft of the TOE, if the registered PPs or STs or local PP matches PPs or STs retrieved from the database, the retrieved PPs or STs are used, and if there are no matches, high-order PPs or STs among the generated PPs or STs are retrieved based on an inheritance relation to thereby partially add and correct the PPs or STs;

    generating a rationale matrix indicating a matrix table each correspondence between security environments, security objectives, security requirements and summary specification as a part of the contents of a PP or ST definition from the security environment, the security objectives, the security requirements and the summary specification or the correspondence between them; and

    verifying the presence or absence of the definition information lacking the correspondence using said rationale matrix generated.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×