Security system design supporting method

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S003000, C713S166000, C717S104000, C717S106000, C717S110000, C717S144000

Reexamination Certificate

active

07089581

ABSTRACT:
A security system design supporting tool and method are disclosed, in which security requirements (PP) and security specifications (ST) used for designing a product or a system (TOE) based on CC requirements can be prepared efficiently and uniformly even by ordinary designers other than specialists. In a security system design supporting method, registered PPs and past PP/ST generation cases are so structured as to reuse and/or reference as templates, a draft is automatically generated, and the draft thus generated is additionally modified or corrected by partial automatic generation utilizing a database of past generation cases and partial case accumulated in the generation process thereof.

REFERENCES:
patent: 5588056 (1996-12-01), Ganesan
patent: 5850516 (1998-12-01), Schneier
patent: 6405364 (2002-06-01), Bowman-Amuah
patent: 6484261 (2002-11-01), Wiegel
patent: 1065 861 (1999-06-01), None
Automated Password Generator (APG), SIPS PUB 181, Oct. 5, 1993, pp. 1-9 downloaded from the Internet, Feb. 2, 2005.
Information System Security Design Methods: Implementation for Information Systems development, Richard Baskerville, ACM Computing Surveys, vol. 25, No. 4, pp. 375-414, Dec. 1993.
ISO/SC27 N2333 Guide for Production of Protection Profiles and Security Targets Version 0.8, Jul., 1999.
“Information Technology security evaluation standards”, pp. 26-33, ISO/IEC 15408 Seminar Materials (Sep. 8, 1999, sponsored by Information Promotion Agency, Security Center in Japan).
“Common Criteria: An Introduction”, pp. 1-19.
“Common Criteria: Common Criteria for Information Technology Security Evaluation User Guide” Oct. 1999, pp. 1-41.
NIAP-National Information Assurance Partnership, Protection Profiles, Jan. 4, 2006.
The Common Criteria: Evaluation and Validation Scheme Validated Protection Profiles, Jan. 4, 2006, pp. 1-5.
Common Evaluation Methodology for Information Technology Security, Part 1, Introduction and General Model, Jan. 11, 1997, pp. 1-24.
Common Criteria: Common Methodology for Information Technology Security Evaluation, Aug. 2005, pp. 2-360.
Common Criteria: Common Criteria for Information Technology Security Evaluation, Part 3, Security Assurance Requirements, Aug. 2005, pp. 2-196.
Common Criteria: Common Criteria: Common Criteria for Information Technology Security Evaluation: Part 2: Security Functional Requirements, Aug. 2005, pp. 2-325.
Common Criteria: Common Criteria for Information Technology Security Evaluation: Part 1: Introduction and General Model, Aug. 2005, pp. 2-61.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security system design supporting method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security system design supporting method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security system design supporting method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3605318

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.