Abstract:
PROBLEM TO BE SOLVED: To verify whether a character string is accepted by an automaton or not.SOLUTION: There is provided a server which is connectable to a client for receiving a character string as input, has an automaton whose state transits depending on a received character, and is for determining whether or not the automaton transits to a final state by the character string. The server receives a cipher sequence, in which a factor corresponding to each character included in the character string is made to be a value obtained from encrypting a non-unit element using a first encryption system having homomorphism and a factor except the factor corresponding to the character is made to be a value obtained from encrypting a unit element using the first encryption system, from the client; generates exchange data obtained from encrypting a post-state key using the first encrypting system on the basis of the cipher sequence, correspondingly to each state of a plurality of pre-states of the automaton, depending on the reception of the cipher sequence; and encrypts the exchange data by a corresponding pre-state key to transmit the data to the client.
Abstract:
PROBLEM TO BE SOLVED: To raise efficiency in a program analyzing work by providing a method for efficiently extracting a execution condition required till the execution of a program reaches the code in program analysis, and providing a system therefor. SOLUTION: A program analysis device is provided with: a graph generating part 10 for analyzing the program to be processed and generating a condition dependence graph where a condition and state change till the execution reaches the code to be noted are used as nodes; and a graph abstracting part 20 for replacing the plurality of conditions and state changes corresponding to the plurality of nodes of a perfect subgraph with the set of one or the plurality of state changes concerning the perfect subgraph which is a part where a path is divided into the plurality of paths by the condition corresponding to a prescribed node and subsequently joined together to one node again, in the condition dependence graph generated by the graph generating part 10, and converting it into the subgraph which is expressed by one path passing the node corresponding to the set of the state changes. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To determine whether a state of a client is included in a set stored by a server.SOLUTION: A server connectable to a client capable of managing a state thereof that successively transit, comprises: a set storage unit for storing a set including predetermined states; a server-side communication unit for communicating with the client using a concealing common-set calculation protocol for detecting whether there is a common element among sets while concealing elements of one set from the other sets; and a determining unit for determining whether a state of the client is included in the set stored by the set storage unit on the basis of ciphertext received in accordance with the concealing common-set calculation protocol.
Abstract:
PROBLEM TO BE SOLVED: To determine whether an automaton satisfies context free grammar.SOLUTION: There is provided a server which can be connected to a client holding an automaton and holds context free grammar, the server comparing an edge pair representing an array of encrypted values obtained by encrypting non-end characters corresponding to a previous state and a following state that the client holds with an encrypted character string value representing an array of encrypted values encrypted corresponding to a previous state and a following state allocated to a plurality of non-end characters included in a substituted symbol array of a generation rule of the context free grammar while making the encrypted character string value secret to the client, and then transmitting an encrypted value encrypted corresponding to the previous state and following state to which substitution symbols of the generation rule where the encrypted character string value matches the edge pair to the client together with the allocated previous state and following state.
Abstract:
PROBLEM TO BE SOLVED: To reduce a data amount of a message supplied from a server to a client.SOLUTION: There is provided a server which can be connected to a client and makes the client acquire a message having an index designated by the client from N messages retained by the server, where N is an integer of 2 or more, includes: a classification part for classifies the N messages into M classified messages depending on their contents; a message encryption part for encrypting each of the M classified messages; a message supply part for supplying the M encrypted classified messages to the client; and a key transmission part for transmitting a message key for decrypting a classified message corresponding to a message having an index designated by the client to the client by using oblivious transfer.
Abstract:
PROBLEM TO BE SOLVED: To provide a process, a system, and a computer program for determining whether a method of a computer program is a validator.SOLUTION: The computer program which has an illegal pattern and the method is received (102). The target method is normalized so that respective return statements related to the illegal pattern return a constant Boolean value (104). A first path condition and a second path condition for one or a plurality of corresponding paths are determined so that one or a plurality of corresponding basic blocks return a constant true Boolean value for the first path condition and a constant false Boolean value for the second path condition (106, 114). When unsatisfiability of both the path conditions is false, it is reported that the method is not a validator (110, 118). When the unsatisfiability of both the path conditions is true, it is reported that the method is a validator (112, 120).
Abstract:
PROBLEM TO BE SOLVED: To determine the validity of a character string generated by a program written in a programming language without executing the program.SOLUTION: The method for determining the validity of a character string generated by a program includes: abstracting a constraint between variables extracted from a source code for a programming language, wherein the variables include a string declaration and the definition of each variable is unique, describing the constraint in M2L, giving a specification to determine whether the character string is safe or unsafe in M2L, and evaluating the validity of the character string on an M2L solver on the basis of the constraint on the variables and the specification to determine whether the string is safe or unsafe.
Abstract:
PROBLEM TO BE SOLVED: To decide whether or not a plurality of screens to be successively displayed by the processing of a program satisfy specifications without executing the program. SOLUTION: This system stores a first schemer for deciding the specifications of a first picture, a second schemer for deciding the specifications of a second picture and an event for switching display by a program from the first screen to the second screen. At first, a partial program to be executed according to an event generated during the display of the screen based on the first schemer is extracted from a program based on the first schemer and the event. Then, an intermediate program for searching the set of pictures to be displayed according to the event generated during the display of the screens belonging to the set of the screens based on the first schemer is generated from the set of the screens on the basis of the partial program. Then, it is decided that under such conditions that the first screen is based on the first schemer, and that the set of the screens to be obtained by applying an intermediate program to the first schemer is based on the second schemer, those screens satisfy the specifications. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
A method for dynamically selecting string analysis algorithms can begin with the training of the dynamic string analysis handler of a string analysis module to effectively handle a subset of string queries having contextual metadata received from a client application in an instructional environment. The effectiveness of the training module can be based upon feedback from the client application. Upon completion of the training, a string analysis algorithm selection policy can be synthesized. The string analysis algorithm selection policy can correlate a context of a string query in the subset to the usage of a string analysis algorithm. When in the operational environment, the dynamic string analysis handler can dynamically handle string queries having contextual metadata received from the client application in accordance with the string analysis algorithm selection policy. The string analysis algorithm to be used for a string query can be dynamically and independently determined.
Abstract:
Ein System und ein Verfahren zum statischen Erkennen und Kategorisieren von Herabstufungseinrichtung des Informationsflusses enthalten das Transformieren (502) eines Programms, das in einer Speichereinheit gespeichert ist, durch statisches Analysieren von Programmvariablen, um eine einzige Zuweisung zu jeder Variable in einer Befehlsmenge zu erreichen. Die Befehlsmenge wird in Produktionsregeln mit Zeichenfolgenoperationen übersetzt (504). Eine kontextfreie Grammatik wird aus den Produktionsregeln erzeugt (508), um eine endliche Menge von Zeichenfolgen zu erkennen. Eine Funktion der Herabstufungseinrichtung des Informationsflusses wird durch Vergleichen der endlichen Menge von Zeichenfolgen mit einer oder mehreren Funktionsbeschreibungen erkannt (510).