-
公开(公告)号:US20190245752A1
公开(公告)日:2019-08-08
申请号:US16312428
申请日:2017-06-21
Applicant: NEC CORPORATION
Inventor: Masato YAMANE , Yuki ASHINO
CPC classification number: H04L41/12 , H04L43/045 , H04L43/0823 , H04L43/12
Abstract: Provided is a communication network determination apparatus, etc. capable of correctly specifying a communication network which can be monitored by a monitoring device even when necessary and sufficient configuration information about the configuration of the communication network cannot be obtained. A communication network determination apparatus calculates a number of types of communication identifier associated with an apparatus identifier of a second information apparatus in monitoring information where a communication identifier allocated to a first information apparatus in a second communication network and an apparatus identifier of a second information apparatus that relays a communication in a first communication network, the monitoring information generated based on communication network via the first communication network; and determines that the first communication network is the same as the second communication network when the calculated number of types is one and determines that the first communication network is different from the second communication network, otherwise.
-
公开(公告)号:US20170279601A1
公开(公告)日:2017-09-28
申请号:US15512154
申请日:2015-09-17
Applicant: NEC Corporation
Inventor: Masato YAMANE , Yuki ASHINO , Masafumi WATANABE
CPC classification number: H04L9/003 , G06F21/56 , H04L9/08 , H04L9/0819 , H04L9/0822 , H04L9/14 , H04L41/0853 , H04L63/065
Abstract: An analysis system that is able to obtain correct encryption key is provided. The analysis system includes a processing circuitry configured to function as a cryptanalysis processing unit. The cryptanalysis processing unit includes: a key candidate extraction unit that is configured to extract, from second data, one or more candidates of key data that include an encryption key that enables to decrypt first data encrypted by a specific encryption scheme, based on data indicating a feature of the key data; and a decryption unit that is configured to extract, from the extracted candidates of key data, correct key data that enables to correctly decrypt the encrypted first data, based on a result of decrypting the first data by use of the extracted candidates of key data.
-