Abstract:
PROBLEM TO BE SOLVED: To take appropriate actions when an anomaly is detected in industrial control systems.SOLUTION: A communication control system for controlling communication among multiple industrial control systems connected via a network includes: a communication relay apparatus for relaying communication between at least two industrial control systems; a monitoring section for monitoring the multiple industrial control systems; and a control section for switching, if the monitoring section detects an anomaly from at least one of the industrial control systems, communication between the industrial control system with the anomaly detected and another industrial control system so that the communication is performed via the communication relay apparatus.
Abstract:
PROBLEM TO BE SOLVED: To perform access control based on a policy such that harmful processing is not performed to a file of a Web server from an unreliable site by a script such as JavaScript included in a content input from the outside. SOLUTION: By performing the access control based on origin of a portion of a document in each portion of the document inside the HTML document constituting a Web page, it is prevented that the content provided by an ill-intentioned user or a server unauthorizedly performs reading/writing to another portion of the HTML document. That is, by automatically attaching a label expressing a domain that is the origin of the content (including a JavaScript program) to the content on the server side, the access control (cross domain access control) astride a domain on a client side becomes possible. A set of the content, metadata, and the access control policy is sent from the server side to the client side. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To more efficiently sort the private data held by each holder than in the prior art without being known by other holders. SOLUTION: The system sorts a plurality of private data (PD) a plurality of parties hold every kind. Each of the plurality of parties has an encrypt key commutable about the order in a multiple encryption. At every kind of already sorted PD, the system selects typical parties P1, P3 of parties holding the kind of PD, exchanges encrypted data of each party's PD between P1, P3 and a target party P5, encrypts each encrypted data obtained by P5 with an encrypt key of P5 to obtain data 1, further encrypts the encrypted data obtained by P1, P3 to obtain data 2 using encrypt keys of P1, P3, and decides that P1, P3 and P5 have the same kind of PD if the data 1 of P1, P3 agree with the data 2. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a security function using electronic signature without the need to change application programs, by mounting means, which conduct electronic signature, verification, and logging of messages received/transmitted via networks, in the form of a proxy server. SOLUTION: An application 10, which conducts data processing, and a signature proxy server 20 connected with the application 10 via a LAN 100 are provided. The signature proxy server 20 intercepts message communication from the application 10 to external devices of the LAN 100, conducts electronic signature on message documents in this message communication, and transmits message documents attached with the electronic signature to a device of transmission destination.
Abstract:
A medical guide service for a doctor, a patient, a general user, and a medical institution. The medical guide system may include a unit that creates medical record data and a unit that extracts the medical record data for each patient. The unit that extracts the medical record data uses examination data before a predetermined dividing point in a chronological order as before-dividing-point data and treatment data after the predetermined dividing point in the chronological order as after-dividing-point data. A unit extracts a treatment pattern from the after-dividing-point data. Another unit derives a rule that associates the examination results with the treatment pattern from the treatment pattern and the before-dividing-point data.
Abstract:
PROBLEM TO BE SOLVED: To distinguish between an attack with unauthorized access and a change of behavior resulted from an authorized software update to information processing units.SOLUTION: An inspection apparatus is used for inspecting an information processing unit to which software updates are applied. The inspection apparatus includes a collection component configured to collect behavior, for each of a plurality of software updates, of the information processing unit to which one software update is applied. The apparatus also includes a determination component configured to compare the behaviors collected for each of the plurality of software updates to one another to determine whether the behavior of the information processing unit after the one software update is applied thereto is normal.
Abstract:
PROBLEM TO BE SOLVED: To provide a technique by which trace data derived from record data collected from a V2X communication system is disclosed only when the trace data satisfies a certain condition.SOLUTION: In an inventive technique for controlling the disclosure of trace data related to traveling objects, ranges wand/or transit time ranges (s, e) (j is an integer of 1, 2, ..., L) of the ranges ware calculated at each L regions of a certain range, such that the condition that the L regions are passed within a predetermined period of time is satisfied and k (k is an integer of 2 or more) or more traveling objects exist, and according to that the traveling objects move in the calculated ranges win the calculated transit time ranges (s, e), the calculated trace data or a part of the trace data is returned as a search result.
Abstract:
PROBLEM TO BE SOLVED: To provide an access control method and a server device for changing response information from data stored in a network resource or access request information to the data on the basis of an access control value. SOLUTION: An access control method is performed by a network server to which a plurality of user client terminals are connected. In the access control method, in response to accesses from users to data stored in the network resource, the access control method searches a plurality of access control rules prepared in advance so as to control accesses from the users and each including an access control value which has one of a finite integer number of values, based on at least either of information on the user or information on the data. Then, on the basis of the searched access control rule, the access control value is determined. Thereafter, response information from the data or access request information to the data is changed on the basis of the determined access control value. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To save the user's labor and time for management by allowing a user (customer) to leav his or her household account book information on a server side and to make a financial institution, etc., as the server side positively use the customer's household account book information for advertisement. SOLUTION: This hosting service system for household account book information is equipped with a user terminal 8 which is connected to a network and a service provider (financial institution) 10 which is connected through the network and provides household account book information 12 by users including plural items to the user terminal 8 and this service provider (financial institution) 10 generates additional information based upon the analysis result of the household account book information 12 by an information processing module 15 for specific items of the household account book information 12 by the users, adds the additional information to the household account book information 12, and provides them to the user terminal 8.
Abstract:
[Document type]Abstract [Title of the Invention]ANOMALY DETECTION SYSTEM FOR DETECTING ANOMALY IN MULTIPLE CONTROL SYSTEMS[Abstract][Problem to be Solved]To allow multiple industrial control systems to cooperate to detect an anomaly.[Solution]An anomaly detection system for detecting an anomaly in a plurality of control systems comprises a plurality of analysis devices that are associated with the respective control systems and that acquire an event occurring in an associated control system and analyze the event to determine whether there is an anomaly. A first analysis device among the plurality of analysis devices determines whether an event occurring in the associated control system is to be indicated to a second analysis device among the plurality of analysis devices, and the second analysis device determines that there is an anomaly on condition that the event indicated by the first analysis device has correlation with an event indicated by an analysis device other than the first analysis device. [Selected Drawing] Figure 2