-
公开(公告)号:US20240190005A1
公开(公告)日:2024-06-13
申请号:US18582276
申请日:2024-02-20
Inventor: Kentaro IIO , Takuji HIRAMOTO , Tatsumi OBA
IPC: B25J9/16
CPC classification number: B25J9/1674 , B25J9/1653
Abstract: A remote monitoring system is a remote monitoring system that detects an anomaly in a state of a monitored target that operates autonomously, and the remote monitoring system includes: a state obtainer that obtains state information indicating a state of the monitored target from the monitored target; an information obtainer that obtains first sensing information indicating a result of sensing of the monitored target from an external information source that is provided outside the monitored target and performs sensing of the monitored target; a state estimator that estimates a first state of the monitored target based on the first sensing information; and a state comparer that compares the state information with estimated state information that is based on the first state.
-
公开(公告)号:US20220100897A1
公开(公告)日:2022-03-31
申请号:US17546606
申请日:2021-12-09
Inventor: Naohisa NISHIDA , Tatsumi OBA , Yuji UNAGAMI , Tadanori TERUYA , Nuttapong ATTRAPADUNG , Goichiro HANAOKA
Abstract: A secure authentication method includes: deriving a distributed LSH value using secret LSH, taking a first distributed feature amount which is a feature amount of user information distributed through a secret distribution method and encrypted LSH parameters as inputs; deriving a distributed hash value using a secret unidirectional function, taking the distributed LSH value and a distributed key as inputs; decoding the hash value by reversing distribution of the distributed hash value; selecting, from a secret hash table storing sets of a hash value as an index and a distributed feature amount as a data string, a set including a hash value matching the decoded hash value; computing, in secret, similarity between the distributed feature amount in the set and the first distributed feature amount; deriving, in secret, a user authentication result based on the similarity computed; and outputting the derived authentication result.
-
公开(公告)号:US20210279581A1
公开(公告)日:2021-09-09
申请号:US17318513
申请日:2021-05-12
Inventor: Naohisa NISHIDA , Tatsumi OBA , Yuji UNAGAMI , Tadanori TERUYA , Nuttapong ATTRAPADUNG
Abstract: A prediction model conversion method includes: converting a prediction model by converting at least one parameter which is included in the prediction model and is for performing homogenization processing into at least one parameter for performing processing including nonlinear processing, the prediction model being a neural network; and generating an encrypted prediction model that performs prediction processing with input in a secret state remaining secret by encrypting the prediction model that has been converted.
-
公开(公告)号:US20240080334A1
公开(公告)日:2024-03-07
申请号:US18508920
申请日:2023-11-14
Inventor: Tatsumi OBA , Takuji HIRAMOTO
IPC: H04L9/40
CPC classification number: H04L63/1425
Abstract: A monitoring apparatus includes: a user input acquirer that acquires information based on input provided by a user to a user input device; and a communication anomaly detector that detects a communication anomaly in communication that is being observed, and the communication anomaly detector detects the communication anomaly based on information about a packet whose source or destination includes a monitoring target device and the information based on the input corresponding to the packet.
-
公开(公告)号:US20220038482A1
公开(公告)日:2022-02-03
申请号:US17501693
申请日:2021-10-14
Inventor: Tatsumi OBA
Abstract: An anomaly detection method includes: calculating, for a detection target data stream of consecutive detection target data, distances between the detection target data; extracting features of the detection target data stream using the calculated distances; and calculating anomaly degree information about a degree of anomaly in the detection target data stream using the extracted features. Each extracted feature is made up of L consecutive distances (L is an integer greater than or equal to 2). For each feature extracted, supplementary information for calculating the anomaly degree information is calculated using a difference in the feature. For each of one or more information calculation target windows made up of N detection target data (N is an integer greater than or equal to L+1), the anomaly degree information is calculated using all supplementary information calculated from the N detection target data.
-
公开(公告)号:US20210152287A1
公开(公告)日:2021-05-20
申请号:US17128542
申请日:2020-12-21
Inventor: Takeshi KISHIKAWA , Tatsumi OBA , Manabu MAEDA
Abstract: An information processing method performed by an information processing system including a storage device to process a plurality of data frames flowing in an in-vehicle network including at least one electronic control unit includes a receiving step of sequentially receiving a plurality of data frames flowing in the in-vehicle network, a frame collection step of recording, in a reception log held in the storage device, reception interval information indicating reception intervals between the plurality of data frames as frame information, a feature acquisition step of acquiring, from the reception interval information, a feature relating to distribution of the reception intervals between the plurality of data frames, and an unauthorized data presence determination step of determining the presence/absence of an unauthorized data frame among the plurality of data frames.
-
公开(公告)号:US20230141747A1
公开(公告)日:2023-05-11
申请号:US18093631
申请日:2023-01-05
Inventor: Tatsumi OBA , Hiroyuki OKADA
CPC classification number: H04L63/1425 , H04L63/166 , H04L41/16
Abstract: This method includes: extracting, from communication in a network, a first communication triplet that is a 3-tuple including information indicating a source device, information indicating a destination device, and information indicating the type of communication performed between devices; determining whether the first communication triplet extracted corresponds to any of a plurality of second communication triplets stored in storage in advance as a whitelist and each being a 3-tuple including information indicating a source device, information indicating a destination device, and information indicating the type of communication; and estimating, as a score, a possibility that the first communication triplet emerges as the communication, by using a model that has been trained, when the first communication triplet does not correspond to any of the plurality of second communication triplets.
-
公开(公告)号:US20190166139A1
公开(公告)日:2019-05-30
申请号:US16202926
申请日:2018-11-28
Inventor: Naoki OCHI , Takuji HIRAMOTO , Tomohiro ODA , Tatsumi OBA
IPC: H04L29/06 , H04L12/24 , H04L12/26 , H04L12/741
Abstract: A network protection device includes a packet capture unit which captures a network packet through an intelligent switch which performs connection in a communication network or across communication networks; a network analyzer which detects a threat in the network packet; a threat remover which removes the threat in the network packet; and a switch operator which changes from a first communication path, which connects a sender node to a receiver node without the threat remover, to a second communication path, which is different from the first communication path and connects the sender node to the receiver node through the threat remover when the threat is detected in the threat detector.
-
公开(公告)号:US20240430283A1
公开(公告)日:2024-12-26
申请号:US18596369
申请日:2024-03-05
Inventor: Hiroyuki OKADA , Tatsumi OBA
IPC: H04L9/40
Abstract: A communication analysis system includes: an information receiver that receives information indicating analysis target communication performed by a monitoring target; an information obtainer that obtains past communication information indicating communication by the monitoring target; a WL determiner that determines, using the obtained analysis target communication and the whitelist, that non-WL communication has been established in the analysis target communication; a similar terminal extractor that extracts one or more terminals similar to destination and source terminals included in a non-WL communication link determined; a primary similar communication link extractor that extracts a past communication link similar to the non-WL communication link as a primary similar communication link from the obtained past communication information using the extracted similar terminals; and a NW graph creator that creates a NW graph for analysis as graph information for analyzing the non-whitelist communication using the extracted primary similar communication link and the obtained past communication information.
-
公开(公告)号:US20240214809A1
公开(公告)日:2024-06-27
申请号:US18598799
申请日:2024-03-07
Inventor: Hiroyuki OKADA , Tatsumi OBA
Abstract: A communication analysis system includes: an information obtainer that obtains past communication information indicating communication performed by a monitoring target; a prediction target link extractor that extracts, based on the past communication information obtained, an unestablished communication link of communication that has not been established in the past communication information, the unestablished communication link being at least one communication link that is a prediction target; a link confidence level calculator that calculates a confidence level indicating the likelihood that the unestablished communication link extracted will be established as a normal communication link in the future; and a NW graph creator that creates a NW graph, in which the unestablished communication link and information regarding the unestablished communication link are mapped, as graph information for determining whether to add the communication link to a whitelist, using the unestablished communication link extracted, the confidence level calculated, and the past communication information obtained.
-
-
-
-
-
-
-
-
-