網際網路的興起帶來了龐大的商機,也帶來了巨大的安全隱憂,美伊波斯灣戰爭,開啟人類史上第四軍種的參戰,資訊戰部隊-網軍,在波斯灣戰爭中美軍透過埋藏在印表機中的病毒,阻塞網路破壞了伊拉克防空砲的網路控制系統,讓空軍在不受威脅下得以順利進入伊拉克,也因此在全球掀起了一股資訊戰熱潮。 海峽兩岸網軍透過入侵行為而竊取國家機密情報與文件,事件層出不窮,本研究透過入侵預防系統,結合專利知識庫,進行兩岸資安能量的分析,透過專利知識庫的檢索分析,繪製出專利地圖,技術與功效矩陣,有規則有計畫性的進行海峽兩岸,偵測與防禦系統的專利分析,透過功效矩陣分析得知,在發展歷程中有三種不同的發展組合,一為網路偵測與防禦,二為網路偵測與系統防禦,三為系統偵測與防禦,經由這三種不同發展的組合找到兩岸間現階段防禦方式的差異及防護缺口,量化出海峽兩岸各自防禦的重點。 本研究發現,兩岸在入侵預防系統屬於技術成長期,結論如下: 1. 入侵預防系統的發展核心仍然以偵測入侵與防禦為兩大關鍵技術。 2. 中華民國專利數量最多為系統偵測與防禦,中國大陸專利數量最多為網路偵測與防禦,兩岸各自發展重點不同。 3. 中國大陸市場規模遠大於中華民國,專利權人中以中國大陸的國家別最多,吸引五個不同國家前來申請高於我國所吸引的兩個國家,專利數量142筆也高於我國116筆。 4. 美國積極佈局於兩岸的資安相關專利,成為兩岸最大專利權外商公司。 5. 資安自主化與國家安全息息相關,其中以中國大陸較難達到目標,我國次之,其因為中國大陸很多資安專利均掌握在外商公司手中,我國則次之。
The rise of the Internet instigated enormous business opportunities as well as security concerns. According to reports, the Gulf War between the United States and Iraq marked the first time for human beings to involve the fourth army in combat. Information warfare unit – cyber army – blocked the network controlling system for Iraqi anti-aircraft guns through the use of viruses embedded in printers. This sabotage operation eventually allowed American Air Force to enter Iraqi sky without worry. And hence stimulated the formidable wave of information warfare around the world. Cyber armies on both sides of the Taiwan Strait have usurped intelligence and documents involving government secrets through the use of network intrusion. This study tries to combine patent knowledgebase with intrusion prevention systems to analyze the power possessed by both parties in the field of information security. The author will retrieve and parse the patent knowledgebase to plot a patent map as well as technology/efficiency matrixes, so that a systematic, orchestrated patent analysis for detection and protection systems between Taiwan and China is possible. The author found, through the analysis of efficiency matrix, that there are three different combinations of development in the development process: network detection and prevention; network detection and system prevention; system detection and prevention. By studying the three different combinations of development, it is possible to pinpoint the distinctions and vulnerabilities of both parties’ current defense, and to provide metrics so that both parties’ emphases in security can be visualized. The study found that Taiwan and China fall into the phase of technology growth in the area of intrusion prevention systems. My conclusions are: 1. The core of the roadmap of intrusion prevention systems can still be summed up by two key technologies – intrusion detection, and prevention. 2. Taiwan has more patents involving system detention and prevention, while China network detention and prevention. This indicates different focuses of development for both parties. 3. The market size in China is much bigger than in Taiwan. China also has more patent assignees. It has been able to attract five countries to apply for patents locally, while only two countries have been interested in doing the same thing in Taiwan. China also has 142 patents; more than 116 for Taiwan. 4. The United States has been the most active in its information security patent deployment in Taiwan and China. It is also the biggest foreign player in patent rights on both sides. 5. Autonomy in information security matters national security. Compared with Taiwan, China has more difficulties in achieving this target, since a major portion of such patents is in the hands of foreign companies.