INFORMATION PROCESSING METHOD, ANOMALY DETERMINATION METHOD, AND INFORMATION PROCESSING DEVICE

    公开(公告)号:US20250063056A1

    公开(公告)日:2025-02-20

    申请号:US18937686

    申请日:2024-11-05

    Abstract: An information processing method is executed by an information processing device that detects an attack against a monitored object by communicating with the monitored object. The information processing method includes: obtaining attack information related to an attack against the monitored object; and determining priorities of a plurality of detection rules based on the attack information, and storing the priorities in association with the plurality of detection rules, the plurality of detection rules being used for determining whether an anomaly has occurred in the monitored object when the monitored object is attacked. The priorities indicate at least one of (i) an order in which the plurality of detection rules are used or (ii) whether to use the plurality of detection rules when determining whether an anomaly has occurred in the monitored object.

    DETECTION RULE OUTPUT METHOD, SECURITY SYSTEM, AND DETECTION RULE OUTPUT DEVICE

    公开(公告)号:US20240223581A1

    公开(公告)日:2024-07-04

    申请号:US18441826

    申请日:2024-02-14

    CPC classification number: H04L63/1416 H04L63/1425 H04L67/12

    Abstract: A detection rule output method is a detection rule output method for outputting a detection rule used in a security system that determines attack details based on log information of a vehicle, the detection rule output method including: acquiring vehicle configuration information regarding a configuration of an in-vehicle network provided in the vehicle, intrusion detection system (IDS) information regarding one or more intrusion detection systems (IDSes) mounted in the vehicle, and attack information to be detected regarding an attack on the vehicle to be detected; and outputting, to a storage device included in the security system, the detection rule that is a detection rule for detecting a location in the vehicle where an abnormality has occurred and the abnormality that has occurred in the location, and is generated based on the vehicle configuration information, the IDS information, and the attack information to be detected.

    ANOMALY DETECTION DEVICE AND ANOMALY DETECTION METHOD

    公开(公告)号:US20250052875A1

    公开(公告)日:2025-02-13

    申请号:US18789973

    申请日:2024-07-31

    Abstract: An anomaly detection device includes a processor and a non-transitory memory that stores a program. The processor executes the program to operate an anomaly detection device as an obtainer that obtains a first object detection result generated by a first object detection device that is included in a first apparatus which is a vehicle and detects an object in the vicinity of the first apparatus and a second object detection result generated by a second object detection device that is included in a second apparatus in the vicinity of the first apparatus and detects an object in the vicinity of the second apparatus; a determiner that determines whether at least one of the first apparatus or the second apparatus is being attacked, by comparing the first object detection result and the second object detection result; and an outputter that outputs a result of determination by the determiner.

    INFORMATION PROCESSING DEVICE AND CONTROL METHOD FOR INFORMATION PROCESSING DEVICE

    公开(公告)号:US20240256655A1

    公开(公告)日:2024-08-01

    申请号:US18629160

    申请日:2024-04-08

    CPC classification number: G06F21/552 G06F21/575 G06F2221/033

    Abstract: An information processing device includes: a log transmitter that transmits a monitoring log generated in the information processing device to an SOC (28); an HIDS monitor that verifies an integrity of the log transmitter; and a monitoring RoT that verifies an integrity of the HIDS monitor, and repeatedly outputs a heartbeat signal to the log transmitter. Each time the heartbeat signal is output from the monitoring RoT, the log transmitter transmits the heartbeat signal to the SOC. When the integrity of the log transmitter is anomalous, the HIDS monitor outputs, to the monitoring RoT, an output stop request signal for requesting the monitoring RoT to stop outputting the heartbeat signal. The monitoring RoT stops outputting the heartbeat signal based on the output stop request signal.

Patent Agency Ranking