The present disclosure relates to a security management device, a security management method and a non-transitory computer-readable medium.
Techniques for verifying system integrity of an electronic device have been proposed (for example, Patent Literature 1). In the technique disclosed in Patent Literature 1, after verifying integrity of a scan module (a security function) of a normal environment (an ordinary environment), a verification module (a security function) of a secure environment causes the scan module to verify a kernel, an application or the like of the normal environment (that is, an execution environment). That is, the security function of the secure environment performs an inspection about the normality of the security function of the normal environment before the security function of the normal environment inspects the execution environment.
In the technique disclosed in Patent Literature 1, however, it is not considered that the security function of the normal environment may be attacked while the security function of the secure environment is inspecting the security function of the normal environment or while the security function of the normal environment is inspecting the execution environment. Therefore, an inspection result about the execution environment obtained by the security function of the normal environment operating in an abnormal state is treated as a normal inspection result, and there is a possibility that security is reduced.
An object of the present disclosure is to provide a security management device capable of improving security, a security management method and a non-transitory computer readable medium.
A security management device according to a first aspect is a security management device configured to manage security of a processing device having a normal environment and a secure environment, the security management device including:
first processing means for acquiring information about an inspection target including a program executed in an execution environment included in the normal environment, the inspection target being a target of an inspection about normality, the first processing means operating in the normal environment; and
second processing means for inspecting normality of the first processing means after the inspection about normality of the inspection target based on the acquired information about the inspection target is performed, the second processing means operating in the secure environment.
A security management method according to a second aspect is a security management method executed by a security management device configured to manage security of a processing device having a normal environment and a secure environment, wherein
first processing means of the security management device operating in the normal environment acquires information about an inspection target including a program executed in an execution environment included in the normal environment, the inspection target being a target of an inspection about normality; and
second processing means of the security management device operating in the secure environment inspects normality of the first processing means after the inspection about the normality of the inspection target based on the acquired information about the inspection target is performed.
A non-transitory computer-readable medium according to a third aspect is a non-transitory computer-readable medium storing a program, the program causing a security management device configured to manage security of a processing device having a normal environment and a secure environment to execute the processes of:
first processing means of the security management device operating in the normal environment acquiring information about an inspection target including a program executed in an execution environment included in the normal environment, the inspection target being a target of an inspection about normality; and
second processing means of the security management device operating in the secure environment inspecting normality of the first processing means after the inspection about the normality of the inspection target based on the acquired information about the inspection target is performed.
By the present disclosure, it is possible to provide a security management device capable of improving security, a security management method and a non-transitory computer readable medium.
Example embodiments will be explained below with reference to drawings. In the example embodiments, the same or similar components are given the same reference sign, and duplicated explanation will be omitted. Further, in the example embodiments, the same or similar processing steps are given the same reference sign, and duplicated explanation will be omitted.
In
The processing unit 21 acquires, from an “inspection target (not shown)”, information about the inspection target. The “inspection target” is a target of an inspection about normality, and programs executed in an “execution environment” included in the normal environment 10A (an OS (operating system) and the like) are included. The processing unit 21 may acquire the information about the inspection target not from the inspection target but through an API of the OS. Further, the processing unit 21 may access the memory 11 to acquire the information about the inspection target from the memory 11. Here, the information about the inspection target is, for example, execution states of an execution code of a program stored in a memory or a storage, a configuration file of the program, internal variables of the program stored on the memory.
After an inspection about the normality of the inspection target based on the information about the inspection target acquired by the processing unit 21 is performed, the processing unit 22 inspects the normality of the processing unit 21.
As described above, according to the first example embodiment, the security management device 20 has the processing unit (the security function) 21 operating in the normal environment 10A and the processing unit (the security function) 22 operating in the secure environment 10B. The processing unit 21 acquires information about an “inspection target (not shown)”. The “inspection target” is a target of an inspection about normality and includes programs executed in the execution environment included in the normal environment 10A (the OS (operating system) and the like). After an inspection about the normality of the inspection target based on the information about the inspection target acquired by the processing unit 21 is performed, the processing unit 22 inspects the normality of the processing unit 21.
According to the configuration of the security management device 20, the normality of the processing unit 21 is inspected after the inspection about the normality of the inspection target based on the information about the inspection target acquired by the processing unit 21 is performed, and, therefore, an inspection result showing the processing unit 21 being normal or abnormal at the time point when the inspection about the normality of the inspection target is performed can be obtained. The inspection result showing the processing unit 21 being normal or abnormal can be a judgment indicator for reliability (validity) of a result of the inspection about the normality of the inspection target. Therefore, for example, if an inspection result showing the processing unit 21 being abnormal is obtained, the result of the inspection about the normality of the inspection target can be treated as an inspection result with a low reliability, and it is possible to improve security.
The inspection about the normality of the processing unit 21 may be performed not only after the inspection about the normality of the inspection target based on the information about the inspection target acquired by the processing unit 21 but may be performed before and after the inspection about the normality of the inspection target is performed in a series of procedures. Thereby, it is possible to further improve security. Hereinafter, the inspection about the normality of the processing unit 21 that is performed before the inspection about the normality of the inspection target described above may be simply called a “pre-inspection”. Further, hereinafter, the inspection about the normality of the processing unit 21 that is performed after the inspection about the normality of the inspection target described above may be simply called a “post-inspection”.
Further, the processing unit 22 may execute the “pre-inspection” described above, with the current timing being a regular inspection execution timing as an “execution trigger”.
A second example embodiment relates to a specific example of an inspection about the normality of the first processing unit.
The virtual address acquisition unit 22A acquires a second virtual address which shows a memory area where an operation program of the processing unit 21 is stored in the memory 11 and which is used by the processing unit 21, the second virtual address corresponding to a first virtual address which shows the memory area and is used by the processing unit 21. For example, the processing unit 21 sends a physical address obtained by converting the first virtual address described above to the processing unit 22. Then, the virtual address acquisition unit 22A acquires the second virtual address described above by converting (mapping) the physical address sent from the processing unit 21 to the second address described above. Thereby, even if address spaces of the processing units 21 and 22 are different, the execution code acquisition unit 22B can certainly access the memory area described above. The conversion from the physical address to the second virtual address described above may be omitted in the case of an OS or a processor capable of accessing a memory directly using a physical address.
The execution code acquisition unit 22B accesses the memory area described above using the second virtual address acquired by the virtual address acquisition unit 22A (that is, scans the memory area described above) to acquire an execution code of the operation program of the processing unit 21.
The hash value calculation unit 22C calculates a hash value of the execution code based on the execution code acquired by the execution code acquisition unit 22B. An algorithm used for the calculation of the hash value is not especially limited and may be, for example, SHA1, SHA256 or the like.
The inspection processing execution unit 22D holds a correct hash value of the execution code of the operation program of the processing unit 21. The correct hash value may be calculated at the time of developing the processing device 10 and held in the inspection processing execution unit 22D or may be calculated by the hash value calculation unit 22C at startup of the processing device 10 and held in the inspection processing execution unit 22D. Since the inspection processing execution unit 22D operating in the secure environment 10B holds the correct hash value as described above, it is possible to prevent the correct hash value from being tampered with.
Then, the inspection processing execution unit 22D inspects the normality of the processing unit 21 based on the hash value calculated by the hash value calculation unit 22C and the correct hash value. For example, the inspection processing execution unit 22D judges that the processing unit 21 is normal (not tampered) if the hash value calculated by the hash value calculation unit 22C and the correct value match, and judges that the processing unit 21 is abnormal (tampered) if the two hash values do not match. By using the hash values as described above, it is possible to accurately inspect the normality of the processing unit 21.
If a result of a “post-inspection” of the processing unit 21 shows the processing unit 21 being abnormal, the processing unit 22 may discard a result of an inspection about the normality of an inspection target irrespective of the content of the result of the inspection.
A third example embodiment relates to variation of the “execution trigger” described above. Since the configuration of an electronic apparatus in the third example embodiment is the same as the configuration of the electronic apparatus 1 of the first and second example embodiments,
The processing unit 31 sends an “inspection request” to the processing unit 32 when detecting a particular event of an inspection target by monitoring the inspection target. The particular event may be, for example, starting of a process, opening of a file or the like. Or alternatively, the processing unit 31 may send the “inspection request” to the processing unit 32 when the current timing is a regular inspection request timing.
Further, when receiving a “request for an inspection of the inspection target” from the processing unit 32, the processing unit 31 sends an “information sending request” to the inspection target. In response to the information sending request, the inspection target sends information about the inspection target to the processing unit 31. Further, the processing unit 31 may acquire the information about the inspection target not from the inspection target but from the API of the OS or a memory.
Further, when acquiring the information about the inspection target sent from the inspection target, the processing unit 31 inspects the normality of the inspection target based on the information and sends a result of the inspection to the processing unit 32.
The processing unit 32 executes a “pre-inspection” of the processing unit 31, with receiving of the “inspection request” from the processing unit 31 as an execution trigger.
Further, if a result of the “pre-inspection” of the processing unit 31 shows the processing unit 31 being normal, the processing unit 32 sends the “request for an inspection of the inspection target” to the processing unit 31. If the result of the inspection about the normality of the processing unit 31 shows the processing unit 31 being abnormal, the processing unit 32 may execute, for example, control to restrict a processing operation in the normal environment 10A.
Further, when receiving a result of the inspection about the normality of the inspection target sent from the processing unit 31, the processing unit 32 executes a “post-inspection” of the processing unit 31.
Then, the processing unit 32 executes a process corresponding to a result of the “post-inspection” of the processing unit 31. For example, if the result of the “post-inspection” of the processing unit 31 shows the processing unit 31 being abnormal, the processing unit 32 may discard the result of the inspection of the inspection target received from the processing unit 31 irrespective of the content of the result of the inspection. Then, the processing unit 32 may execute, for example, control to restrict the processing operation in the normal environment 10A.
An example of a processing operation of the security management device 30 having the above configuration will be explained.
The processing unit (a security function) 31 sends address information showing a memory area in the memory 11 where an operation program of the processing unit 31 is stored to the processing unit (a security function) 32 (step S101). The sent address information is, for example, the physical address explained in the second example embodiment.
The processing unit 31 always monitors the execution environment (an inspection target) of a program such as the OS (step S102).
When detecting a particular event of the inspection target, the processing unit 31 sends an “inspection request” to the processing unit 32 (step S103).
When receiving the “inspection request” from the processing unit 31, the processing unit 32 execute an inspection about the normality of the processing unit 31 (step S104).
When a result of the inspection about the normality of the processing unit 31 shows the processing unit 31 being normal, the processing unit 32 sends a “request for an inspection of the inspection target” to the processing unit 31 (step S105).
When receiving the “request for an inspection of the inspection target” from the processing unit 32, the processing unit 31 sends an “information sending request” to the inspection target (step S106). Further, the processing unit 31 may acquire the information about the inspection target not from the inspection target but from the API of the OS or a memory.
When receiving the “information sending request” from the processing unit 31, the inspection target sends information about the inspection target to the processing unit 31 (step S107). If the processing unit 31 calls the API of the OS at step 106, the OS sends the information about the inspection target to the processing unit 31 at step S107.
When acquiring the information about the inspection target sent from the inspection target, the processing unit 31 inspects the normality of the inspection target based on the information (step S108) and sends a result of the inspection to the processing unit 32 (step S109).
When receiving the result of the inspection about the normality of the inspection target from the processing unit 31, the processing unit 32 executes the inspection about the normality of the processing unit 31 again (step S110).
The processing unit 32 executes a process corresponding to a result of the inspection about the normality of the processing unit 31 performed at step S110 (step S111).
Though, in the above explanation, the explanation has been made on the assumption that the processing unit 31 sends address information to the processing unit 32 only once before an inspection about the normality of the processing unit 31 by the processing unit 32, the present example embodiment is not limited thereto. For example, each time the inspection about the normality of the processing unit 31 by the processing unit 32 is performed, the processing unit 31 may send address information to the processing unit 32 before the inspection. For example, if the memory area of the operation program of the processing unit 31 changes, the processing unit 31 can send address information for each inspection. If the memory area does not change, the processing unit 31 can send address information only once before the first inspection.
A fourth example embodiment relates to variation of a trigger for an “inspection request” being sent. Since the configuration of an electronic apparatus in the fourth example embodiment is the same as the configuration of the electronic apparatus 1 of the first and second example embodiments,
In the security management device 30 of the fourth example embodiment, the processing unit 31 sends an “inspection request” to the processing unit 32 when receiving an “execution permission request” from an inspection target. That is, the processing unit 31 of the fourth example embodiment is different in the trigger for sending the “inspection request” to the processing unit 32 when compared with the third example embodiment.
Further, when receiving an “execution permission” from the processing unit 32, the processing unit 31 sends the received execution permission to the execution environment (the inspection target).
The processing unit 32 executes a process corresponding to a result of a “post-inspection” of the processing unit 31. For example, when a “permission condition” is satisfied, the processing unit 32 sends the “execution permission” to the processing unit 31. The “permission condition” is, for example, that a result of a “post-inspection” of the processing unit 31 shows the processing unit 31 being normal, and a result of an inspection sent from the processing unit 31 shows an inspection target being normal.
An example of a processing operation of the security management device 30 having the above configuration will be explained.
An inspection target sends an “execution permission request” for a particular function to the processing unit 31 at a stage before executing the particular function (step S201). When receiving the execution permission request, the processing unit 31 sends an “inspection request” to the processing unit 32 (step S103).
When the “permission condition” described above is satisfied, the processing unit 32 sends an “execution permission” to the processing unit 31 (step S202).
When receiving the “execution permission” from the processing unit 32, the processing unit 31 sends the execution permission to the inspection target (step S203).
When receiving the execution permission via the processing unit 31, the inspection target executes the particular function described above (step S204).
A fifth example embodiment relates to variation of the “execution trigger” described above. Since the configuration of an electronic apparatus in the fifth example embodiment is the same as the configuration of the electronic apparatus 1 of the first and second example embodiments,
In the security management device 30 of the fifth example embodiment, the processing unit 32 executes a “pre-inspection” of the processing unit 31, with receiving of a “request for an inspection of an inspection target” from a security management server 2 (see
If a result of the “pre-inspection” of the processing unit 31 shows the processing unit 31 being normal, the processing unit 32 sends the “request for an inspection of an inspection target” to the processing unit 31. If a result of the inspection about the normality of the processing unit 31 shows the processing unit 31 being abnormal, the processing unit 32 may execute, for example, control to restrict a processing operation in the normal environment 10A. In this case, the processing unit 32 may report the result of the inspection about the normality of the processing unit 31 to the security management server 2. The report is transmitted via the communication machine 13 shown in
Further, when receiving a result of an inspection about the normality of the inspection target sent from the processing unit 31, the processing unit 32 executes a “post-inspection” of the processing unit 31.
Then, the processing unit 32 reports results of the inspection about the normality of the processing unit 31 performed before and after the inspection about the normality of the inspection target is performed (that is, the results of the “pre-inspection” and the “post-inspection) and the result of the inspection sent from the processing unit 31 to the security management server 2. The report is transmitted via the communication machine 13 shown in
An example of a processing operation of the security management device 30 having the above configuration will be explained.
A security management function of the security management server 2 transmits a “request for an inspection of an inspection target” to the electronic apparatus 1 (step S301). For example, the electronic apparatus 1 and the security management server 2 are connected via a network, and the “request for an inspection of an inspection target” may be transmitted to the electronic apparatus 1 via the network. The “request for an inspection of an inspection target” is received by the communication machine 13 of the electronic apparatus 1, and received by the processing unit 32 via the input/output interface 12.
The processing unit 32 transmits results of inspections about the normality of the processing unit 31 obtained at steps S104 and S110, and a result of an inspection transmitted from the processing unit 31 at step S109 to the security management server 2 (step S302).
Though explanation has been made on the assumption that the processing unit 32 reports results of a “pre-inspection” and a “post-inspection” of the processing unit 31 and a result of an inspection sent from the processing unit 31 to the security management server 2 in the above explanation, the present example embodiment is not limited thereto. For example, the processing unit 32 may report the result of the “post-inspection” of the processing unit 31 and the result of the inspection sent from the processing unit 31 to the security management server 2. That is, the result of the “pre-inspection” of the processing unit 31 may not be reported.
In the third to fifth example embodiments, explanation has been made on the assumption that the processing unit 31 (the first processing unit) executes an inspection about the normality of an inspection target and transmits an inspection result to the processing unit 32 (the second processing unit). In a sixth example embodiment, the first processing unit sends information about an inspection target received from the inspection target to the second processing unit without performing an inspection about the normality of the inspection target. Then, the second processing unit executes the inspection about the normality of the inspection target based on the information about the inspection target received from the first processing unit. The method of the sixth example embodiment is applicable to any of the third to fifth example embodiments. Here, explanation will be made on a case where the method is applied to the third example embodiment as an example. Since the configuration of an electronic apparatus in the sixth example embodiment is the same as the configuration of the electronic apparatus 1 of the first and second example embodiments,
In the security management device 30 of the sixth example embodiment, when acquiring information about an inspection target sent from the inspection target, the processing unit 31 sends the information to the processing unit 32. Further, the processing unit 31 may acquire the information about the inspection target not from the inspection target but from the API of the OS or a memory.
In the security management device 30 of the sixth example embodiment, when acquiring the information about the inspection target from the processing unit 31, the processing unit 32 inspects the normality of the inspection target based on the information. Then, the processing unit 32 executes an inspection about the normality of the processing unit 31 again.
When acquiring information about an inspection target sent from the inspection target, the processing unit 31 sends the information to the processing unit 32 (step S401).
When acquiring the information about the inspection target from the processing unit 31, the processing unit 32 inspects the normality of the inspection target based on the information (step S402). Then, the processing unit 32 executes an inspection about the normality of the processing unit 31 again (step S110).
As shown in
The processing units 21, 22, 31 and 32 of the security management devices 20 and 30 of the first to sixth example embodiments may be realized by the processor 10 reading and executing the program stored in the memory 11. The program can be stored in various types of non-transitory computer-readable media to be provided for the security management devices 20 and 30. Examples of the non-transitory computer-readable media include magnetic recording media (for example, a flexible disk, a magnetic tape and a hard disk drive) and a magneto-optical recording media (for example, a magneto-optical disk). Furthermore, examples of the non-transitory computer-readable media include a CD-ROM (read-only memory), a CD-R and a CD-R/W. Furthermore, examples of the non-transitory computer-readable media include semiconductor memories. The semiconductor memories include, for example, a mask ROM, a PROM (programmable ROM), an EPROM (erasable PROM), a flash ROM and a RAM (random access memory). Further, the program may be provided for the security management devices 20 and 30 by various types of transitory computer-readable media. Examples of the transitory computer-readable media include an electric signal, an optical signal and an electromagnetic wave. The transitory computer-readable media can provide the program for the security management devices 20 and 30 via a wired communication channel such as an electric wire and an optical fiber or a wireless communication channel.
The invention of the present application has been explained with reference to example embodiments. The invention of the present application, however, is not limited to the above. Various changes that one skilled in the art can understand within the scope of the invention can be made in the configurations and details of the invention of the present application.
Part or all of the above example embodiments can be written like the supplementary notes below but are not limited thereto.
A security management device configured to manage security of a processing device having a normal environment and a secure environment, the security management device comprising:
first processing means for acquiring information about an inspection target including a program executed in an execution environment included in the normal environment, the inspection target being a target of an inspection about normality, the first processing means operating in the normal environment; and
second processing means for inspecting normality of the first processing means after the inspection about the normality of the inspection target based on the acquired information about the inspection target is performed, the second processing means operating in the secure environment.
The security management device according to Supplementary Note 1, wherein the second processing means comprises:
virtual address acquisition means for acquiring a second virtual address which shows a memory area where an operation program of the first processing means is stored in a memory and which is used by the second processing means, the second virtual address corresponding to a first virtual address which shows the memory area and is used by the first processing means;
execution code acquisition means for accessing the memory area using the acquired second virtual address to acquire an execution code of the operation program;
hash value calculation means for, based on the acquired execution code, calculating a hash value of the execution code; and
inspection processing execution means for inspecting the normality of the first processing means based on the calculated hash value and a correct hash value of the execution code.
The security management device according to Supplementary Note 2, wherein
the first processing means sends a physical address obtained by converting the first virtual address to the second processing means; and
the virtual address acquisition means converts the physical address sent from the first processing means to the second virtual address.
The security management device according to any one of Supplementary Notes 1 to 3, wherein the second processing means further inspects the normality of the first processing means before the inspection about the normality of the inspection target is performed.
The security management device according to Supplementary Note 4, wherein the second processing means executes the inspection about the normality of the first processing means performed before the inspection about the normality of the inspection target is performed, with a current timing being a regular inspection execution timing as an execution trigger.
The security management device according to Supplementary Note 4, wherein the second processing means executes the inspection about the normality of the first processing means performed before the inspection about the normality of the inspection target is performed, with receiving of an inspection request from the first processing means as an execution trigger.
The security management device according to Supplementary Note 6, wherein the first processing means sends the inspection request to the second processing means when detecting a particular event of the inspection target by monitoring the inspection target or when a current timing is a regular inspection request timing.
The security management device according to any one of Supplementary Notes 1 to 7, wherein
the first processing means inspects the normality of the inspection target based on the acquired information about the inspection target and sends a result of the inspection to the second processing means; and
if a result of the inspection about the normality of the first processing means performed after the inspection about the normality of the inspection target is performed shows the first processing means being abnormal, the second processing means discards the result of the inspection sent from the first processing means irrespective of content of the result of the inspection.
The security management device according to Supplementary Note 6, wherein the first processing means sends the inspection request to the second processing means when receiving an execution permission request from the inspection target.
The security management device according to Supplementary Note 9, wherein
the first processing means inspects the normality of the inspection target based on the acquired information about the inspection target and sends a result of the inspection to the second processing means; and
if a result of the inspection about the normality of the first processing means performed after the inspection about the normality of the inspection target is performed shows the first processing means being abnormal, the second processing means discards the result of the inspection sent from the first processing means irrespective of content of the result of the inspection.
The security management device according to Supplementary Note 10, wherein, if the result of the inspection about the normality of the first processing means performed after the inspection about the normality of the inspection target is performed shows the first processing means being normal, and the result of the inspection sent from the first processing means shows the inspection target being normal, the second processing means sends execution permission to the inspection target.
The security management device according to Supplementary Note 4, wherein the second processing means executes the inspection about the normality of the first processing means performed before the inspection about the normality of the inspection target is performed, with receiving of an inspection request from a security management server existing outside the processing device as an execution trigger.
The security management device according to Supplementary Note 12, wherein
the first processing means inspects the normality of the inspection target based on the acquired information about the inspection target and sends a result of the inspection to the second processing means; and
the second processing means sends results of the inspection about the normality of the first processing means performed before and after the inspection about the normality of the inspection target is performed, and the result of the inspection sent from the first processing means to the security management server.
The security management device according to any one of Supplementary Notes 1 to 7, wherein
the first processing means sends the acquired information about the inspection target to the second processing means; and
the second processing means inspects the normality of the inspection target based on the information about the inspection target sent from the first processing means, and, if a result of the inspection about the normality of the first processing means performed after the inspection about the normality of the inspection target is performed shows the first processing means being abnormal, discards a result of the inspection about the normality of the inspection target irrespective of content of the result of the inspection.
The security management device according to Supplementary Note 9, wherein
the first processing means sends the acquired information about the inspection target to the second processing means; and
the second processing means inspects the normality of the inspection target based on the information about the inspection target sent from the first processing means, and, if a result of the inspection about the normality of the first processing means performed after the inspection about the normality of the inspection target is performed shows the first processing means being abnormal, discards a result of the inspection about the normality of the inspection target irrespective of content of the result of the inspection.
The security management device according to Supplementary Note 15, wherein, if the result of the inspection about the normality of the first processing means performed after the inspection about the normality of the inspection target is performed shows the first processing means being normal, and the result of the inspection about the normality of the inspection target shows the inspection target being normal, the second processing means sends execution permission to the inspection target.
The security management device according to Supplementary Note 12, wherein
the first processing means sends the acquired information about the inspection target to the second processing means; and
the second processing means inspects the normality of the inspection target based on the information about the inspection target sent from the first processing means, and sends results of the inspection about the normality of the first processing means performed before and after the inspection about the normality of the inspection target is performed and a result of the inspection about the normality of the inspection target to the security management server.
A processing device comprising the security management device according to any one of Supplementary Notes 1 to 17.
A security management method executed by a security management device configured to manage security of a processing device having a normal environment and a secure environment, wherein
first processing means of the security management device operating in the normal environment acquires information about an inspection target including a program executed in an execution environment included in the normal environment, the inspection target being a target of an inspection about normality; and
second processing means of the security management device operating in the secure environment inspects normality of the first processing means after the inspection about the normality of the inspection target based on the acquired information about the inspection target is performed.
A non-transitory computer-readable medium storing a program, the program causing a security management device configured to manage security of a processing device having a normal environment and a secure environment to execute the processes of:
first processing means of the security management device operating in the normal environment acquiring information about an inspection target including a program executed in an execution environment included in the normal environment, the inspection target being a target of an inspection about normality; and
second processing means of the security management device operating in the secure environment inspecting normality of the first processing means after the inspection about the normality of the inspection target based on the acquired information about the inspection target is performed.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2019/028680 | 7/22/2019 | WO |