WO2001095202A1 - Apparatus and method for protecting resource of intellectual property and information system using active resource protection agent - Google Patents

Apparatus and method for protecting resource of intellectual property and information system using active resource protection agent Download PDF

Info

Publication number
WO2001095202A1
WO2001095202A1 PCT/KR2001/000951 KR0100951W WO0195202A1 WO 2001095202 A1 WO2001095202 A1 WO 2001095202A1 KR 0100951 W KR0100951 W KR 0100951W WO 0195202 A1 WO0195202 A1 WO 0195202A1
Authority
WO
WIPO (PCT)
Prior art keywords
resources
protecting
monitoring
protection
resource
Prior art date
Application number
PCT/KR2001/000951
Other languages
French (fr)
Inventor
Dae-Joon Hwang
Su-Hwan Dong
Original Assignee
Arpa Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Arpa Co., Ltd. filed Critical Arpa Co., Ltd.
Priority to AU2001262781A priority Critical patent/AU2001262781A1/en
Publication of WO2001095202A1 publication Critical patent/WO2001095202A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Definitions

  • the present invention relates to a method and apparatus for protecting an intellectual property and a resource of information system and a computer-readable recording medium storing instructions for embodying the method; and, more particularly, to the method and apparatus for protecting digital contents of a intellectual property and information system in electric commerce on computer information network, by using an active resource protection agent.
  • the encryption technology encrypts original data to scrambled data with encryption key base on cryptography and the digital watermarking technology detects unauthorized duplication by adding a watermark in original data.
  • an object of the present invention to provide a method and apparatus for preventing fundamentally from infringing on an intellectual property by using an active resource protection agent as detecting an infringement of the intellectual property and maintaining necessary record data of an unauthorized access to digital contents of a computer system and resources of an information system including active and passive resources for proving the infringement of intellectual property when a system is on-line or off-line.
  • An apparatus for protecting passive resources including a file, a directory, a memory and a port and active resources including a process and a thread in an system comprises; a provision unit for providing a class of resources as an object of protecting and protection conditions of the resource; a selection unit for, in response to a user's request, selecting resources to be protected and protection conditions for the selected resources; a combination unit for combining the selected resources and the selected protection conditions received from said selection unit; a first monitoring unit for monitoring dynamically the resources by receiving the selected resource and the protection condition from said combination unit through the Network, determining a protection operation base on said selected resource and said protection condition, and selecting necessary components for said protection operation; and a first analysis unit for analyzing a result of monitoring and protecting resources inputted from said monitoring unit through the Network.
  • the method comprises steps of; selecting and providing objects of protecting resources and protection conditions to an active resource protection agent; monitoring and protecting resources dynamically by active resource protection agent's operation, herein said operation is determining an operation for protecting selected resources base on said objects of protecting resources and protection conditions, and selecting necessary components for said operation ? and managing record data of infringement of an intellectual property (unauthorized duplication) or unauthorized access to resources of the information system when a system is online or off-line by generating, renewing and managing a statistics information of protecting an intellectual property and the resource automatically base on results of said monitoring and protecting step.
  • the present invention provides a computer-readable recording medium storing instructions for embodying functions for; selecting and providing objects of protecting resources and protection conditions to an active resource protection agent; monitoring and protecting resources dynamically by active resource protection agent's operation, herein said operation is determining an operation for protecting selected resources base on said objects of protecting resources and protection conditions, and selecting necessary components for said operation; and managing record data of infringement of an intellectual property (unauthorized duplication) or unauthorized access to resources of the information system when a system is on- line or off-line by generating, renewing and managing a statistics information of protecting an intellectual property and the resource automatically base on results of said monitoring and protecting step.
  • Fig. 1 is a diagram of the apparatus for protecting an intellectual property and resource of an information system, in accordance with an embodiment of the present invention
  • Fig. 2 illustrates objects of protecting resources in the Adaptive Mission Control Agent 11 in accordance with an embodiment of the present invention
  • Fig. 3 is a detailed diagram for embodiment of an Active Resource Protection Agent, in accordance with preferred embodiment of the present invention.
  • Fig. 4 illustrates correlation between a Mission controller 34 and a System 40 in accordance with preferred embodiment of the present invention
  • Fig. 5 is a detailed diagram for a Components Unit in accordance of preferred embodiment of the present invention
  • Fig. 6 is a flowchart of a method for protecting resources of an intellectual property and an information system in accordance of preferred embodiment of the present invention.
  • the present invention relates to an Active Resource Protection Agent, which is a program or a software code, embodying dynamic protecting techniques for protecting active resources including a file, a directory, a port, and a memory and passive resources including a process and a thread of a computer system and information system.
  • the Active Resource Protection Agent is a software code including an adaptive agent technique and an active agent mission control technique for protecting fundamentally digital contents, active resources and passive resources of a computer system and information system operating for distributing digital contents from unauthorized access including hacking and virus of contents, when the system is on-line or off-line on the Network.
  • information resources such as multimedia digital contents of intellectual property and resources including a computer, a communication port, a process, and a thread, it is also applicable to extirpate hacking and computer virus.
  • the present invention applies digital contents including variety multimedia data, active resources including a file, a directory, a port and a memory, and passive resource including a process and a thread on connected computer systems and information system with the Network as an object of protecting resource by embodying techniques for modifying dynamically protection condition of a resource, Mission Control technique and Adaptive Agent technique, as a software code.
  • the present invention can select objects of protecting resources and protection conditions actively and monitor selected resources by dispatching the agent to on-lined or off-lined system. Also, agent can be assigned another operation dynamically after reporting a result of monitoring resources.
  • the present invention is a protection technique for protecting resources of an intellectual property and information system base on the active agent. And, the present invention not only maintains and manages an elementary record such as number of times infringement, criterion of infringement, scope of infringement, location of infringement, time of infringement, and contents of infringement but also providing a technique for making detecting infringement and maintaining the record of infringement possible when a system is on-line or off-line.
  • the present invention is applicable to business of protecting digital contents and distributing digital contents. And it is also applicable to construct information protecting system for an organization and institution. Also, it could be used as protection technique for preventing infringement of intellectual property fundamentally by adding the technique as basic function to a word editor or multimedia authoring tool. Since the present invention is applicable to not only digital contents but also resources of an information system, it also could be used for detecting a hacker and a virus.
  • Fig. 1 is a diagram of the apparatus for protecting resources of an intellectual property and information system, in accordance with an embodiment of the present invention.
  • reference numerals 10, 11, 12 13, 14, 15 and 20 denote an Active Resource Protection Agent (ARPA) Center, an adaptive mission control agent, a mission selector, a mission mixer, a result analyzer, a network transceiver and a Network, respectively.
  • ARPA Active Resource Protection Agent
  • reference numerals 30-1 to 30-N denote Active Resource Protection Agents.
  • an apparatus for protecting resources of an intellectual property and information system in accordance with an embodiment of the present invention is including; the Adaptive Mission Control Agent 11 for providing objects of protecting resources and protection conditions; The Mission Selector 12 for selecting , upon user's resource protecting request, a corresponding resource and protection condition among provided resources at the Mission Control Agent 11 from user; the Mission Combiner 11 for combining selected corresponding resources and protection conditions from the Mission Selector 12; the Active Resource Protection Agent 30-1 ...
  • 30-N for receiving combined corresponding resources and protection conditions from the Mission Combiner 13 through the Network 20, determining protection operation base on corresponding resources and protection conditions, selecting necessary components, and protecting and monitoring dynamically corresponding resources through selected components; the Result Analyzer 14 for managing record data of infringement of intellectual property(unauthorized duplication) and unauthorized access when a system is on-line or off-line as analyzing received monitoring result of the Active Resource Protection Agent 30-1 ... 30-N through the Network 20.
  • the Active Resources Protection Agent Center 10 is consisted with the Adaptive Mission Control 11, the Mission Selector 12, the Mission Combiner 13, the Result Analyzer 14, and the Network Transceiver 15.
  • the Active Resources Protection Agent Center 10 assigns a mission to the Active Resources Protection Agent 30-1 ... 30-N located on each system through the Network 20 and reassigns a new mission again after analyzing result of assigned mission.
  • the resource monitoring steps of said Active Resource Protection Agent 30-1 ... 30-N will be described later on Fig.
  • the Adaptive Mission Control Agent 11 provides objects of protecting resources and protection conditions.
  • the Mission Selector 12 selects individually object of protecting resources and protection conditions provided from the Adaptive Mission Control Agent 11.
  • the mission Combiner 13 individually combines missions selected from the Mission Selector 12.
  • the Result Analyzer 13 analyzes a result of protecting resources reported from the Active Resource Protection Agent 30-1 ... 30-N.
  • the Mission Selector 12 selects resource and protection condition in the Adaptive Mission Control Agent
  • Mission Combiner 13 combines selected conditions and resources. At this point, combined mission passes to the Active Resource Protection Agents 30-1 ... 30-N through the Network Transceiver 10 with on-line.
  • Fig. 2 shows selectable objects of protecting resources and protection condition by the Mission Selector
  • Mission Control Agent 11 is a Name of Resource 111.
  • Name of Resources 111 comprises passive resources including a file, a directory, a port and a memory and active resources including a process and a thread in detail.
  • an Identification 112 is a list of protection condition of resources and it includes a user ID, an IP address, a Range of Address and a host ID.
  • a Number of counts 113 is one of the list of protection condition of resources and it includes a read count, write count, and install count.
  • a Hierarchy 14 is a list for setting up roll and responsibility.
  • Fig. 3 is a detailed diagram for embodiment of the Active Resource Protection Agent, in the apparatus for protecting intellectual property and information system, in accordance with preferred embodiment of the present invention.
  • reference numerals 31, 32, 34, 35 and 40 denote a Network transceiver, a Result Analyzer, a Mission controller, a Components Unit and a System (also referred as a hard ware (HW) platform), respectively.
  • HW hard ware
  • the Active Resource Protection Agent 30-1 ... 30-N comprises; The Network Transceiver 31 for receiving combined corresponding resources and protection condition from the Mission Mixer 13 in the Active Resource Protection Agent Center 10 through the Network 20: The Mission Analyzer 33 for analyzing corresponding resource and protection condition: the Mission controller 34 for determining a operation for protecting corresponding resource base on analyzed result of the Mission Analyzer 33: the Components Unit 35 for protecting and monitoring dynamically corresponding resources through selected components by selecting necessary components for operation determined at the mission controller 34: and the result analyzer 32 for analyzing result of monitoring corresponding resource at the Component Unit 35.
  • the Active Resource Protection Agent 30-1 ... 30-N secures and monitors resources when a system is on-line or off-line.
  • the Active Resource Protection Agent 30-1 ... 30-N is operated base on information of protecting resources and missions received from the Active Resource Protection Agent Center 10.
  • the Mission Analyzer 33 analyzes the received information and necessary operations for missions determined in the Mission controller 34 based on an analysis of the Mission Analyzer 33. At this point, determined necessary operations are transmitted to the Components Unit 35 and necessary components or modules are selected for performing the necessary operation. After that, resources of the System 40 are being monitored and protected and a result of monitoring and protecting is saved on the system.
  • Fig. 4 illustrates correlation between a Mission controller 34 and a System 40 in accordance with preferred embodiment of the present invention and it shows operations for protecting resources between the Mission 34 and the system 40.
  • the Mission controller 34 comprises a Black List Reporter 341, a Violation Record Writer 342, a Caution/Warning 343, a Recovery 344, a Tracking/Monitoring 345, and a Registration/Calculation 346.
  • a System 40 is consisted with a System Resource 41, a Black list 42, an Access history 43, and a Resource Registry 44.
  • the Mission controller 34 determines necessary operations base on information and protection condition analyzed by the Mission Analyzer 33.
  • the Blacklist Reporter 341 is an operation for managing information of frequently accessed resources on the system 40 of the dispatched Active Resource Protection Agent and information of the System 40 separately.
  • the Violation Record Writer 342 is an operation for all activities of violation of protection conditions.
  • the Caution/Warning 343 is a message for warning a user before taking out user's right of usage when a protection condition of corresponding resource exceeds to a certain limit.
  • the Recovery 344 is an operation for recovering automatically when finding an unexpected fault from forced closed resources.
  • the Tracking/Monitoring 345 is the most important and fundamental operation of the Active Resource Protection
  • Agent 30 It secures resources base on protection conditions and monitors usage of resources for violation of protection condition.
  • the Registration/Calculation 346 is an operation for registering new added operation and calculating user's violation of protection condition.
  • the System Resource 41 of the System 40 is a resource, which is object to be protected by the Active Resource
  • the Blacklist 42 is a same operation as the operation of said Blacklist Reporter 341.
  • the Access history 43 is a file for said Violation
  • Fig. 5 is a detailed diagram for the Components Unit in accordance of preferred embodiment of the present invention.
  • reference numerals 351, 352, 353, 354 and 355 denote a Request Operation Analyzer, a File System
  • the Components Unit 35 determines and composes a necessary component or module for the operation.
  • the Components Unit 35 comprises the
  • Module 352 the Memory Monitoring Module 353, the Process Controlling Module 354, and the Module Unit 355.
  • the Request Operation Analyzer 351 determines necessary modules for received operations.
  • the File System Hooking Module 352 is a necessary component for performing operation of protecting resource of file system such as a file or a directory.
  • the Memory Monitoring Module 352 is a necessary module for protecting and monitoring unauthorized access from outside such as a virus.
  • the Process Controlling Module 354 is used for protecting and monitoring executing processes and threads in the System 40.
  • the Module Unit 355 organizes above-mentioned modules ( 352 , 353,or354 ) for performing operation at the same time.
  • Fig. 6 is a flowchart of a method for protecting resources of intellectual property and information system in accordance of preferred embodiment of the present invention.
  • the method for protecting resources of intellectual property and information system in accordance of preferred embodiment of the present invention is as follows. After selecting a resource for protecting and protection condition at the Active Resource Protection
  • the Active Resource Protection Agent 10 starts monitoring corresponding resources 602. During monitoring resources, the Active Resource Protection Agent 30 reports results of monitoring resources to the Active Resource
  • the Active Resource Protection Agent Center 10 modifies dynamically protection operations again and maintains protection operations base on reported result 604 .
  • Active Resource Protection Agents 30-1 ... 30-N receives necessary protection conditions by an active mission controlling function. Base on received protection conditions from the mission selector 12, Active Resource Protection Agents combine necessary components for protecting resources and agents are composed for dispatching and performing necessary operations. After necessary operations are performed by Active Resource Protection Agents 30-1 ... 30-N, statistics information about protecting intellectual property and resource is generated, modified and managed automatically.
  • the present invention can manage record of unauthorized access to resources and infringement of intellectual property (unauthorized duplication) when a system is on-line and off-line.
  • objects of protecting resources and protection conditions are selected and transmitted to an agent.
  • the agent monitors and secures dynamically corresponding resources base on selected resources and protection conditions in a system.
  • the present invention can prevent unauthorized usage of resource fundamentally. Therefore, protecting intellectual property can be achieved by the present invention.

Abstract

Apparatus for securing passive resources including a file, a directory, a memory and a port and active resources including a process and a thread in an system when the system is on-line or off-line with networks comprises: a provision unit for providing the resources and security conditions of the resources; a selection unit, in response to a user's request, for selecting resources to be secured and security conditions for the selected resources; a combination unit for combining the selected resources and the selected security conditions; a monitoring unit for monitoring dynamically the selected resources based on the selected security conditions; and an analysis unit for analyzing the monitoring result to manage record data concerning security-needed situations that include unauthorized infringement and access to the resources.

Description

APPARATUS AND METHOD FOR PROTECTING RESOURCE OF INTELLECTUAL PROPERTY AND INFORMATION SYSTEM USING ACTIVE
RESOURCE PROTECTION AGENT
Technical Field
The present invention relates to a method and apparatus for protecting an intellectual property and a resource of information system and a computer-readable recording medium storing instructions for embodying the method; and, more particularly, to the method and apparatus for protecting digital contents of a intellectual property and information system in electric commerce on computer information network, by using an active resource protection agent.
Background Art
As currently using information protection technologies are an encryption technology and a digital watermarking technology. The encryption technology encrypts original data to scrambled data with encryption key base on cryptography and the digital watermarking technology detects unauthorized duplication by adding a watermark in original data.
However, above-mentioned technologies have limitations to apply. Applying above-mentioned technologies are limited by a scope of resources and an environment of resources (one-line/off-line). Also, with above-mentioned technologies, it is impossible to gain necessary information automatically for proving infringement of intellectual property and unauthorized duplication such as number of duplication, quantity of unauthorized access, or location of unauthorized access. Specially, in case of encryption technology, encrypting large volume of digital contents takes huge amount of time. It is also another distribution. The digital watermarking technology is the one of widely using contents protection technologies and it also has similar limitations to apply.
Disclosure of Invention
It is, therefore, an object of the present invention to provide a method and apparatus for preventing fundamentally from infringing on an intellectual property by using an active resource protection agent as detecting an infringement of the intellectual property and maintaining necessary record data of an unauthorized access to digital contents of a computer system and resources of an information system including active and passive resources for proving the infringement of intellectual property when a system is on-line or off-line.
It is another object of the present invention to provide a computer-readable recording medium storing instructions for embodying the method. An apparatus for protecting passive resources including a file, a directory, a memory and a port and active resources including a process and a thread in an system comprises; a provision unit for providing a class of resources as an object of protecting and protection conditions of the resource; a selection unit for, in response to a user's request, selecting resources to be protected and protection conditions for the selected resources; a combination unit for combining the selected resources and the selected protection conditions received from said selection unit; a first monitoring unit for monitoring dynamically the resources by receiving the selected resource and the protection condition from said combination unit through the Network, determining a protection operation base on said selected resource and said protection condition, and selecting necessary components for said protection operation; and a first analysis unit for analyzing a result of monitoring and protecting resources inputted from said monitoring unit through the Network.
And, in a method for protecting passive resources including a file, a directory, a memory, and a port and active resources including a process and a thread when the system is on-line or off-line, the method comprises steps of; selecting and providing objects of protecting resources and protection conditions to an active resource protection agent; monitoring and protecting resources dynamically by active resource protection agent's operation, herein said operation is determining an operation for protecting selected resources base on said objects of protecting resources and protection conditions, and selecting necessary components for said operation? and managing record data of infringement of an intellectual property (unauthorized duplication) or unauthorized access to resources of the information system when a system is online or off-line by generating, renewing and managing a statistics information of protecting an intellectual property and the resource automatically base on results of said monitoring and protecting step.
Also, in a computing system with a processor, the present invention provides a computer-readable recording medium storing instructions for embodying functions for; selecting and providing objects of protecting resources and protection conditions to an active resource protection agent; monitoring and protecting resources dynamically by active resource protection agent's operation, herein said operation is determining an operation for protecting selected resources base on said objects of protecting resources and protection conditions, and selecting necessary components for said operation; and managing record data of infringement of an intellectual property (unauthorized duplication) or unauthorized access to resources of the information system when a system is on- line or off-line by generating, renewing and managing a statistics information of protecting an intellectual property and the resource automatically base on results of said monitoring and protecting step.
Brief Description of Drawings
The above and other objects and features of the present invention will become apparent from the following description of the preferred embodiments given in conjunction with the accompanying drawings, in which:
Fig. 1 is a diagram of the apparatus for protecting an intellectual property and resource of an information system, in accordance with an embodiment of the present invention;
Fig. 2 illustrates objects of protecting resources in the Adaptive Mission Control Agent 11 in accordance with an embodiment of the present invention;
Fig. 3 is a detailed diagram for embodiment of an Active Resource Protection Agent, in accordance with preferred embodiment of the present invention;
Fig. 4 illustrates correlation between a Mission controller 34 and a System 40 in accordance with preferred embodiment of the present invention; Fig. 5 is a detailed diagram for a Components Unit in accordance of preferred embodiment of the present invention;
Fig. 6 is a flowchart of a method for protecting resources of an intellectual property and an information system in accordance of preferred embodiment of the present invention.
Best Mode for Carrying Out the Invention
The present invention relates to an Active Resource Protection Agent, which is a program or a software code, embodying dynamic protecting techniques for protecting active resources including a file, a directory, a port, and a memory and passive resources including a process and a thread of a computer system and information system. The Active Resource Protection Agent is a software code including an adaptive agent technique and an active agent mission control technique for protecting fundamentally digital contents, active resources and passive resources of a computer system and information system operating for distributing digital contents from unauthorized access including hacking and virus of contents, when the system is on-line or off-line on the Network. As blocking dynamically unauthorized accessing and using of information resources such as multimedia digital contents of intellectual property and resources including a computer, a communication port, a process, and a thread, it is also applicable to extirpate hacking and computer virus.
For applying above-mentioned techniques, the present invention applies digital contents including variety multimedia data, active resources including a file, a directory, a port and a memory, and passive resource including a process and a thread on connected computer systems and information system with the Network as an object of protecting resource by embodying techniques for modifying dynamically protection condition of a resource, Mission Control technique and Adaptive Agent technique, as a software code.
As a result of embodying above-mentioned techniques, the present invention can select objects of protecting resources and protection conditions actively and monitor selected resources by dispatching the agent to on-lined or off-lined system. Also, agent can be assigned another operation dynamically after reporting a result of monitoring resources. At this point of the present invention, the present invention is a protection technique for protecting resources of an intellectual property and information system base on the active agent. And, the present invention not only maintains and manages an elementary record such as number of times infringement, criterion of infringement, scope of infringement, location of infringement, time of infringement, and contents of infringement but also providing a technique for making detecting infringement and maintaining the record of infringement possible when a system is on-line or off-line. The present invention is applicable to business of protecting digital contents and distributing digital contents. And it is also applicable to construct information protecting system for an organization and institution. Also, it could be used as protection technique for preventing infringement of intellectual property fundamentally by adding the technique as basic function to a word editor or multimedia authoring tool. Since the present invention is applicable to not only digital contents but also resources of an information system, it also could be used for detecting a hacker and a virus.
Other objects and aspects of the invention will become apparent from the following description of the embodiments with reference to the accompanying drawings, which is set forth hereinafter. Fig. 1 is a diagram of the apparatus for protecting resources of an intellectual property and information system, in accordance with an embodiment of the present invention. In the diagram, reference numerals 10, 11, 12 13, 14, 15 and 20 denote an Active Resource Protection Agent (ARPA) Center, an adaptive mission control agent, a mission selector, a mission mixer, a result analyzer, a network transceiver and a Network, respectively. And, reference numerals 30-1 to 30-N denote Active Resource Protection Agents. As shown Fig. 1, In an apparatus for protecting passive resources including a file, a directory, a memory, a port and active resources including a process and a thread when a system is on-line or off-line an apparatus for protecting resources of an intellectual property and information system in accordance with an embodiment of the present invention is including; the Adaptive Mission Control Agent 11 for providing objects of protecting resources and protection conditions; The Mission Selector 12 for selecting , upon user's resource protecting request, a corresponding resource and protection condition among provided resources at the Mission Control Agent 11 from user; the Mission Combiner 11 for combining selected corresponding resources and protection conditions from the Mission Selector 12; the Active Resource Protection Agent 30-1 ... 30-N for receiving combined corresponding resources and protection conditions from the Mission Combiner 13 through the Network 20, determining protection operation base on corresponding resources and protection conditions, selecting necessary components, and protecting and monitoring dynamically corresponding resources through selected components; the Result Analyzer 14 for managing record data of infringement of intellectual property(unauthorized duplication) and unauthorized access when a system is on-line or off-line as analyzing received monitoring result of the Active Resource Protection Agent 30-1 ... 30-N through the Network 20.
The Active Resources Protection Agent Center 10 is consisted with the Adaptive Mission Control 11, the Mission Selector 12, the Mission Combiner 13, the Result Analyzer 14, and the Network Transceiver 15. The Active Resources Protection Agent Center 10 assigns a mission to the Active Resources Protection Agent 30-1 ... 30-N located on each system through the Network 20 and reassigns a new mission again after analyzing result of assigned mission. The resource monitoring steps of said Active Resource Protection Agent 30-1 ... 30-N will be described later on Fig.
3. in detail. The function of elements of Active Resource Protection Agent Center 10 is as follows.
The Adaptive Mission Control Agent 11 provides objects of protecting resources and protection conditions. The Mission Selector 12 selects individually object of protecting resources and protection conditions provided from the Adaptive Mission Control Agent 11.
The mission Combiner 13 individually combines missions selected from the Mission Selector 12. The Result Analyzer 13 analyzes a result of protecting resources reported from the Active Resource Protection Agent 30-1 ... 30-N.
Now, protecting resources step in the Active Resource Protection Agent Center 10 will be described in detail. The Mission Selector 12 selects resource and protection condition in the Adaptive Mission Control Agent
11 and the Mission Combiner 13 combines selected conditions and resources. At this point, combined mission passes to the Active Resource Protection Agents 30-1 ... 30-N through the Network Transceiver 10 with on-line.
After that, information from the Active Resource Protection Agents 30-1 ... 30-N passes to the Result Analyzer 14 through the Network Transceiver 15 again and the Result Analyzer 14 assigns a next mission to each Active Resource Protection Agents 30-1 ... 30-N, or records a result on the Active Resource Protection Agent Center 10.
Fig. 2 shows selectable objects of protecting resources and protection condition by the Mission Selector
12 at the Adaptive Mission Control Agent 11 in said Active Resource Protection Agent Center 10.
As shown Fig. 2, among objects of protecting resources selectable by the Mission Selector 12 from the Adaptive
Mission Control Agent 11 is a Name of Resource 111. The
Name of Resources 111 comprises passive resources including a file, a directory, a port and a memory and active resources including a process and a thread in detail. On the other side, an Identification 112 is a list of protection condition of resources and it includes a user ID, an IP address, a Range of Address and a host ID.
Also, a Number of counts 113 is one of the list of protection condition of resources and it includes a read count, write count, and install count.
A Hierarchy 14 is a list for setting up roll and responsibility.
Fig. 3 is a detailed diagram for embodiment of the Active Resource Protection Agent, in the apparatus for protecting intellectual property and information system, in accordance with preferred embodiment of the present invention. In Fig. 3, reference numerals 31, 32, 34, 35 and 40 denote a Network transceiver, a Result Analyzer, a Mission controller, a Components Unit and a System (also referred as a hard ware (HW) platform), respectively.
As shown Fig. 3, The Active Resource Protection Agent 30-1 ... 30-N comprises; The Network Transceiver 31 for receiving combined corresponding resources and protection condition from the Mission Mixer 13 in the Active Resource Protection Agent Center 10 through the Network 20: The Mission Analyzer 33 for analyzing corresponding resource and protection condition: the Mission controller 34 for determining a operation for protecting corresponding resource base on analyzed result of the Mission Analyzer 33: the Components Unit 35 for protecting and monitoring dynamically corresponding resources through selected components by selecting necessary components for operation determined at the mission controller 34: and the result analyzer 32 for analyzing result of monitoring corresponding resource at the Component Unit 35.
The Active Resource Protection Agent 30-1 ... 30-N secures and monitors resources when a system is on-line or off-line. The Active Resource Protection Agent 30-1 ... 30-N is operated base on information of protecting resources and missions received from the Active Resource Protection Agent Center 10. When the information is received through the Network Transceiver 31, the Mission Analyzer 33 analyzes the received information and necessary operations for missions determined in the Mission controller 34 based on an analysis of the Mission Analyzer 33. At this point, determined necessary operations are transmitted to the Components Unit 35 and necessary components or modules are selected for performing the necessary operation. After that, resources of the System 40 are being monitored and protected and a result of monitoring and protecting is saved on the system. Before storing the result, it is transmitted to the Result Analyzer 32 and analyzed for violation of conditions and frequency of usage. Fig. 4 illustrates correlation between a Mission controller 34 and a System 40 in accordance with preferred embodiment of the present invention and it shows operations for protecting resources between the Mission 34 and the system 40. As shown Fig. 4, the Mission controller 34 comprises a Black List Reporter 341, a Violation Record Writer 342, a Caution/Warning 343, a Recovery 344, a Tracking/Monitoring 345, and a Registration/Calculation 346. And, a System 40 is consisted with a System Resource 41, a Black list 42, an Access history 43, and a Resource Registry 44.
The Mission controller 34 determines necessary operations base on information and protection condition analyzed by the Mission Analyzer 33.
At this point, the Blacklist Reporter 341 is an operation for managing information of frequently accessed resources on the system 40 of the dispatched Active Resource Protection Agent and information of the System 40 separately.
The Violation Record Writer 342 is an operation for all activities of violation of protection conditions.
The Caution/Warning 343 is a message for warning a user before taking out user's right of usage when a protection condition of corresponding resource exceeds to a certain limit.
The Recovery 344 is an operation for recovering automatically when finding an unexpected fault from forced closed resources.
The Tracking/Monitoring 345 is the most important and fundamental operation of the Active Resource Protection
Agent 30. It secures resources base on protection conditions and monitors usage of resources for violation of protection condition.
The Registration/Calculation 346 is an operation for registering new added operation and calculating user's violation of protection condition. The System Resource 41 of the System 40 is a resource, which is object to be protected by the Active Resource
Protection Agent 30.
The Blacklist 42 is a same operation as the operation of said Blacklist Reporter 341. The Access history 43 is a file for said Violation
Record Writer 342.
Fig. 5 is a detailed diagram for the Components Unit in accordance of preferred embodiment of the present invention. In Fig 5., reference numerals 351, 352, 353, 354 and 355 denote a Request Operation Analyzer, a File System
Hooking Module, a Memory Monitoring Module, a Process
Controlling Module and a Module Unit, respectively.
If the Mission Selector 34 selects an operation for protecting resources, then the Components Unit 35 determines and composes a necessary component or module for the operation.
As shown Fig 5., the Components Unit 35 comprises the
Request Operation Analyzer 351, the File System Hooking
Module 352, the Memory Monitoring Module 353, the Process Controlling Module 354, and the Module Unit 355.
When the Request Operation Analyzer 351 in the Components Unit 35 receives selected operations from the
Mission controller 351, the Request Operation Analyzer 351 determines necessary modules for received operations.
The File System Hooking Module 352 is a necessary component for performing operation of protecting resource of file system such as a file or a directory.
The Memory Monitoring Module 352 is a necessary module for protecting and monitoring unauthorized access from outside such as a virus. The Process Controlling Module 354 is used for protecting and monitoring executing processes and threads in the System 40.
When above-mentioned modules (352 , 353,or354 ) are selected, the Module Unit 355 organizes above-mentioned modules ( 352 , 353,or354 ) for performing operation at the same time.
Fig. 6 is a flowchart of a method for protecting resources of intellectual property and information system in accordance of preferred embodiment of the present invention.
As shown Fig. 6, the method for protecting resources of intellectual property and information system in accordance of preferred embodiment of the present invention is as follows. After selecting a resource for protecting and protection condition at the Active Resource Protection
Center 10 and transmitting the resource and protection condition to the Active Resource Protection Agent 30-1 ...
30-N (601), the Active Resource Protection Agent 10 starts monitoring corresponding resources 602. During monitoring resources, the Active Resource Protection Agent 30 reports results of monitoring resources to the Active Resource
Protection Agent Center 10 603:
Since then, the Active Resource Protection Agent Center 10 modifies dynamically protection operations again and maintains protection operations base on reported result 604 .
As described above, Active Resource Protection Agents 30-1 ... 30-N receives necessary protection conditions by an active mission controlling function. Base on received protection conditions from the mission selector 12, Active Resource Protection Agents combine necessary components for protecting resources and agents are composed for dispatching and performing necessary operations. After necessary operations are performed by Active Resource Protection Agents 30-1 ... 30-N, statistics information about protecting intellectual property and resource is generated, modified and managed automatically. By using above- mentioned Active Resource Protection Agents of the present invention, the present invention can manage record of unauthorized access to resources and infringement of intellectual property (unauthorized duplication) when a system is on-line and off-line.
As described above, objects of protecting resources and protection conditions are selected and transmitted to an agent. The agent monitors and secures dynamically corresponding resources base on selected resources and protection conditions in a system. By using above-mentioned agent, the present invention can prevent unauthorized usage of resource fundamentally. Therefore, protecting intellectual property can be achieved by the present invention.

Claims

What is claimed is:
1. An apparatus for protecting passive resources including a file, a directory, a memory and a port and active resources including a process and a thread in an system when the system is on-line or off-line with networks, the apparatus comprising; providing means for providing a class of resources an object of protecting and protection condition of the resources; selecting means for, in response to a user's request, selecting resources to be protected and protection conditions for the selected resources; combining means for combining the selected resources and the selected protection conditions from said selecting means; first monitoring means for monitoring dynamically the resources by receiving the selected resource and the protection condition from said combining means through the Network, determining a protection operation base on said selected resource and said protection condition, and selecting necessary components for said protection operation; and first analyzing means for analyzing a result of said monitoring means and managing a record data of infringement of intellectual property(unauthorized duplication) and unauthorized access to the resources without distinction of computing environment such as on-line or off-line.
2. The apparatus as recited in claim 1 , wherein said first monitoring means comprises; second analyzing means for receiving combined selected resources and selected protection conditions from said combining means through the Network and analyzing the resources and protection conditions; first deciding means for determining a protection operation for protecting said selected resources base on a result of said second analyzing means; second monitoring means for selecting necessary components or modules for said protection operation as result of said first deciding means and monitoring dynamically the selected resources based on said necessary components or modules; and third analyzing means for analyzing a monitoring result of said selected resources of said second monitoring means.
3. The apparatus as recited in claim 2, wherein the second monitoring means comprises; second deciding means for determining a component or a module for operating operations selected at said first deciding means; first monitoring module for protecting resources of a file system including a file or a directory base on said second deciding means; second monitoring module for performing an operation of monitoring and protecting unauthorized access to resources from outside such as virus base on said second deciding means; third monitoring module for performing an operation of monitoring and protecting executing processes and threads in a system base on said second deciding means; and parallel operation managing means for organizing operations of said first to third monitoring module for performing operations at the same time.
4. The apparatus as recited in claim 1, wherein said providing means provides an object of the protecting resource and the protection condition to said selecting means for selecting, herein objects of the protecting resource are active resources including a process and a thread and passive resources including a file, a directory, a port, and a memory, herein protection conditions are including a user ID, an IP address, a range of address, a host ID, a read count, a write count, and a install count.
5. The apparatus as recited in claim 1, wherein said combining means monitors and secures multiple numbers of resources and protection conditions at the same time, not restricted to monitoring and protecting only one resource and protection condition.
6. The apparatus as recited in claim 1, wherein said first analyzing means monitors a record of resources protected by said first monitoring means, provides statistics result as a result of analysis, and provides dynamically a new protection condition to said first monitoring means base on the result.
7. A method for protecting passive resources including a file, a directory, a memory, and a port and active resources including a process and a thread when the system is on-line or off-line, the method comprising the steps of: selecting and providing objects of protecting resources and protection conditions to active resource protecting agent; monitoring and protecting resources dynamically by active resource protection agent's operation, herein said operation is determining an operation for protecting selected resources base on said objects of protecting resources and protection conditions, and selecting necessary components for said operation; and managing record of infringement of an intellectual property (unauthorized duplication) or unauthorized access to resources of the information system without distinction of computing environment such as on-line or off-line, by generating, renewing and managing automatically a statistics record of protecting an intellectual property and the resource base on results of said monitoring and protecting step.
8. A computing system with a processor, a computer- readable recording medium storing instructions for embodying functions for; selecting and providing objects of protecting resources and protection conditions to an active resource protection agent for protecting passive resources including a file, a directory, a memory and a port and active resources including a process and a thread when a system is on-line or off-line; monitoring and protecting resources dynamically by active resource protection agent's operation, herein said operation is determining an operation for protecting selected resources base on said objects of protecting resources and protection conditions, and selecting necessary components for said operation; and managing record of infringement of an intellectual property (unauthorized duplication) or unauthorized access to resources of the information system without distinction of computing environment such as on-line or off-line, by generating, renewing and managing automatically a statistics record of protecting an intellectual property and the resource base on results of said monitoring and protecting step.
PCT/KR2001/000951 2000-06-03 2001-06-04 Apparatus and method for protecting resource of intellectual property and information system using active resource protection agent WO2001095202A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001262781A AU2001262781A1 (en) 2000-06-03 2001-06-04 Apparatus and method for protecting resource of intellectual property and information system using active resource protection agent

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR2000/30623 2000-06-03
KR1020000030623A KR20010109892A (en) 2000-06-03 2000-06-03 Apparatus and method for protecting resource of intellectual property and information system using active resource protection agent

Publications (1)

Publication Number Publication Date
WO2001095202A1 true WO2001095202A1 (en) 2001-12-13

Family

ID=19671171

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2001/000951 WO2001095202A1 (en) 2000-06-03 2001-06-04 Apparatus and method for protecting resource of intellectual property and information system using active resource protection agent

Country Status (3)

Country Link
KR (1) KR20010109892A (en)
AU (1) AU2001262781A1 (en)
WO (1) WO2001095202A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013172898A3 (en) * 2012-02-21 2014-02-27 Logos Technologies, Llc System for detecting, analyzing, and controlling infiltration of computer and network systems
RU181870U1 (en) * 2017-07-21 2018-07-26 Общество с ограниченной ответственностью Фирма "Анкад" Device for monitoring the integrity of components of the software environment of computer technology
US10229280B2 (en) 2011-06-14 2019-03-12 International Business Machines Corporation System and method to protect a resource using an active avatar

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100443673B1 (en) * 2000-07-13 2004-08-09 엘지전자 주식회사 Multimedia Service System Based On User History

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5414833A (en) * 1993-10-27 1995-05-09 International Business Machines Corporation Network security system and method using a parallel finite state machine adaptive active monitor and responder
US5913037A (en) * 1996-07-03 1999-06-15 Compaq Computer Corporation Dynamic management information base manager
KR20000010253A (en) * 1998-07-31 2000-02-15 최종욱 Trespass detection system and module of trespass detection system using arbitrator agent
US6070244A (en) * 1997-11-10 2000-05-30 The Chase Manhattan Bank Computer network security management system
KR20000050248A (en) * 2000-05-30 2000-08-05 오병기 Integrated Management Method and Apparatus using Network for ASP
KR20000065547A (en) * 1999-04-07 2000-11-15 이종성 Intelligent Intrusion Detection System based on distributed intrusion detecting agents

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6006328A (en) * 1995-07-14 1999-12-21 Christopher N. Drake Computer software authentication, protection, and security system
JPH11161517A (en) * 1997-11-27 1999-06-18 Meidensha Corp Remote monitor system
KR100287625B1 (en) * 1998-05-12 2001-04-16 박성득 Method for intercepting harmful information of personal computer
KR20000002671A (en) * 1998-06-22 2000-01-15 이동우 Monitoring system and method of illegal software use using security system
KR20000012194A (en) * 1999-06-28 2000-03-06 김상배 System for integrating System Management System and Firewall system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5414833A (en) * 1993-10-27 1995-05-09 International Business Machines Corporation Network security system and method using a parallel finite state machine adaptive active monitor and responder
US5913037A (en) * 1996-07-03 1999-06-15 Compaq Computer Corporation Dynamic management information base manager
US6070244A (en) * 1997-11-10 2000-05-30 The Chase Manhattan Bank Computer network security management system
KR20000010253A (en) * 1998-07-31 2000-02-15 최종욱 Trespass detection system and module of trespass detection system using arbitrator agent
KR20000065547A (en) * 1999-04-07 2000-11-15 이종성 Intelligent Intrusion Detection System based on distributed intrusion detecting agents
KR20000050248A (en) * 2000-05-30 2000-08-05 오병기 Integrated Management Method and Apparatus using Network for ASP

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10229280B2 (en) 2011-06-14 2019-03-12 International Business Machines Corporation System and method to protect a resource using an active avatar
WO2013172898A3 (en) * 2012-02-21 2014-02-27 Logos Technologies, Llc System for detecting, analyzing, and controlling infiltration of computer and network systems
US9060017B2 (en) 2012-02-21 2015-06-16 Logos Technologies Llc System for detecting, analyzing, and controlling infiltration of computer and network systems
RU181870U1 (en) * 2017-07-21 2018-07-26 Общество с ограниченной ответственностью Фирма "Анкад" Device for monitoring the integrity of components of the software environment of computer technology

Also Published As

Publication number Publication date
KR20010109892A (en) 2001-12-12
AU2001262781A1 (en) 2001-12-17

Similar Documents

Publication Publication Date Title
CN101512490B (en) Securing data in a networked environment
US6144739A (en) Computer network protection using cryptographic sealing software agents and objects
US7398526B2 (en) Information processing method, inter-task communication method, and computer-executable program for the same
US6434616B2 (en) Method for monitoring abnormal behavior in a computer system
US9348984B2 (en) Method and system for protecting confidential information
CA2144105C (en) Method and system for detecting intrusion into and misuse of a data processing system
US7673324B2 (en) Method and system for tracking an operating performed on an information asset with metadata associated therewith
US6542993B1 (en) Security management system and method
US20120047556A1 (en) On-line centralization and local authorization of executable files
US20020097878A1 (en) Key controlling system, key controlling apparatus, information encrypting apparatus, information decrypting apparatus and storage media for storing programs
US7801817B2 (en) Digital content management system and apparatus
US20100257376A1 (en) System and method for management of plaintext data in a mobile data processing device
WO2006102442A2 (en) Method and system to create secure virtual project room
CN110889130A (en) Database-based fine-grained data encryption method, system and device
CN108965291A (en) Registration login method, system and the computer equipment of mixed application
US20050038790A1 (en) Device and method for establishing a security policy in a distributed system
WO2001095202A1 (en) Apparatus and method for protecting resource of intellectual property and information system using active resource protection agent
KR20060058546A (en) Method and apparatus for providing database encryption and access control
US20070005512A1 (en) IC chip, board, information processing equipment and storage medium
JP3537018B2 (en) Data transmission method and information system
CN109711207B (en) Data encryption method and device
WO1998053384A1 (en) Method and apparatus for activating programs/features in a computer
Chan et al. Security modeling and evaluation for the mobile code paradigm
Heinrich The network security center: a system level approach to computer network security
JP2007199813A (en) Log collecting system and log collecting method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP