DATA SHARING SYSTEM
    11.
    发明申请
    DATA SHARING SYSTEM 审中-公开
    数据共享系统

    公开(公告)号:US20160006801A1

    公开(公告)日:2016-01-07

    申请号:US14769517

    申请日:2013-12-04

    Abstract: Provided is a data sharing system in which data are shared between a plurality of communication terminals capable of wirelessly transmitting and receiving a communication message to and from each other. Each communication terminal determines whether or not the own communication terminal is a specified terminal. Each communication terminal, in case of it is determined that the own communication terminal is a specified terminal, transmits a holding list that lists information about data that the own communication terminal holds, to another communication terminal through use of a communication message. Each communication terminal, when receiving a holding list from another communication terminal, transmits and receives communication messages to and from the other communication terminal that is a source of the holding list that does not match the holding list of the own communication terminal so as to share data with each other.

    Abstract translation: 提供了一种数据共享系统,其中在能够相互无线地发送和接收通信消息的多个通信终端之间共享数据。 每个通信终端确定自己的通信终端是否是指定的终端。 在确定自己的通信终端是指定终端的情况下,每个通信终端通过使用通信消息向另一个通信终端发送列出与自己的通信终端保持的关于数据的信息的保持列表。 每个通信终端在从另一个通信终端接收到保持列表时,向作为与本通信终端的保持列表不匹配的保持列表的源的其他通信终端发送和接收通信消息,以便共享 数据彼此。

    DATA SHARING SYSTEM
    12.
    发明申请
    DATA SHARING SYSTEM 审中-公开
    数据共享系统

    公开(公告)号:US20150304371A1

    公开(公告)日:2015-10-22

    申请号:US14442848

    申请日:2013-10-17

    CPC classification number: H04L65/403 H04L12/189 H04L67/10

    Abstract: A communications terminal (a first communications terminal) that creates a holding list that lists information about remaining data, after the removal from data held by said communications terminal of at least one item of data which is not desired to be shared with another communications terminal (a second communications terminal), and sends said list to the second communications terminal by using a communications message. The second communications terminal determines what data, among the data in the holding list received from the first communications terminal, is not held by the second communications terminal, and sends a request for the determined data to the first communications terminal by using a communications message. The first communications terminal sends the data requested by the second communications terminal to the second communications terminal, by using a communications message.

    Abstract translation: 一种通信终端(第一通信终端),其在从所述通信终端保存的数据中删除不希望与其他通信终端共享的至少一个数据项之后,创建列出关于剩余数据的信息的保持列表( 第二通信终端),并且通过使用通信消息将所述列表发送到第二通信终端。 第二通信终端确定从第一通信终端接收到的保持列表中的数据中的哪些数据不被第二通信终端保持,并且通过使用通信消息向第一通信终端发送对所确定的数据的请求。 第一通信终端通过使用通信消息将第二通信终端请求的数据发送到第二通信终端。

    ANOMALY CAUSE ESTIMATION APPARATUS, ANOMALY CAUSE ESTIMATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM

    公开(公告)号:US20250119443A1

    公开(公告)日:2025-04-10

    申请号:US18567411

    申请日:2021-06-10

    Abstract: An anomaly cause estimation apparatus includes: an anomaly detection unit converts a data series acquired in a time series from a plurality of components provided in a target system into an anomaly level data series, and detects an anomaly based on the obtained anomaly level data series; and an anomaly propagation estimation unit inputs a target anomaly level data series, extracted from the anomaly level data series, for a period before a point in time at which the anomaly is detected, a target data series corresponding to the target anomaly level data series, and information indicating a causal relationship between the components to an anomaly propagation estimation model, and estimates an anomaly propagation likelihood of the anomaly propagating between the components.

    DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND RECORDING MEDIUM

    公开(公告)号:US20240396925A1

    公开(公告)日:2024-11-28

    申请号:US18694006

    申请日:2021-11-08

    Abstract: A setting unit (11) sets a path or a procedure for a cyber attack that is obtained through analysis of a risk to a communication system. A collection unit (12) collects safety information that is associated with safety in terms of information security regarding the constituent apparatuses of a communication system. An evaluation unit (13) evaluates the magnitude of a security risk present in the communication system, in accordance with the path or procedure for the cyber attack, on the basis of the security information, the security risk to a constituent apparatus related to the path or procedure for the cyber attack being evaluated to be lower when inspection for information security has been carried out on the constituent apparatus related to the path or procedure for the cyber attack than when inspection for information security is not carried out.

    PATH INFORMATION EXCHANGE METHOD, COMMUNICATION NODE, COMMUNICATION SYSTEM, AND COMMUNICATION NODE PROGRAM
    17.
    发明申请
    PATH INFORMATION EXCHANGE METHOD, COMMUNICATION NODE, COMMUNICATION SYSTEM, AND COMMUNICATION NODE PROGRAM 有权
    路径信息交换方法,通信节点,通信系统和通信节点

    公开(公告)号:US20150381471A1

    公开(公告)日:2015-12-31

    申请号:US14767136

    申请日:2014-03-04

    CPC classification number: H04L45/04 H04L45/46 H04L45/64 H04W40/32

    Abstract: The purpose of the present application is to provide a technique for the exchange of path information between different routing domains, which, while reducing the exchange of useless path information in the stage for constructing a hierarchical structure, can maintain robustness of path recognition that tolerates network partition. Of the management communication node identifiers which are described in hierarchical information included in a path control message received from a neighboring communication node and in hierarchical information held by the local communication node and which indicate a communication node that manages each level of the hierarchicalized network structure, the identifier indicating the highest level communication node and the identifier indicating the transmission source communication node are used to identify whether the routing domain to which the aforementioned neighboring communication node belongs is the same as the routing domain of the local communication node, and if the routing domain to which the aforementioned neighboring communication node belongs is different from the routing domain of the local communication node, the path information held by the local communication node is made known.

    Abstract translation: 本申请的目的是提供用于在不同路由域之间交换路径信息的技术,其在减少用于构建分层结构的阶段中的无用路径信息的交换的同时,可以保持容忍网络的路径识别的鲁棒性 划分。 在从相邻通信节点接收的路径控制消息中包含的分层信息中描述的管理通信节点标识符和由本地通信节点保持的分层信息中,并且指示管理每个级别的分级网络结构的通信节点的管理通信节点标识符中, 指示最高级通信节点的标识符和表示发送源通信节点的标识符用于识别上述相邻通信节点所属的路由域是否与本地通信节点的路由域相同,并且如果路由 上述相邻通信节点所属的域与本地通信节点的路由域不同,使得由本地通信节点保持的路径信息是已知的。

    DETERMINATION SYSTEM, DETERMINATION METHOD, AND RECORDING MEDIUM

    公开(公告)号:US20240411893A1

    公开(公告)日:2024-12-12

    申请号:US18701290

    申请日:2021-11-09

    Abstract: A determination system according to an aspect of the present disclosure includes: at least one memory storing a set of instructions; and at least one processor configured to execute the set of instructions to: receive a first inspection result that is a result of a first inspection of vulnerability of target software; receive a second inspection result that is a result of a second inspection of vulnerability of the target software; determine validity of the first inspection from undetected vulnerability that is vulnerability detected in the result of the second inspection and not detected in the result of the first inspection; and output a result of determination of the validity.

    ANALYSIS SYSTEM, METHOD, AND PROGRAM
    20.
    发明公开

    公开(公告)号:US20240056464A1

    公开(公告)日:2024-02-15

    申请号:US17641211

    申请日:2019-09-27

    CPC classification number: H04L63/1433

    Abstract: Provided is an analysis system that allows a security administrator to understand the impact of known vulnerabilities on the system to be diagnosed. The topology identification unit 14 identifies network topology of devices included in a system to be diagnosed. The analysis unit 6 generates an attack pattern that includes an attack condition, an attack result, an attack means that is vulnerability that is used by an attack, and a segment where the attack can occur in the system to be diagnosed. The display control unit 8 displays segments included in attack patterns superimposed on the network topology, on a display device. At this time, the display control unit 8 changes a display mode of the segment according to a type of the vulnerability that corresponds to the attack means included in the attack pattern including the segment.

Patent Agency Ranking