×

Security verification method and device

  • US 7,176,791 B2
  • Filed: 12/10/2004
  • Issued: 02/13/2007
  • Est. Priority Date: 12/11/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A security verification method for verifying whether improper settings that indicate composite errors of security settings exist in an object system, said method comprising the steps of:

  • reading data transfer paths that represent data movement in said object system and that have been generated based on program operation information that describes operations of a program that is used in said object system;

    integrating access rights of data transfer paths that have been read; and

    based on security verification policies in which improper paths, which are paths of data movement that are improper from a standpoint of security, have been set in advance, searching for improper paths among data transfer paths for which access rights have been integrated.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×