MALWARE DETECTION METHOD, MALWARE DETECTION DEVICE, AND RECORDING MEDIUM

    公开(公告)号:US20240232356A9

    公开(公告)日:2024-07-11

    申请号:US18402429

    申请日:2024-01-02

    CPC classification number: G06F21/566 G06F11/3062

    Abstract: A malware detection method for a home network system including one or more home appliances that are connected to a home network includes: obtaining a plurality of setting values including at least information indicating a device type and an operating state of a target device subject to malware detection; selecting one detection model out of a plurality of detection models according to the plurality of setting values obtained; obtaining power consumption or current consumption of the target device; and detecting whether the target device is infected with malware, based on stable power or stable current obtained in the obtaining of the power consumption or the current consumption using the one detection model selected in the selecting, when the power consumption indicates stable power that varies within a predetermined range or the current consumption indicates stable current that varies within a predetermined range.

    VERIFICATION METHOD, SERVER, AND RECORDING MEDIUM

    公开(公告)号:US20240169083A1

    公开(公告)日:2024-05-23

    申请号:US18425252

    申请日:2024-01-29

    CPC classification number: G06F21/6218 G06F21/64

    Abstract: A verification method includes: obtaining log information items generated in a device; storing the log information items in storage, and storing, in a blockchain, converted information items obtained by converting the log information items; and conducting, at a predetermined frequency, verification as to whether at least one of a target log information item or a target converted information item has been tampered with, based on the target log information item and the target converted information item, the target log information item being included in the log information items and targeted for verification, the target converted information item being included in the converted information items and corresponding to the target log information item. A higher frequency is determined as the predetermined frequency when a time point at which the target converted information item was stored in the blockchain is closer to a current time at which the verification is conducted.

    DATA DISTRIBUTION METHOD, RECORDING MEDIUM, AND DATA DISTRIBUTION SYSTEM

    公开(公告)号:US20220321649A1

    公开(公告)日:2022-10-06

    申请号:US17843408

    申请日:2022-06-17

    Abstract: In a data distribution method according to the disclosure, first authentication servers and a first data server belong to a first group, and second authentication servers and a second data server belong to a second group different from the first group. A first authentication server obtains first transaction data that includes a data obtaining request indicating a request for obtaining or referring to data pertaining to an apparatus, and records a block including the first transaction data into its distributed ledger belonging to the first group. A second authentication server obtains the first transaction data, and records the block including the first transaction data into a distributed ledger belonging to the second group. The first authentication server causes the first data server to transfer the data pertaining to the apparatus held therein to the second data server or to make such data available for reference by the second data server.

    THREAT ANALYSIS APPARATUS, THREAT ANALYSIS METHOD, AND RECORDING MEDIUM

    公开(公告)号:US20210211442A1

    公开(公告)日:2021-07-08

    申请号:US17211211

    申请日:2021-03-24

    Abstract: A threat information analysis server includes: an update manager that manages update information indicating that function addition to an IoT device is performed; a threat information manager that stores threat information of a cyberattack; a risk level manager that manages risk level information defining a risk level of the IoT device; a related threat information manager that manages the threat information and related threat information associating the IoT device with the risk level; a risk level updater that associates the threat information and the risk level of the IoT device with each other and updates the related threat information, based on the update information; and an outputter that outputs the related threat information managed by the related threat information manager.

Patent Agency Ranking