Abstract:
PROBLEM TO BE SOLVED: To provide a translation support method, a translation support device and a computer program for improving translation efficiency by using a translation memory as a shared memory, and effectively maintaining confidentiality of the translation memory. SOLUTION: The translation support device receives input of original sentence information, translation sentence information, and accompanying information including aspect information related to an aspect related to translation, and calculates aspect similarity that is similarity between the aspect information whose input is received and aspect information stored in the translation memory. When the aspect information having the calculated aspect similarity smaller than a prescribed threshold value exists, the translation support device calculates translated sentence similarity that is similarity with the translation sentence information whose input is received only about the translation sentence information corresponding to the aspect information. When the translation sentence information having the calculated translated sentence similarity larger than a prescribed threshold value exists, the translation support device copies the original sentence information, the translation sentence information and the accompanying information whose input is received to the shared memory. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method, computer and computer program for producing a rule for efficiently classifying structured documents such as XML documents.SOLUTION: A method for producing a rule for classifying a plurality of digitized structured documents to which the same schema is applied is provided. The method includes the steps of scanning the schema to identify one or more variable portions defined by the schema, acquiring feature values of the identified variable portions from each of the plurality of structured documents and associating each of the acquired feature values with the structured document from which the feature value is acquired, and producing the rule on the basis of the feature values associated with the structured documents. Furthermore, a computer for producing a rule for specifying a plurality of digitized structured documents to which the same schema is applied, and a computer program therefor are provided.
Abstract:
PROBLEM TO BE SOLVED: To more efficiently control access to secret information. SOLUTION: The system stores an expected value for each hash value of a plurality of components included in the system. Further, the system stores the expected value of certification information which serves as a condition for allowing access to secret information, by associating it with the secret information. The system has a register for storing the certification information for certifying completeness of the plurality of components. First, the system stores a value calculated by inputting each expected value further into a hash function as the certification information before the plurality of components are started. Then, the hash value of a newly started component is calculated, and with the condition that the calculated hash value is different from the expected value, the certification information of the register is updated. Then access to the secret information is allowed with the condition that the expected value of the certification information and the certification information of the register match. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To implement an appropriate countermeasure at the time of anomaly.SOLUTION: A management system for an industrial control system comprises: a control apparatus; a control network connected to the control apparatus; and multiple devices controlled by the control apparatus via the control network. The management system includes multiple firewall parts provided for each of control zones each controlling one part of the industrial control system, the firewall parts relaying communication between devices in the control zones and the control network; an event analyzing part collecting events from each of the multiple firewall parts and analyzing the events to detect an anomaly of each of the control zones; and a communication managing part changing a communication operation performed via the firewall part provided for the control zone where an anomaly has been detected.
Abstract:
PROBLEM TO BE SOLVED: To provide a method, an apparatus, and a computer program for supporting determination of a degree of confidentiality which can reduce load of determination processing of the degree of the confidentiality to the document, even if it is an office document shared by a plurality of organizations. SOLUTION: The document data dividable into a plurality of blocks each being a unit for evaluating predetermined characteristics of included properties is stored in association with confidentiality degree information indicating whether the block is confidential for each block. A document data targeted for the confidentiality degree determination is obtained, and it is determined whether a document data including a similar block is stored for each block of the obtained document data. If it is determined that the document data including the similar block is stored, it is determined whether the confidentiality degree information indicating that the block is confidential is assigned to the block corresponding to the obtained document data, and if it is determined that the confidentiality degree information is assigned, the obtained document data is determined as confidential. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
Als ein erster Aspekt zum Bereitstellen eines Anomalieerkennungssystems, eines Anomalieerkennungsverfahrens und eines Programms für diese wird ein Anomalieerkennungssystem zum Erkennen einer Anomalie in einem Netzwerk bereitgestellt, wobei das System beinhaltet: eine Vielzahl von industriellen Steuersystemen (ICSs), die mit dem Netzwerk verbunden sind; und eine integrierte Analyseeinheit zum Empfangen eines Betriebszustands jedes ICS als Überwachungsdaten, Angeben eines ICS, von dem vermutet wird, dass es eine Anomalie aufweist, und Durchführen einer Anomalieermittlung, wobei das System in jedem ICS beinhaltet: eine Empfangseinheit zum Empfangen von Daten von einem anderen ICS; eine Sendeeinheit zum Senden von Daten an das andere ICS und zum Senden der Überwachungsdaten an die integrierte Analyseeinheit; eine Sicherheitsrichtlinie, die Regeln zum Aufzeichnen und Erzeugen von Daten beinhaltet; und einen Wrapper zum Steuern und Senden der Daten an das andere ICS unter Bezugnahme auf die Sicherheitsrichtlinie.
Abstract:
Anomalieerkennungssystem zum Erkennen einer Anomalie in einem Netzwerk, wobei das System aufweist: eine Vielzahl von industriellen Steuersystemen (ICSs), die mit dem Netzwerk verbunden sind; und eine integrierte Analyseeinheit zum Empfangen eines Betriebszustands jedes ICS als Überwachungsdaten, Angeben eines ICS, von dem vermutet wird, dass es eine Anomalie aufweist, und Durchführen einer Anomalieermittlung, wobei das System in jedem ICS aufweist: eine Empfangseinheit zum Empfangen von Daten von einem anderen ICS; eine Sendeeinheit zum Senden von Daten an das andere ICS und zum Senden der Überwachungsdaten an die integrierte Analyseeinheit; eine Sicherheitsrichtlinie, die Regeln zum Aufzeichnen und Erzeugen von Daten beinhaltet; und einen Wrapper zum Steuern und Senden der Daten an das andere ICS unter Bezugnahme auf die Sicherheitsrichtlinie.
Abstract:
The present invention is an anomaly detection system for detecting an anomaly within a network as a first embodiment in order to provide an anomaly detection system, anomaly detection method, and program for the same. Provided is an anomaly detection system which has a plurality of industrial control systems (hereinafter "ICS"s) which are connected to the network, an integrated analyzer which receives the operational status of each ICS as monitoring data in order to identify an ICS for which an anomaly is suspected so as to perform an anomaly assessment, a receiving unit provided for each ICS which receives data from other ICSs, a transmission unit which transmits data to other ICSs and transmits the monitoring data to the integrated analyzer, a security policy which includes recording of data and generation rules, and a wrapper which refers to the security policy in order to control the data so as to transmit the same to other ICSs.