Abstract:
PROBLEM TO BE SOLVED: To prevent stack smashing attack due to buffer overflow on a stack. SOLUTION: This memory device is used by a computer system. It is provided with an area to store a return address 230 to a call origin of a function under execution, an area to store a previous frame pointer 22 to the call origin of the function under execution and an area to be located in the rear of the area to store the return address 230 and the area to store the previous frame pointer 220 and to store local variables as memory patterns of this memory device after invoking the function when this computer system executes programs. The area to store the local variables stores a guard variable 212 as an object to confirm whether or not it is destroyed in a return processing of the function under execution before this arrangement 211 when the arrangement 211 is stored in the area to store the local variables.
Abstract:
PROBLEM TO BE SOLVED: To detect and analyze such a relation that each service on a network is dependent on each other. SOLUTION: An analysis system analyzing the dependence relation between the server programs of a computer system comprises: a transaction detection section detecting a transaction being processing for the service done after a plurality of respective server programs are called from any one of other server programs; a child transaction candidate detection section detecting the candidate of a child transaction called in the transaction for each detected transaction; and a call frequency calculation section outputting service calling frequency presumed service-asking frequency by calling the other respective server programs by each server program based on the service detected by making correspondence to each transaction and the service detected by making correspondence to the candidate of the child transaction of the transaction. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To monitor communications via a host computer placed under the management of a security means such as a fire-wall and a filter function of a router. SOLUTION: A packet input means which is connected to a prescribed point of a network by a network interface and inputs a communication packet flowing through the point, and a matching means which executes matching of two packet streams respectively constituted of inputted communication packets in real time whenever the communication packet is inputted, are provided. And, when the two packet streams are very similar to each other, it is assumed that it is highly likely to be intruded and attacked, and it is notified. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To enable a system device to certify an external storage device, by inhibiting the external storage device from operating, except the combination with specified system devices. SOLUTION: This certification method is performed between a secure HDD 20 for performing the write and read of data and a set top box 10 for accessing this secure HDD 20; the set top box 10 transmits random numbers generated to the secure HDD 20, and the secure HDD 20 transmits the information, which is coded with a secret key, after performing processing under a certain rule to the transmitted random numbers to the set top box 10; and the set top box 10 decodes the received information, using a secrete key; and based on the decoded information, it recognizes that the processing has been conducted in conformity with a fixed rule, and the secure HDD 20 and the set top box 10 hold the same secret key with each other. COPYRIGHT: (C)2003,JPO
Abstract:
PROBLEM TO BE SOLVED: To search an unauthorized router 22 existing in the Intranet 10. SOLUTION: In the Intranet 10, a transmitting side router searcher 26 transmits an IP packet for inspection to a network connection apparatus being inspected. Source and destination of the IP packet for inspection have the IP address of a receiving side router searcher 28 and the network connection apparatus being inspected, respectively, and the data part is loaded with a TCP packet having specified ID information. The network connection apparatus being inspected generates a reply IP packet for a received IP packet for inspection. Since the source and destination of the reply IP packet are the source and the source of the IP packet for inspection, respectively, the reply IP packet is received by the receiving side router searcher 28 of the Internet 19 when the network connection apparatus being inspected is a router.
Abstract:
PROBLEM TO BE SOLVED: To remove the recalculation of a waste route and to attempt to accelerate automatic wiring process by inspecting the capacity of a critical cut during route searching and executing the wire route searching for satisfying the accurate route capacity. SOLUTION: The capacity Cap(C) of a critical cut is examined (510), the sum region of the regions for crossing the cut is considered, and the sum SCap (L) or SCap (R) of the side for constituting the boundary of the sum region is obtained (520). In this case, if Cap(C)
Abstract:
PURPOSE: To execute a numerical plan problem in a system where the intention of a planner can reflect. CONSTITUTION: The variable of the numerical plan problem is graphically displayed on a display device 10. A graphics object is operated by a mouse 11 and an inductive restriction is added to the corresponding variable and the value of the corresponding variable is changed with an operation for the graphics object. The planner of the inductive restriction which is set for the graphics object can be recognized with color display. A new solution is obtained by the method 6 of operation research with a distance with the previous solution as a target function based on a restriction peculiar to the problem and the inductive restriction.
Abstract:
PURPOSE: To improve operability by calculating the position of center of the pupil by performing image processing to data from a camera, increasing the lightness of a concerned point estimated from that value and data for correction on a screen, measuring and correlating the change of a pupil area at that time. CONSTITUTION: A display device 1 is a device for displaying characters or the like on the screen, and a camera part 2 samples the video data of image of an eye from the video camera. A pupil center position calculation part 3 calculates the position of center of the pupil of a user by performing image processing to the video data from the camera part 2. A pupil area measuring part 4 calculates the area of the pupil by performing image processing to the video data from the camera part 2, and an estimation part 5 calculates the concerned point on the screen from the calculated position of center of the pupil and these data for correction. Then, the data for correction required for the following estimation of a glance are stored from the calculated position of center of the pupil and data provided by the change of lightness. Then, a brightness control part 6 changes the brightness at the position of the estimated concerned point on the screen.
Abstract:
PROBLEM TO BE SOLVED: To detect abnormity online by monitoring a system wherein a plurality of computers in a web system or the like are operating in correlation with each other. SOLUTION: Each of the plurality of computers collects the transactions of services for another computer and calculates a correlation matrix between nodes in the system in accordance with the transactions and obtains a feature vector showing the activity balance of nodes from the correlation matrix. The feature vector is monitored by using a probability model to detect transition to an abnormal state. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To obtain a method for tracking an access chain which does not depend on the data contents of a packet and its system. SOLUTION: The log data of the packet coming in and going out a network are stored in a log box. In such a case, the data size and detection time of the packet are recorded. When illegal access is made to a target computer, an illegal access chain is tracked on the basis of the log information. The access chain tracking is performed as follows. The change of the packet data size at the time in a 1st connection and the change of the packet data size at the time in a 2nd connection are calculated from the log data. The shapes of graphs formed by these sequences are compared and when the shapes are similar, the connections are decided as being included in the same chain.