INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, SECURITY ASSESSMENT METHOD, AND SECURITY ASSESSMENT PROGRAM

    公开(公告)号:US20200259855A1

    公开(公告)日:2020-08-13

    申请号:US16651759

    申请日:2017-09-29

    Inventor: Masaki INOKUCHI

    Abstract: To implement a security assessment system capable of assessing an attack path including an air gap path, there is provided an information processing apparatus including a system configuration detector that detects at least two hosts included in a system and a communication link between the at least two hosts, an air gap path detector that detects, among the at least two hosts, a pair of hosts between which there is no communication link but data movement can occur, a calculator that calculates a score concerning a possibility that the pair of hosts detected by the air gap path detector is used for an attack, and a security assessment unit that performs security assessment using the hosts, the communication link between the hosts, information of the pair of hosts, and the score.

    ANALYSIS APPARATUS, ANALYSIS SYSTEM, ANALYSIS METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM

    公开(公告)号:US20220182406A1

    公开(公告)日:2022-06-09

    申请号:US17617380

    申请日:2019-06-11

    Inventor: Masaki INOKUCHI

    Abstract: An analysis apparatus includes an analysis target selection unit configured to select entities to be analyzed, an attack graph generation unit configured to generate an attack graph for a set of the selected entities, and a countermeasure implementation assumption unit configured to assume that a countermeasure for invalidating an attack condition is implemented in the generated attack graph. The attack graph generation unit generates the attack graph on a precondition that the countermeasure for invalidating the attack condition assumed by the countermeasure implementation assumption unit has been implemented. The analysis target selection unit selects at least one of all the entities to be analyzed and adds the selected entity in the analysis targets in each of the plurality of cycles.

    SECURITY ASSESSMENT SYSTEM
    15.
    发明申请

    公开(公告)号:US20210250370A1

    公开(公告)日:2021-08-12

    申请号:US16980313

    申请日:2018-03-14

    Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry, The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result. The duplicated environment includes components which are duplicated by one of the duplication

    SECURITY ASSESSMENT SYSTEM
    17.
    发明申请

    公开(公告)号:US20210042423A1

    公开(公告)日:2021-02-11

    申请号:US16980269

    申请日:2018-03-14

    Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user and effects associated with the physical components in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result. The duplicated environment includes components which are duplicated by one of the duplication level.

    SECURITY EVALUATION SYSTEM, SECURITY EVALUATION METHOD, AND PROGRAM

    公开(公告)号:US20210006582A1

    公开(公告)日:2021-01-07

    申请号:US16975901

    申请日:2018-03-27

    Abstract: This security evaluation system includes a first graph generation part that generates a first evaluation graph representing a connection relationship between resources as a target for security evaluation; a second graph generation part that generates a second evaluation graph representing a personal relationship between areas where the resources are located; and display part that displays the first evaluation graph and the second evaluation graph in association with each other.

    APPARATUS AND METHOD FOR RESOURCE SCHEDULING RELATED TO DEVICE-TO-DEVICE COMMUNICATION

    公开(公告)号:US20200296745A1

    公开(公告)日:2020-09-17

    申请号:US16086045

    申请日:2017-01-12

    Abstract: An apparatus (3) for uplink scheduling is configured to distinguish a plurality of uplink transmissions (120, 121, 122) related to a transfer of data originating from a first remote terminal (1A) from other uplink transmissions. The apparatus (3) further determines allocation of uplink radio resources at least partly based on whether the plurality of uplink transmissions (120, 121, 122) can be scheduled in the same transmission period. In this way, for example, it is possible to contribute to an improvement in performance of a plurality of uplink transmissions related to a transfer of data originating from one remote terminal.

    APPARATUS AND METHOD FOR CONTROLLING DEVICE-TO-DEVICE COMMUNICATION

    公开(公告)号:US20200296738A1

    公开(公告)日:2020-09-17

    申请号:US16086039

    申请日:2017-01-12

    Abstract: An apparatus (1 or 3) determines a device-to-device (D2D) radio resource to be allocated to one or more D2D transmissions from at least one remote terminal (1) to a first relay terminal (2) while considering a quality metric of an uplink from the first relay (2) terminal to a base station (3). In this way, for example, it is possible to contribute to avoiding inconsistency of performance between sidelink transmission from the remote terminal to the relay terminal and uplink transmission from the relay terminal to the base station.

Patent Agency Ranking