Translation support method, translation support device and computer program
    1.
    发明专利
    Translation support method, translation support device and computer program 有权
    翻译支持方法,翻译支持设备和计算机程序

    公开(公告)号:JP2010117759A

    公开(公告)日:2010-05-27

    申请号:JP2008288591

    申请日:2008-11-11

    Abstract: PROBLEM TO BE SOLVED: To provide a translation support method, a translation support device and a computer program for improving translation efficiency by using a translation memory as a shared memory, and effectively maintaining confidentiality of the translation memory.
    SOLUTION: The translation support device receives input of original sentence information, translation sentence information, and accompanying information including aspect information related to an aspect related to translation, and calculates aspect similarity that is similarity between the aspect information whose input is received and aspect information stored in the translation memory. When the aspect information having the calculated aspect similarity smaller than a prescribed threshold value exists, the translation support device calculates translated sentence similarity that is similarity with the translation sentence information whose input is received only about the translation sentence information corresponding to the aspect information. When the translation sentence information having the calculated translated sentence similarity larger than a prescribed threshold value exists, the translation support device copies the original sentence information, the translation sentence information and the accompanying information whose input is received to the shared memory.
    COPYRIGHT: (C)2010,JPO&INPIT

    Abstract translation: 要解决的问题:提供翻译支持方法,翻译支持装置和用于通过使用翻译记忆库作为共享存储器来提高翻译效率的计算机程序,并有效地保持翻译记忆库的机密性。 解决方案:翻译支持装置接收原始句子信息,翻译句子信息和伴随信息的输入,包括与翻译有关的方面相关的方面信息,并且计算与输入的方面信息和/ 存储在翻译记忆库中的方面信息。 当存在具有计算出的方面相似性的方面信息小于规定的阈值时,翻译支持装置计算与仅对与方面信息对应的翻译句子信息仅接收输入的翻译语句信息相似度的翻译句子相似度。 当存在具有计算出的翻译句子相似度大于规定阈值的翻译句子信息时,翻译支持装置将原始句子信息,翻译句子信息和其输入的附带信息复制到共享存储器。 版权所有(C)2010,JPO&INPIT

    Method for producing rule for classifying structured documents, computer program therefor and computer
    2.
    发明专利
    Method for producing rule for classifying structured documents, computer program therefor and computer 有权
    生成结构化文件分类的方法,计算机程序和计算机

    公开(公告)号:JP2012098797A

    公开(公告)日:2012-05-24

    申请号:JP2010243910

    申请日:2010-10-29

    CPC classification number: G06F17/30705 G06F17/30923

    Abstract: PROBLEM TO BE SOLVED: To provide a method, computer and computer program for producing a rule for efficiently classifying structured documents such as XML documents.SOLUTION: A method for producing a rule for classifying a plurality of digitized structured documents to which the same schema is applied is provided. The method includes the steps of scanning the schema to identify one or more variable portions defined by the schema, acquiring feature values of the identified variable portions from each of the plurality of structured documents and associating each of the acquired feature values with the structured document from which the feature value is acquired, and producing the rule on the basis of the feature values associated with the structured documents. Furthermore, a computer for producing a rule for specifying a plurality of digitized structured documents to which the same schema is applied, and a computer program therefor are provided.

    Abstract translation: 要解决的问题:提供一种方法,计算机和计算机程序,用于生成用于有效地分类诸如XML文档的结构化文档的规则。 提供了一种用于生成用于对应用相同模式的多个数字化结构化文档进行分类的规则的方法。 该方法包括以下步骤:扫描模式以识别由模式定义的一个或多个可变部分,从多个结构化文档中的每一个获取所识别的可变部分的特征值,并将获取的每个特征值与结构化文档相关联 获取特征值,并且基于与结构化文档相关联的特征值来生成规则。 此外,提供了一种用于产生用于指定应用了相同模式的多个数字化结构化文档的规则的计算机及其计算机程序。 版权所有(C)2012,JPO&INPIT

    System and its method for controlling access to secret information
    3.
    发明专利
    System and its method for controlling access to secret information 有权
    用于控制秘密信息访问的系统及其方法

    公开(公告)号:JP2007072909A

    公开(公告)日:2007-03-22

    申请号:JP2005261334

    申请日:2005-09-08

    Abstract: PROBLEM TO BE SOLVED: To more efficiently control access to secret information. SOLUTION: The system stores an expected value for each hash value of a plurality of components included in the system. Further, the system stores the expected value of certification information which serves as a condition for allowing access to secret information, by associating it with the secret information. The system has a register for storing the certification information for certifying completeness of the plurality of components. First, the system stores a value calculated by inputting each expected value further into a hash function as the certification information before the plurality of components are started. Then, the hash value of a newly started component is calculated, and with the condition that the calculated hash value is different from the expected value, the certification information of the register is updated. Then access to the secret information is allowed with the condition that the expected value of the certification information and the certification information of the register match. COPYRIGHT: (C)2007,JPO&INPIT

    Abstract translation: 要解决的问题:更有效地控制对秘密信息的访问。 解决方案:系统存储系统中包括的多个组件的每个散列值的期望值。 此外,系统通过将其与秘密信息相关联来存储用作允许访问秘密信息的条件的认证信息的期望值。 该系统具有用于存储用于证明多个部件的完整性的认证信息的寄存器。 首先,系统将通过将多个期望值进一步输入到散列函数中而计算出的值作为多个分量开始前的认证信息。 然后,计算新启动的分量的散列值,并且在计算出的散列值与预期值不同的条件下,更新寄存器的认证信息。 然后允许访问秘密信息,条件是认证信息的期望值和注册表的认证信息匹配。 版权所有(C)2007,JPO&INPIT

    Management system, management method and management program for managing industrial control system
    4.
    发明专利
    Management system, management method and management program for managing industrial control system 审中-公开
    管理系统,管理方法和管理工业控制系统的程序

    公开(公告)号:JP2012226680A

    公开(公告)日:2012-11-15

    申请号:JP2011095807

    申请日:2011-04-22

    CPC classification number: H04L63/0209 G05B23/0286 H04L63/0263 H04L63/1408

    Abstract: PROBLEM TO BE SOLVED: To implement an appropriate countermeasure at the time of anomaly.SOLUTION: A management system for an industrial control system comprises: a control apparatus; a control network connected to the control apparatus; and multiple devices controlled by the control apparatus via the control network. The management system includes multiple firewall parts provided for each of control zones each controlling one part of the industrial control system, the firewall parts relaying communication between devices in the control zones and the control network; an event analyzing part collecting events from each of the multiple firewall parts and analyzing the events to detect an anomaly of each of the control zones; and a communication managing part changing a communication operation performed via the firewall part provided for the control zone where an anomaly has been detected.

    Abstract translation: 要解决的问题:在异常时实施适当的对策。 解决方案:一种用于工业控制系统的管理系统,包括:控制装置; 连接到所述控制装置的控制网络; 以及由控制装置经由控制网络控制的多个设备。 管理系统包括为每个控制区域提供的多个防火墙部件,每个控制区域控制工业控制系统的一部分,防火墙部件中继控制区域中的设备与控制网络之间的通信; 事件分析部分,从多个防火墙部分中的每一个收集事件,并分析事件以检测每个控制区域的异常; 以及通信管理部,其改变通过为检测到异常的控制区域提供的防火墙部分执行的通信操作。 版权所有(C)2013,JPO&INPIT

    Method, apparatus and computer program for supporting determination on degree of confidentiality of document
    5.
    发明专利
    Method, apparatus and computer program for supporting determination on degree of confidentiality of document 有权
    方法,用于支持文件保密程度确定的装置和计算机程序

    公开(公告)号:JP2010198157A

    公开(公告)日:2010-09-09

    申请号:JP2009040339

    申请日:2009-02-24

    CPC classification number: G06F21/10 G06F21/64 G11B20/00086 G11B20/0021

    Abstract: PROBLEM TO BE SOLVED: To provide a method, an apparatus, and a computer program for supporting determination of a degree of confidentiality which can reduce load of determination processing of the degree of the confidentiality to the document, even if it is an office document shared by a plurality of organizations. SOLUTION: The document data dividable into a plurality of blocks each being a unit for evaluating predetermined characteristics of included properties is stored in association with confidentiality degree information indicating whether the block is confidential for each block. A document data targeted for the confidentiality degree determination is obtained, and it is determined whether a document data including a similar block is stored for each block of the obtained document data. If it is determined that the document data including the similar block is stored, it is determined whether the confidentiality degree information indicating that the block is confidential is assigned to the block corresponding to the obtained document data, and if it is determined that the confidentiality degree information is assigned, the obtained document data is determined as confidential. COPYRIGHT: (C)2010,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种用于支持确定机密性的方法,装置和计算机程序,其可以减少对文档的机密性的确定处理的负担,即使它是 办公文件由多个组织共享。 解决方案:可分割成多个块的文档数据,每个块是用于评估所包含属性的预定特征的单元,与表示每个块的块是否为机密的机密度信息相关联地存储。 获得针对机密度确定的文档数据,并且确定是否针对所获得的文档数据的每个块存储了包括相似块的文档数据。 如果确定存储了包括相似块的文档数据,则确定指示块是机密的机密度信息是否被分配给与获得的文档数据相对应的块,并且如果确定机密度 信息被分配,所获得的文档数据被确定为机密。 版权所有(C)2010,JPO&INPIT

    Anomalieerkennungssystem, Anomalieerkennungsverfahren und Programm für diese

    公开(公告)号:DE112012000772T5

    公开(公告)日:2013-11-07

    申请号:DE112012000772

    申请日:2012-01-26

    Applicant: IBM

    Abstract: Als ein erster Aspekt zum Bereitstellen eines Anomalieerkennungssystems, eines Anomalieerkennungsverfahrens und eines Programms für diese wird ein Anomalieerkennungssystem zum Erkennen einer Anomalie in einem Netzwerk bereitgestellt, wobei das System beinhaltet: eine Vielzahl von industriellen Steuersystemen (ICSs), die mit dem Netzwerk verbunden sind; und eine integrierte Analyseeinheit zum Empfangen eines Betriebszustands jedes ICS als Überwachungsdaten, Angeben eines ICS, von dem vermutet wird, dass es eine Anomalie aufweist, und Durchführen einer Anomalieermittlung, wobei das System in jedem ICS beinhaltet: eine Empfangseinheit zum Empfangen von Daten von einem anderen ICS; eine Sendeeinheit zum Senden von Daten an das andere ICS und zum Senden der Überwachungsdaten an die integrierte Analyseeinheit; eine Sicherheitsrichtlinie, die Regeln zum Aufzeichnen und Erzeugen von Daten beinhaltet; und einen Wrapper zum Steuern und Senden der Daten an das andere ICS unter Bezugnahme auf die Sicherheitsrichtlinie.

    Anomalieerkennungssystem
    7.
    发明专利

    公开(公告)号:DE112012000772B4

    公开(公告)日:2014-11-20

    申请号:DE112012000772

    申请日:2012-01-26

    Applicant: IBM

    Abstract: Anomalieerkennungssystem zum Erkennen einer Anomalie in einem Netzwerk, wobei das System aufweist: eine Vielzahl von industriellen Steuersystemen (ICSs), die mit dem Netzwerk verbunden sind; und eine integrierte Analyseeinheit zum Empfangen eines Betriebszustands jedes ICS als Überwachungsdaten, Angeben eines ICS, von dem vermutet wird, dass es eine Anomalie aufweist, und Durchführen einer Anomalieermittlung, wobei das System in jedem ICS aufweist: eine Empfangseinheit zum Empfangen von Daten von einem anderen ICS; eine Sendeeinheit zum Senden von Daten an das andere ICS und zum Senden der Überwachungsdaten an die integrierte Analyseeinheit; eine Sicherheitsrichtlinie, die Regeln zum Aufzeichnen und Erzeugen von Daten beinhaltet; und einen Wrapper zum Steuern und Senden der Daten an das andere ICS unter Bezugnahme auf die Sicherheitsrichtlinie.

    Anomaly detection system, anomaly detection method, and program of same

    公开(公告)号:GB2505340A

    公开(公告)日:2014-02-26

    申请号:GB201318332

    申请日:2012-01-26

    Applicant: IBM

    Abstract: The present invention is an anomaly detection system for detecting an anomaly within a network as a first embodiment in order to provide an anomaly detection system, anomaly detection method, and program for the same. Provided is an anomaly detection system which has a plurality of industrial control systems (hereinafter "ICS"s) which are connected to the network, an integrated analyzer which receives the operational status of each ICS as monitoring data in order to identify an ICS for which an anomaly is suspected so as to perform an anomaly assessment, a receiving unit provided for each ICS which receives data from other ICSs, a transmission unit which transmits data to other ICSs and transmits the monitoring data to the integrated analyzer, a security policy which includes recording of data and generation rules, and a wrapper which refers to the security policy in order to control the data so as to transmit the same to other ICSs.

Patent Agency Ranking