Patent classifications
H04L9/36
Transmission apparatus, transmission method, reception apparatus, and reception method
To make high-level copyright protection of transmission audio data possible. Audio data is sequentially transmitted to a reception side via a predetermined transmission channel for each unit audio data. Audio data to be transmitted is encrypted, and encryption information indicating that the audio data has been encrypted is added to the audio data. For example, the encryption information is added using a predetermined bit area of a channel status of each block that is configured every predetermined number of unit audio data pieces.
Transmission apparatus, transmission method, reception apparatus, and reception method
To make high-level copyright protection of transmission audio data possible. Audio data is sequentially transmitted to a reception side via a predetermined transmission channel for each unit audio data. Audio data to be transmitted is encrypted, and encryption information indicating that the audio data has been encrypted is added to the audio data. For example, the encryption information is added using a predetermined bit area of a channel status of each block that is configured every predetermined number of unit audio data pieces.
EXTRACTION DEVICE, EXTRACTION METHOD, RECORDING MEDIUM, AND DETECTION DEVICE
An extraction device includes: at least one memory configured to store instructions; and at least one processor configured to execute the instructions to: sort each set of frames that have the same identifier associated with a node, into frames maintaining a cycle and frames out of the cycle; and extract, as an event rule, a feature of a bit change in a data field related to an event occurrence, from the frames that have the same identifier and are out of the cycle.
EXTRACTION DEVICE, EXTRACTION METHOD, RECORDING MEDIUM, AND DETECTION DEVICE
An extraction device includes: at least one memory configured to store instructions; and at least one processor configured to execute the instructions to: sort each set of frames that have the same identifier associated with a node, into frames maintaining a cycle and frames out of the cycle; and extract, as an event rule, a feature of a bit change in a data field related to an event occurrence, from the frames that have the same identifier and are out of the cycle.
Analysis system, analysis method, and storage medium
Provided is an analysis system configured to obtain an encryption key for encryption communication between an information communication apparatus and a communication network, from memory space provided in the information communication apparatus. The analysis system including a processing circuitry configured to function as: a memory acquisition unit that is configured to acquire at least part of data stored in a memory unit in an information communication apparatus including a computing unit and the memory unit; and a communication processing unit that is configured to determine whether key data including an encryption key used for encryption processing in a cryptographic communication protocol are stored in the memory unit, based on communication data transmitted and received in accordance with the cryptographic communication protocol between the information communication apparatus and a communication network, and instruct the memory acquisition unit to acquire data stored in the memory unit, based on the determination result.
Analysis system, analysis method, and storage medium
Provided is an analysis system configured to obtain an encryption key for encryption communication between an information communication apparatus and a communication network, from memory space provided in the information communication apparatus. The analysis system including a processing circuitry configured to function as: a memory acquisition unit that is configured to acquire at least part of data stored in a memory unit in an information communication apparatus including a computing unit and the memory unit; and a communication processing unit that is configured to determine whether key data including an encryption key used for encryption processing in a cryptographic communication protocol are stored in the memory unit, based on communication data transmitted and received in accordance with the cryptographic communication protocol between the information communication apparatus and a communication network, and instruct the memory acquisition unit to acquire data stored in the memory unit, based on the determination result.
PARAMETER SETTING APPARATUS, COMPUTATION APPARATUS, METHOD, PROGRAM, AND RECODING MEDIUM THEREOF
A calculation process is efficiently performed to a text file in which one or more records are included, each of the records includes one or more cells having an arbitrary length, and each of the cells includes arbitrary pieces of characters. A parameter setting apparatus sets a maximum value S.sub.csv and a minimum value s.sub.csv of a size of character strings for one record by using attribute information as an input, a maximum value S.sub.enc of a total size of encode information, a maximum value S.sub.ss of a total size of a calculation value obtained by performing specific calculation to the encode information, and a total size S.sub.ref of reference information, obtains a function value of C/(S.sub.csv+S.sub.enc+S.sub.ref) as the number of records which is a process unit of encoding and calculation, and obtains a function value of f.sub.0/I.Math.r.Math.S.sub.csv as the number of parallels in the calculation process. Here, C is a cache memory size, M is a main memory size, and f.sub.0 is a function value of s.sub.csv.Math.M/(s.sub.csv+S.sub.enc+max(S.sub.ref,S.sub.ss)).
Enterprise security in meters
The present disclosure provides for enterprise security in intelligent electronic devices such as electric power meters. In accordance with the present disclosure, enterprise security is a security system in which each individual device, instead of configuring and storing security configurations locally, use a security server for security verifications. Such a security server of the present disclosure may be a dedicated computer on a network, that is used to manage the security configuration for all users. This makes it simpler for administrators to configure users and devices, which in turn improves security by encouraging security to be properly configured.
Enterprise security in meters
The present disclosure provides for enterprise security in intelligent electronic devices such as electric power meters. In accordance with the present disclosure, enterprise security is a security system in which each individual device, instead of configuring and storing security configurations locally, use a security server for security verifications. Such a security server of the present disclosure may be a dedicated computer on a network, that is used to manage the security configuration for all users. This makes it simpler for administrators to configure users and devices, which in turn improves security by encouraging security to be properly configured.
Self-test of an asynchronous circuit
An indication of an operating mode of an asynchronous circuit may be received. A determination may be made as to whether the operating mode of the asynchronous circuit corresponds to a self-test of the asynchronous circuit. In response to determining that the operating mode of the asynchronous circuit corresponds to the self-test, a first clock signal may be provided to a first portion of a self-test component in a feedback path of the asynchronous circuit and a second clock signal may be provided to a second portion of the self-test component in the feedback path of the asynchronous circuit. Furthermore, a test value may be generated based on the first clock signal and the second clock signal.