The present invention relates to a communication control apparatus, a communication apparatus, a communication control system, a communication control method, and a program.
In recent years, it has become common that a plurality of information processing apparatuses are connected via a relay apparatus so as to construct a network. Thus, the security risks between the apparatuses have increased. As related technologies, there are the inventions disclosed in Patent Literatures 1 and 2 below.
Patent Literature 1 discloses that, when an information processing apparatus stores, in an information management apparatus, information including a plurality of items with different security levels, the encryption level of the information can be varied based on a predetermined degree of reliability.
Patent Literature 2 discloses monitoring the state of a communication section, acquiring quality information that identifies the current communication state, deciding the encryption level based on the quality information acquired, and encrypting the transmission data based on the decided encryption level.
Patent Literature 1 discloses that the information processing apparatus can vary the encryption level of information according to a predetermined degree of reliability. However, merely allowing the encryption level to be varied may not suitably encrypt information according to the security level.
Patent Literature 2 discloses deciding the encryption level based on quality information that identifies the current communication state. However, similarly to Patent Literature 1, merely changing the encryption level may not suitably encrypt the information according to the security level.
An example aspect of the present invention has been made in view of the above problems, and an example object thereof is to provide a technique for making it possible to suitably encrypt information according to a security level.
A communication control apparatus in accordance with an example aspect of the present invention includes: an acquisition means for acquiring communication path information; and an instruction means for instructing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
A communication apparatus in accordance with an example aspect of the present invention includes: an acquisition means for acquiring communication path information; and an execution means for executing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
A communication control system in accordance with example aspect of the present invention includes: an acquisition means for acquiring communication path information; an instruction means for instructing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow; and an execution means for executing at least one of encryption and decryption of the target flow with use of the encryption range of the target flow.
A communication control method in accordance with an example aspect of the present invention includes: acquiring communication path information; and instructing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
A communication control method in accordance with an example aspect of the present invention includes: acquiring communication path information; and executing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
A program in accordance with an example aspect of the present invention causes a computer to execute: a process of acquiring communication path information; and a process of instructing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired 20 and which is of the target flow.
A program in accordance with an example aspect of the present invention causes a computer to execute: a process of acquiring communication path information; and a process of executing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
With an example aspect of the present invention, it is possible to suitably encrypt information according to a security level.
The Open Systems Interconnection (OSI) reference model, which has been formulated by the International Organization for Standardization (ISO) and which divides the communication functions of computers into a hierarchical structure, defines the communication functions (communications protocols) in seven different levels (layers).
The headers of communication packets are added in correspondence with the layers, and mainly include the Media Access Control (MAC) header, the Internet Protocol (IP) header, and the Transmission Control Protocol/User Datagram Protocol (TCP/UDP) header.
Each layer inherently contains security risks. For example, the MAC header includes information such as the transmission source MAC address and the transmission destination MAC address, and may be exploited for spoofing, user identification, and the like.
In addition, the IP header includes information such as the transmission source IP address and the transmission destination IP address, and may be exploited for spoofing, user identification, and the like. Furthermore, the TCP/UDP header includes information such as the transmission source port number and the transmission destination port number, and may be exploited to identify user information (such as the type of server). Furthermore, the data portion may lead to the leakage of exchanged information.
Since security risks thus exist in each region of the communication packet, increasing the encryption range can enhance the security level. However, increasing the encryption range leads to a decrease in throughput. For example, when destination information such as MAC addresses and IP addresses are to be encrypted, the following processes need to be performed at relay apparatuses such as access points, switches, and routers:
In addition, when the encryption range in a communication packet is increased, it is necessary to generate a random number in correspondence with each region. Therefore, depending on the speed of random number generation, increasing the encryption range may further decrease throughput.
An example aspect of the present invention suitably controls the encryption range of a communication packet according to the required security level while suppressing a decrease in throughput.
<Communication Control Apparatus 1 in Accordance with First Example Embodiment>
A first example embodiment of the present invention will be discussed in detail with reference to the drawings. The first example embodiment is a basic form of example embodiments discussed later. It should be noted that reference signs which are indicated in the drawings and are used in this overview are given to elements for convenience as an example for assisting in understanding, and are not intended to limit the present invention to the illustrated aspects. The lines connecting the blocks in the drawings and the like referred to in the descriptions below include both bidirectional lines and unidirectional lines. The unidirectional arrows schematically illustrate the flow of a main signal (data) and is not intended to exclude bidirectionality. Although each block in the drawings may be configured to have ports or interfaces at the input and output connection points thereof, these configurations are not illustrated.
The communication control apparatus 1 is, for example, a controller that controls a relay apparatus such as an access point, a switch, or a router. The communication control apparatus 1 mainly performs, for example, acquiring of communication path information from each relay apparatus and providing of instructions for encryption and decryption to each relay apparatus and each adapter.
The acquisition means 11 acquires communication path information. The communication path information is information pertaining to each communication path in a communication flow and is, for example, information obtained by quantifying, into a trust score, a degree of reliability of each communication path.
The communication flow is a communication path from one terminal (transmission source) to another terminal (transmission destination). If there are a plurality of relay apparatuses between the terminals, the paths between the relay apparatuses each form a single communication path. In addition, a path between a relay apparatus and an adapter connected a terminal also forms a single communication path. Therefore, if a relay apparatus exists between terminals, a plurality of communication paths are included in the communication flow.
The trust score of a communication path can be decided by, for example, the type of communication medium of the communication path. If the communication medium is wired, a high value is set as the trust score. If the communication medium is wireless, a low value is set as the trust score.
The trust score of a communication path can also be decided by information pertaining to the LAN (Local Area Network) to which the communication path belongs. The trust score of a communication path can also be decided by the presence/absence of suspicious traffic. In this case, a high value is set as the trust score for a communication path without suspicious traffic while a low value is set as the trust score for a communication path with suspicious traffic.
The instruction means 12 instructs at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the acquired communication path information and which is of the target flow. Specifically, the trust score of each communication path in the target flow is referred to and the risk score, which indicates the degree of risk of the target flow is calculated. When the risk score is low (when the degree of reliability is high), a narrow encryption range is set. When the risk score is high (when the degree of reliability is low), a wide encryption range is set.
For example, if a packet includes data, a first header, a second header, and a third header, different encryption ranges can be set, for example, as follows: (1) the encryption range is set to only the data and the first header, (2) the encryption range is set to the data, the first header, and the second header, and (3) the encryption range is set to the data, the first header, the second header, and the third header.
The instruction means 12 then provides, to relay apparatuses and adapters which are present in the communication paths in the target flow, an instruction for at least one of encryption and decryption of a communication packet with use of the encryption range of the target flow. Therefore, when there are a plurality of communication flows from terminal to terminal, different encryption ranges may be set for the communication flows.
According to the communication control apparatus 1 in accordance with the present example embodiment, as discussed above, the instruction means 12 instructs at least one of encryption and decryption of the target flow with use of an encryption range which is defined according to communication path information. It is therefore possible to suitably instruct encryption or decryption of information according to the security level.
With reference to
First, the acquisition means 11 acquires communication path information (S1). The communication path information is information pertaining to each communication path in a communication flow and is, for example, information obtained by quantifying, into a trust score, a degree of reliability of each communication path.
Next, the instruction means 12 instructs at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the acquired communication path information and which is of the target flow (S2). Specifically, the instruction means 12 provides, to the relay apparatuses which are present in the communication paths in the target flow, an instruction for at least one of encryption and decryption of a communication packet with use of the encryption range of the target flow.
According to the communication control method in accordance with the present example embodiment, as discussed above, the instruction means 12 instructs at least one of encryption and decryption of the target flow with use of an encryption range which is defined according to communication path information. It is therefore possible to suitably instruct encryption or decryption of information according to the security level.
The communication apparatus 2 is a relay apparatus such as an access point, a switch, or a router. The communication apparatus 2 mainly performs, for example, acquiring of communication path information on each communication path and encrypting and decrypting of information within an encryption range instructed by the communication control apparatus 1.
The acquisition means 21 acquires communication path information. The communication path information is information pertaining to each communication path in a communication flow and is, for example, information obtained by quantifying, into a trust score, a degree of reliability of each communication path.
The execution means 22 executes at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the acquired communication path information and which is of the target flow. Specifically, the execution means 22 uses the encryption range instructed by the communication control apparatus 1, so as to execute at least one of encryption and decryption of a communication packet.
According to the communication apparatus 2 in accordance with the present example embodiment, as discussed above, the execution means 22 executes at least one of encryption and decryption of the target flow with use of an encryption range which is defined according to communication path information. It is therefore possible to suitably encrypt or decrypt information according to the security level.
With reference to
First, the acquisition means 21 acquires communication path information (S11). The communication path information is information pertaining to each communication path in a communication flow and is, for example, information obtained by quantifying, into a trust score, a degree of reliability of each communication path.
Next, the execution means 22 executes at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the acquired communication path information and which is of the target flow (S12). Specifically, the execution means 22 uses the encryption range instructed by the communication control apparatus 1, so as to execute at least one of encryption and decryption of a communication packet.
According to the communication control method in accordance with the present example embodiment, as discussed above, the execution means 22 executes at least one of encryption and decryption of the target flow with use of an encryption range which is defined according to communication path information. It is therefore possible to suitably encrypt or decrypt information according to the security level.
As illustrated in
The functions of the communication control system 100 may be implemented on the cloud. For example, the acquisition means 31 and the instruction means 32 may be a single apparatus, and the execution means 33 may be a single apparatus. These functions may be implemented in a single apparatus or separate apparatuses. For example, if these functions are implemented in separate apparatuses, information of each section is transmitted and received via the network N and a process proceeds.
The acquisition means 31 acquires communication path information. The communication path information is information pertaining to each communication path in a communication flow and is, for example, information obtained by quantifying, into a trust score, a degree of reliability of each communication path.
The instruction means 32 instructs at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the acquired communication path information and which is of the target flow.
The execution means 33 executes at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the acquired communication path information and which is of the target flow.
According to the communication control system 100 in accordance with present example embodiment, as discussed above, the instruction means 32 instructs at least one of encryption and decryption of the target flow with use of an encryption range which is defined according to communication path information. It is therefore possible to suitably instruct encryption or decryption of information according to the security level.
In addition, the execution means 33 executes at least one of encryption and decryption of the target flow with use of an encryption range which is defined according to communication path information. It is therefore possible to suitably encrypt or decrypt information according to the security level.
The following description will discuss a second example embodiment of the present invention in detail with reference to the drawings. The same reference numerals are given to constituent elements which have functions identical with those discussed in the first example embodiment, and descriptions as to such constituent elements are omitted as appropriate.
<Example Configuration of Communication Control Apparatus 1A in Accordance with Second Example Embodiment>
The communication section 41 transmits/receives information to/from the communication apparatuses 2A-1 through 2A-N. The communication section 41 includes an acquisition section 11. The acquisition section 11 is a component that achieves an acquisition means in the present example embodiment.
The adapters 2A-4 through 2A-6 encrypt communication packets from the terminals 4-1 through 4-3 and transmit the communication packets to the relay apparatus 2A-2 or 2A-3. In addition, the adapters 2A-4 through 2A-6 decrypt communication packets received from the relay apparatus 2A-2 or 2A-3 and output the communication packets to the terminals 4-1 through 4-3.
The relay apparatuses 2A-1 through 2A-3 decrypt the received communication packets, confirm the destinations, encrypt the communication packets again, and then transmit the communication packets. In addition, the relay apparatuses 2A-1 through 2A-3 acquire communication path information of communication paths and provide notification to the communication control apparatus 1A.
The acquisition section 11 acquires the communication path information from the communication apparatuses 2A-1 through 2A-N. The communication path information is information pertaining to each communication path in a communication flow and is, for example, information obtained by quantifying, into a trust score, a degree of reliability of each communication path.
The control section 42 is a part that performs overall control of the communication control apparatus 1A, and includes an instruction section 12 and a decision section 13. The instruction section 12 is a component that achieves the instruction means in the present example embodiment. The decision section 13 is a component that achieves the decision means in the present example embodiment.
The control section 42 periodically causes the acquisition section 11 to acquire the communication path information from the communication apparatuses 2A-1 through 2A-N and stores the acquired communication path information in the storage section 43.
The decision section 13 refers to the communication path information on each communication path in the target flow which is stored in the storage section 43 and decides an encryption range of the target flow. Specifically, the communication path information is information obtained by quantifying, into a trust score, a degree of reliability of each communication path in the target flow, and the decision section 13 calculates a risk score of the target flow from the trust score of each communication path in the target flow which is stored in the storage section 43, and decides an encryption range of the target flow according to the risk score.
(2) in
(3) in
The relay apparatus 2A-3 is an access point and communicates with the adapter 2A-6 wirelessly.
As illustrated in
As illustrated in
Risk score=5×3−(2+5+4)=4 (Formula 1)
In the example of
The decision section 13 may set the encryption range to part of the data and part of the first header of the packet which is transmitted in the target flow. For example, it is possible to, for example, set the encryption range only to part of the data and the transmission source port number of the TCP/UDP header or set the encryption range only to part of the data and the transmission destination port number of the TCP/UDP header.
When the risk score is equal to or more than the first threshold and equal to or less than the second threshold, which is more than the first threshold, the decision section 13 sets the encryption range to the data, the first header, and the second header of the packet which is transmitted in the target flow. For example, the first header is a TCP/UDP header, and the second header is an IP header. Alternatively, the first header may be an IP header, and the second header may be a MAC header. Any combination of the first header and the second header can be employed.
When the risk score is equal to or more than the second threshold, the decision section 13 sets the encryption range to the data, the first header, the second header, and the third header of the packet which is transmitted in the target flow. For example, the first header is a TCP/UDP header, the second header is an IP header, and the third header is a MAC header.
The communication path information is information that has been quantified according to the communication medium of each communication path in the target flow. For example, when the communication medium of the communication path is wired, a high value is set as the trust score which is the communication path information, and, when the communication medium is wireless, a low value is set as the trust score which is the communication path information.
The communication path information is also information that has been quantified according to the presence of suspicious traffic on each communication path of the target flow. For example, for a communication path without suspicious traffic, a high value is set as the trust score which is the communication path information, and, for a communication path with suspicious traffic, a low value is set as the trust score which is the communication path information.
Here,
For example, if the encryption range includes the data, the TCP/UDP header, and the IP header, the instructions section 12 generates a random number corresponding to the data, a random number corresponding to the TCP/UDP header, and a random number corresponding to the IP header, and then transmits the three random numbers to the relay apparatuses and the adapters which are present in the communication paths in the target flow to instruct at least one of encryption and decryption of the communication packet.
The instruction section 12 may generate random numbers corresponding to the regions of the encryption range and transmit the random numbers to the relay apparatuses and the adapters which are present in the communication paths in the target flow, in such a manner as to periodically update the random numbers.
The input section 44 is constituted by, for example, a switch and is used for, for example, setting a mode of the communication control apparatus 1A. The control section 42 acquires a value set in the input section 44 and performs setting, changing, or the like of, for example, an operation mode.
<Example Configuration of Communication Apparatuses 2A in Accordance with Second Example Embodiment>
As illustrated in
The acquisition section 21 acquires communication path information. The communication section 51 transmits, to the communication control apparatus 1A, the communication path information which has been acquired by the acquisition section 21. The communication path information is information pertaining to each communication path in a communication flow and is, for example, information obtained by quantifying, into a trust score, a degree of reliability of each communication path.
The reception section 23 receives, from the communication control apparatus 1A that controls the communication apparatuses 2A-1 through 2A-N, an encryption range of the target flow, and stores the encryption range in the storage section 53. The reception section 23 receives, from the communication control apparatus 1A, random numbers corresponding to the regions of the encryption range, and stores the random numbers in the storage section 53.
The control section 52 is a part that performs overall control of the communication apparatus 2A-1, and includes an execution section 22. The execution section 22 is a component that achieves an execution means in the present example embodiment. The execution section 22 executes at least one of encryption and decryption of the target flow with use of the encryption range of the target flow which is stored in the storage section 53. At this time, the random numbers which correspond to the regions of the encryption range and which are stored in the storage section 53 are used.
The input section 54 is constituted by, for example, a switch and is used for, for example, setting a mode of the communication apparatus 2A-1. The control section 52 acquires a value set in the input section 54 and performs setting, changing, or the like of, for example, an operation mode.
Next, the adapter 2A-7 requests the communication control apparatus 1A to provide information on the encryption range of the flow (a) (S23). When the communication section 41 of the communication control apparatus 1A has received, from the adapter 2A-7, the request for the encryption range, the acquisition section 11 of the communication control apparatus 1A requests the relay apparatuses 2A-1 and 2A-3 in the flow (a) to provide a report on the communication path information (S24).
Next, when the relay apparatuses 2A-1 and 2A-3 have provided a report on the communication path information to the communication control apparatus 1A (S25), the decision section 13 of the communication control apparatus 1A sets the reported communication path information as a trust score of each communication path (S26). Then, the decision section 13 of the communication control apparatus 1A calculates a risk score of the flow (a) from the trust score of each communication path and, based on the risk score, decides the encryption range of the flow (a) (S27).
Next, the communication section 41 of the communication control apparatus 1A transmits the encryption range of the flow (a) decided by the decision section 13 to the adapter 2A-7, the L3 switch 2A-1, the access point 2A-3, and the adapter 2A-6 (S28).
The adapter 2A-7 encrypts the packet within the encryption range specified by the communication control apparatus 1A, and transmits the packet to the L3 switch 2A-1 (S29). When the L3 switch 2A-1 has received the packet from the adapter 2A-7, if the encryption range extends up to the MAC header or the IP header, the L3 switch 2A-1 decrypts the packet within the encryption range instructed by the communication control apparatus 1A, confirms the destination, encrypts the packet again, and then transmits the packet to the access point 2A-3.
Similarly, when the access point 2A-3 has received the packet from the L3 switch 2A-1, if the encryption range extends up to the MAC header or the IP header, the access point 2A-3 decrypts the packet within the encryption range instructed by the communication control apparatus 1A, confirms the destination, encrypts the packet again, and then transmits the packet to the adapter 2A-6 (S30).
Finally, the adapter 2A-6 decrypts the packet received from the access point 2A-3 within the encryption range instructed by the communication control apparatus 1A and transmits the packet to the terminal 4-3 (S31). This completes the process.
When the L3 switch 2A-1 and the access point 2A-3 have provided a report on the communication path information to the communication control apparatus 1A (S42), the decision section 13 of the communication control apparatus 1A sets the reported communication path information as a trust score of each communication path (S43).
Next, the decision section 13 of the communication control apparatus 1A calculates a risk score of each flow from the trust scores and, based on the risk score, decides an encryption range of each flow (S44). The decision section 13 of the communication control apparatus 1A compares the current encryption range of each flow stored in the storage section 43 with the encryption range of each flow calculated in the step S44. For a flow for which the encryption ranges are different, the instruction section 12 instructs the relay apparatus and the adapter in the flow to change the encryption range (S45). For example, if the encryption range of the flow (a) is to be changed, the instruction section 12 instructs the adapter 2A-7, the L3 switch 2A-1, the access point 2A-3, and the adapter 2A-6 to change the encryption range.
The adapter 2A-7 encrypts the packet received from the terminal 4-4 within the encryption range specified in the step S45 and then transmits the packet to the L3 switch 2A-1 (S46). When the L3 switch 2A-1 has received the packet from the adapter 2A-7, if the encryption range extends up to the MAC header or the IP header, the L3 switch 2A-1 decrypts the packet within the encryption range instructed by the communication control apparatus 1A, confirms the destination, encrypts the packet again, and then transmits the packet to the access point 2A-3.
Similarly, when the access point 2A-3 has received the packet from the L3 switch 2A-1, if the encryption range extends up to the MAC header or the IP header, the access point 2A-3 decrypts the packet within the encryption range instructed by the communication control apparatus 1A, confirms the destination, encrypts the packet again, and then transmits the packet to the adapter 2A-6 (S47).
Finally, the adapter 2A-6 decrypts the packet received from the access point 2A-3 within the encryption range instructed by the communication control apparatus 1A and transmits the packet to the terminal 4-3 (S48). This completes the process.
As discussed above, according to the communication control apparatus 1A in accordance with the present example embodiment, the decision section 13 refers to communication path information on each communication path in a target flow and decides an encryption range of the target flow. Therefore, it is possible to suitably decide an encryption range of the target flow according to the security level.
In addition, since the decision section 13 of the communication control apparatus 1A decides the encryption range of the target flow according to a risk score, it is possible to suitably decide the encryption range of the target flow according to the risk score.
When the risk score is low, the decision section 13 of the communication control apparatus 1A can set the encryption range only to the data and the first header of the packet.
In addition, the decision section 13 of the communication control apparatus 1A can reduce the processing load on the communication apparatus by setting the encryption range only to part of the data and part of the header of the packet.
When the risk score is moderate, the decision section 13 of the communication control apparatus 1A can set the encryption range to the data, the first header, and the second header of the packet.
When the risk score is high, the decision section 13 of the communication control apparatus 1A can set the encryption range to the data, the first header, the second header, and the third header of the packet.
In addition, because the communication path information is information that has been quantified according to the communication medium of each communication path in the target flow, the decision section 13 of the communication control apparatus 1A can set a high trust score as the communication path information for wired communication and set a low trust score as the communication path information for wireless communication.
In addition, because the communication path information is information that has been quantified according to the presence of suspicious traffic on each communication path in the target flow, the decision section 13 of the communication control apparatus 1A can set a high trust score as the communication path information for a communication path without suspicious traffic and set a low trust score as the communication path information for a communication path with suspicious traffic.
In addition, the execution section 22 of the communication apparatuses 2A can encrypt or decrypt information according to the encryption range received from the communication control apparatus 1A.
The following description will discuss a third example embodiment of the present invention in detail with reference to the drawings. The same reference numerals are given to constituent elements which have functions identical with those discussed in the first and second example embodiments, and descriptions as to such constituent elements are omitted as appropriate. It should be noted that in the present example embodiment, no communication control apparatus exists, and a communication apparatus itself decides an encryption range and performs encryption and decryption of information.
<Example Configuration of Communication Apparatus 2B in Accordance with Third Example Embodiment>
The communication section 51B transmits/receives information to/from the communication apparatuses 2B-2 to 2B-N. The communication section 51B includes an acquisition section 21. The acquisition section 21 is a component that achieves an acquisition means in the present example embodiment.
The acquisition section 21 acquires communication path information. Specifically, the acquisition section 21 acquires (i) communication path information on the communication path to which the communication apparatus 2B-1 itself is connected and (ii) communication path information on other communication paths in the target flow received from the communication apparatuses 2B-2 to 2B-N. Then, the acquisition section 21 stores the acquired communication path information in the storage section 53.
The decision section 24 refers to the communication path information on each communication path in the target flow which is stored in the storage section 53 and decides an encryption range of the target flow. Specifically, the communication path information is information obtained by quantifying, into a trust score, a degree of reliability of each communication path in the target flow, and the decision section 24 calculates a risk score of the target flow from the trust score of each communication path in the target flow which is stored in the storage section 53, and decides an encryption range of the target flow according to the risk score.
The execution section 22 executes at least one of encryption and decryption of the target flow with use of the encryption range which has been decided by the decision section 24.
As discussed above, according to the communication apparatus 2B in accordance with the present example embodiment, the decision section 24 refers to communication path information on each communication path in a target flow and decides an encryption range of the target flow. Therefore, it is possible to suitably decide an encryption range of the target flow according to the security level.
The functions of part of or all of the communication control apparatuses 1 and 1A, the communication apparatuses 2, 2A, and 2B, and the communication control systems 100, 100A, and 100B can be realized by hardware such as an integrated circuit (IC chip) or can be alternatively realized by software.
In the latter case, each of the communication control apparatuses 1 and 1A, the communication apparatuses 2, 2A, and 2B, and the communication control systems 100, 100A, and 100B is realized by, for example, a computer that executes instructions of a program that is software realizing the foregoing functions.
As the processor C1, for example, it is possible to use a central processing unit (CPU), a graphic processing unit (GPU), a digital signal processor (DSP), a micro processing unit (MPU), a floating point number processing unit (FPU), a physics processing unit (PPU), a microcontroller, or a combination of these. The memory C2 can be, for example, a flash memory, a hard disk drive (HDD), a solid state drive (SSD), or a combination of these.
The computer C may further include a RAM in which the program P is loaded when executed and/or in which various kinds of data are temporarily stored. The computer C may further include a communication interface via which data is transmitted to and received from another apparatus. The computer C may further include an input-output interface for connecting input-output apparatuses such as a keyboard, a mouse, a display and/or a printer.
The program P can be stored in a non-transitory tangible storage medium M which is readable by the computer C. Examples of such a storage medium M can include a tape, a disk, a card, a semiconductor memory, and a programmable logic circuit. The computer C can acquire the program P via such a storage medium M. The program P can be transmitted via a transmission medium. Examples of such a transmission medium include a communication network and a broadcast wave. The computer C can also acquire the program P via such a transmission medium.
The present invention is not limited to the foregoing example embodiments, but can be altered in various ways by a skilled person within the scope of the claims. For example, the present invention also encompasses, in its technical scope, any example embodiment derived by appropriately combining technical means disclosed in the foregoing example embodiments.
Some of or all of the foregoing example embodiments can also be described as below. However, that the present invention is not limited to the example aspects described below.
A communication control apparatus including: an acquisition means for acquiring communication path information; and an instruction means for instructing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
The above configurations make it possible to suitably instruct encryption or decryption of information according to the security level.
The communication control apparatus according to the supplementary note 1, further including a decision means for referring to the communication path information on each communication path in the target flow and deciding the encryption range of the target flow.
The above configuration makes it possible to suitably decide the encryption range of the target flow according to the security level.
The communication control apparatus according to the supplementary note 2, in which: the communication path information is information obtained by quantifying, into a trust score, a degree of reliability of each communication path in the target flow; and the decision means is configured to calculate a risk score of the target flow from the trust score of each communication path in the target flow and decide the encryption range of the target flow according to the risk score.
The above configuration makes it possible to suitably decide the encryption range of the target flow according to the risk score.
The communication control apparatus according to the supplementary note 3, in which, when the risk score is equal to or less than a first threshold, the decision means sets the encryption range to data and a first header of a packet which is transmitted in the target flow.
The above configuration makes it possible to set the encryption range only to the data and the first header of the packet when the risk score is low.
The communication control apparatus according to the supplementary note 4, in which the decision means sets the encryption range to part of the data and part of the first header of the packet which is transmitted in the target flow.
The above configuration makes it possible to reduce the processing load on the communication apparatus by setting the encryption range only to part of the data and part of the first header of the packet.
The communication control apparatus according to the supplementary note 4 or 5, in which, when the risk score is equal to or more than the first threshold and equal to or less than a second threshold, which is more than the first threshold, the decision means sets the encryption range to the data, the first header, and a second header of the packet which is transmitted in the target flow.
The above configuration makes it possible to set the encryption range to the data, the first header, and the second header of the packet when the risk score is moderate.
The communication control apparatus according to the supplementary note 6, in which, when the risk score is equal to or more than the second threshold, the decision means sets the encryption range to the data, the first header, the second header, and a third header of the packet which is transmitted in the target flow.
The above configuration makes it possible to set the encryption range to the data, the first header, the second header, and the third header of the packet when the risk score is high.
The communication control apparatus according to any one of the supplementary notes 1 through 7, in which the communication path information is information that has been quantified according to a communication medium of each communication path in the target flow.
The above configuration makes it possible to set a high trust score as the communication path information for wired communications and set a low trust score as the communication path information for wireless communication.
The communication control apparatus according to any one of the supplementary notes 1 through 8, in which the communication path information is information that has been quantified according to a presence of suspicious traffic on each communication path of the target flow.
The above configuration makes it possible to set a high trust score as the communication path information for a communication path without suspicious traffic and set a low trust score as the communication path information for a communication path with suspicious traffic.
A communication apparatus including: an acquisition means for acquiring communication path information; and an execution means for executing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
The above configuration makes it possible to suitably execute encryption or decryption of information according to the security level.
The communication apparatus according to the supplementary note 10, further including a decision means for referring to the communication path information on each communication path in the target flow and deciding the encryption range of the target flow.
The above configuration makes it possible to suitably decide the encryption range of the target flow according to the security level.
The communication apparatus according to the supplementary note 10, further including a reception means for receiving the encryption range of the target flow from a communication control apparatus that controls the communication apparatus.
The above configuration makes it possible to execute encryption or decryption of information according to the encryption range received from the communication control apparatus.
A communication control system including: an acquisition means for acquiring communication path information; an instruction means for instructing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow; and an execution means for executing at least one of encryption and decryption of the target flow with use of the encryption range of the target flow.
The above configuration makes it possible to suitably execute encryption or decryption of information according to the security level.
A method for controlling communication, said method including: acquiring communication path information; and instructing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
The above configuration makes it possible to suitably instruct encryption or decryption of information according to the security level.
A method for controlling communication, said method including: acquiring communication path information; and executing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
The above configuration makes it possible to suitably execute encryption or decryption of information according to the security level.
A program for causing a computer to execute: a process of acquiring communication path information; and a process of instructing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
The above configuration makes it possible to suitably instruct encryption or decryption of information according to the security level.
A program for causing a computer to execute: a process of acquiring communication path information; and a process of executing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
The above configuration makes it possible to suitably execute encryption or decryption of information according to the security level.
A communication control apparatus including at least one processor, in which the processor executes: a process of acquiring communication path information; and a process of instructing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
It should be noted that the communication control apparatus may further include a memory. The memory may store a program for causing the processor to execute the acquisition process and the instruction process. The program may be stored in a computer-readable non-transitory tangible storage medium.
A communication apparatus including at least one processor, in which the processor executes: a process of acquiring communication path information; and a process of executing at least one of encryption and decryption of a target flow with use of an encryption range which is defined according to the communication path information acquired and which is of the target flow.
It should be noted that the communication apparatus may further include a memory. The memory may store a program for causing the processor to execute the acquisition process and the execution process. The program may be stored in a computer-readable non-transitory tangible storage medium.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2022/011516 | 3/15/2022 | WO |