MEMORY DEVICE, STACK PROTECTION SYSTEM, COMPUTER SYSTEM, COMPILER, STACK PROTECTING METHOD, STORAGE MEDIUM AND PROGRAM TRANSMITTER

    公开(公告)号:JP2001216161A

    公开(公告)日:2001-08-10

    申请号:JP2000028358

    申请日:2000-02-04

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To prevent stack smashing attack due to buffer overflow on a stack. SOLUTION: This memory device is used by a computer system. It is provided with an area to store a return address 230 to a call origin of a function under execution, an area to store a previous frame pointer 22 to the call origin of the function under execution and an area to be located in the rear of the area to store the return address 230 and the area to store the previous frame pointer 220 and to store local variables as memory patterns of this memory device after invoking the function when this computer system executes programs. The area to store the local variables stores a guard variable 212 as an object to confirm whether or not it is destroyed in a return processing of the function under execution before this arrangement 211 when the arrangement 211 is stored in the area to store the local variables.

    Analysis system, analysis method, analysis program, and recording medium
    2.
    发明专利
    Analysis system, analysis method, analysis program, and recording medium 有权
    分析系统,分析方法,分析程序和记录介质

    公开(公告)号:JP2005190277A

    公开(公告)日:2005-07-14

    申请号:JP2003432337

    申请日:2003-12-26

    CPC classification number: G06F11/3495 H04L69/16 H04L69/161 H04L69/22

    Abstract: PROBLEM TO BE SOLVED: To detect and analyze such a relation that each service on a network is dependent on each other. SOLUTION: An analysis system analyzing the dependence relation between the server programs of a computer system comprises: a transaction detection section detecting a transaction being processing for the service done after a plurality of respective server programs are called from any one of other server programs; a child transaction candidate detection section detecting the candidate of a child transaction called in the transaction for each detected transaction; and a call frequency calculation section outputting service calling frequency presumed service-asking frequency by calling the other respective server programs by each server program based on the service detected by making correspondence to each transaction and the service detected by making correspondence to the candidate of the child transaction of the transaction. COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:检测和分析网络上的每个服务彼此依赖的关系。 解决方案:分析计算机系统的服务器程序之间的依赖关系的分析系统包括:事务检测部分,检测在从其他服务器中的任一个调用多个相应的服务器程序之后完成的服务的处理 程式; 子事务候选检测部分检测针对每个检测到的事务在事务中调用的子事务的候选; 以及呼叫频率计算部分,通过基于通过对每个交易进行通信而检测到的服务和通过与所述儿童的候选者进行通信而检测到的服务,通过每个服务器程序调用其他各个服务器程序来输出服务呼叫频率推定的服务请求频率 交易交易。 版权所有(C)2005,JPO&NCIPI

    External storage device and certification method conducted between the external storage device and the system device, certification system, computer device and system device
    4.
    发明专利
    External storage device and certification method conducted between the external storage device and the system device, certification system, computer device and system device 有权
    外部存储设备和外部存储设备与系统设备之间的认证方法,认证系统,计算机设备和系统设备

    公开(公告)号:JP2003018151A

    公开(公告)日:2003-01-17

    申请号:JP2001191828

    申请日:2001-06-25

    Abstract: PROBLEM TO BE SOLVED: To enable a system device to certify an external storage device, by inhibiting the external storage device from operating, except the combination with specified system devices.
    SOLUTION: This certification method is performed between a secure HDD 20 for performing the write and read of data and a set top box 10 for accessing this secure HDD 20; the set top box 10 transmits random numbers generated to the secure HDD 20, and the secure HDD 20 transmits the information, which is coded with a secret key, after performing processing under a certain rule to the transmitted random numbers to the set top box 10; and the set top box 10 decodes the received information, using a secrete key; and based on the decoded information, it recognizes that the processing has been conducted in conformity with a fixed rule, and the secure HDD 20 and the set top box 10 hold the same secret key with each other.
    COPYRIGHT: (C)2003,JPO

    Abstract translation: 要解决的问题:除了与指定的系统设备的组合之外,通过禁止外部存储设备的操作,使系统设备能够验证外部存储设备。 解决方案:该认证方法在用于执行数据的写入和读取的安全HDD 20和用于访问该安全HDD 20的机顶盒10之间执行; 机顶盒10将生成的随机数发送到安全HDD 20,并且安全HDD 20在以特定规则执行处理之后,将其发送的随机数发送到机顶盒10 ; 并且机顶盒10使用分密密钥解码所接收的信息; 并且基于解码的信息,它识别出已经按照固定规则进行了处理,并且安全HDD 20和机顶盒10彼此保持相同的秘密密钥。

    SYSTEM, METHOD AND PROGRAM FOR SEARCHING ROUTER

    公开(公告)号:JP2002344481A

    公开(公告)日:2002-11-29

    申请号:JP2001121695

    申请日:2001-04-19

    Applicant: IBM

    Inventor: ETO HIROAKI

    Abstract: PROBLEM TO BE SOLVED: To search an unauthorized router 22 existing in the Intranet 10. SOLUTION: In the Intranet 10, a transmitting side router searcher 26 transmits an IP packet for inspection to a network connection apparatus being inspected. Source and destination of the IP packet for inspection have the IP address of a receiving side router searcher 28 and the network connection apparatus being inspected, respectively, and the data part is loaded with a TCP packet having specified ID information. The network connection apparatus being inspected generates a reply IP packet for a received IP packet for inspection. Since the source and destination of the reply IP packet are the source and the source of the IP packet for inspection, respectively, the reply IP packet is received by the receiving side router searcher 28 of the Internet 19 when the network connection apparatus being inspected is a router.

    APPARATUS AND METHOD FOR SOLVING PLANNING PROBLEM FOR NUMERICAL VALUE

    公开(公告)号:JPH04347763A

    公开(公告)日:1992-12-02

    申请号:JP14071091

    申请日:1991-05-17

    Applicant: IBM

    Abstract: PURPOSE: To execute a numerical plan problem in a system where the intention of a planner can reflect. CONSTITUTION: The variable of the numerical plan problem is graphically displayed on a display device 10. A graphics object is operated by a mouse 11 and an inductive restriction is added to the corresponding variable and the value of the corresponding variable is changed with an operation for the graphics object. The planner of the inductive restriction which is set for the graphics object can be recognized with color display. A new solution is obtained by the method 6 of operation research with a distance with the previous solution as a target function based on a restriction peculiar to the problem and the inductive restriction.

    ESTIMATION DEVICE OF CLOSELY OBSERVED POINT

    公开(公告)号:JPH0720987A

    公开(公告)日:1995-01-24

    申请号:JP14899593

    申请日:1993-06-21

    Applicant: IBM

    Abstract: PURPOSE: To improve operability by calculating the position of center of the pupil by performing image processing to data from a camera, increasing the lightness of a concerned point estimated from that value and data for correction on a screen, measuring and correlating the change of a pupil area at that time. CONSTITUTION: A display device 1 is a device for displaying characters or the like on the screen, and a camera part 2 samples the video data of image of an eye from the video camera. A pupil center position calculation part 3 calculates the position of center of the pupil of a user by performing image processing to the video data from the camera part 2. A pupil area measuring part 4 calculates the area of the pupil by performing image processing to the video data from the camera part 2, and an estimation part 5 calculates the concerned point on the screen from the calculated position of center of the pupil and these data for correction. Then, the data for correction required for the following estimation of a glance are stored from the calculated position of center of the pupil and data provided by the change of lightness. Then, a brightness control part 6 changes the brightness at the position of the estimated concerned point on the screen.

    SYSTEM FOR TRACKING ACCESS CHAIN, NETWORK SYSTEM, METHOD AND RECORDING MEDIUM

    公开(公告)号:JP2001217834A

    公开(公告)日:2001-08-10

    申请号:JP2000025594

    申请日:2000-02-02

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To obtain a method for tracking an access chain which does not depend on the data contents of a packet and its system. SOLUTION: The log data of the packet coming in and going out a network are stored in a log box. In such a case, the data size and detection time of the packet are recorded. When illegal access is made to a target computer, an illegal access chain is tracked on the basis of the log information. The access chain tracking is performed as follows. The change of the packet data size at the time in a 1st connection and the change of the packet data size at the time in a 2nd connection are calculated from the log data. The shapes of graphs formed by these sequences are compared and when the shapes are similar, the connections are decided as being included in the same chain.

Patent Agency Ranking