AU2021477953A1 - Log output device, log output method, and log output program - Google Patents

Log output device, log output method, and log output program Download PDF

Info

Publication number
AU2021477953A1
AU2021477953A1 AU2021477953A AU2021477953A AU2021477953A1 AU 2021477953 A1 AU2021477953 A1 AU 2021477953A1 AU 2021477953 A AU2021477953 A AU 2021477953A AU 2021477953 A AU2021477953 A AU 2021477953A AU 2021477953 A1 AU2021477953 A1 AU 2021477953A1
Authority
AU
Australia
Prior art keywords
log
file
pnma
docket
digest
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
AU2021477953A
Other languages
English (en)
Inventor
Tomohiro Nagai
Masanori Shinohara
Hiroyoshi Takiguchi
Yasunori Wada
Yuki Yamanaka
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NTT Inc
Original Assignee
Nippon Telegraph and Telephone Corp
NTT Inc USA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp, NTT Inc USA filed Critical Nippon Telegraph and Telephone Corp
Publication of AU2021477953A1 publication Critical patent/AU2021477953A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)
AU2021477953A 2021-12-14 2021-12-14 Log output device, log output method, and log output program Pending AU2021477953A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2021/046125 WO2023112170A1 (ja) 2021-12-14 2021-12-14 ログ出力装置、ログ出力方法およびログ出力プログラム

Publications (1)

Publication Number Publication Date
AU2021477953A1 true AU2021477953A1 (en) 2024-06-27

Family

ID=86773803

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021477953A Pending AU2021477953A1 (en) 2021-12-14 2021-12-14 Log output device, log output method, and log output program

Country Status (6)

Country Link
US (1) US20250132924A1 (https=)
EP (1) EP4435633A4 (https=)
JP (1) JP7800561B2 (https=)
CN (1) CN118382862A (https=)
AU (1) AU2021477953A1 (https=)
WO (1) WO2023112170A1 (https=)

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3873557B2 (ja) * 2000-01-07 2007-01-24 株式会社日立製作所 半導体装置の製造方法
US9003548B2 (en) * 2004-04-13 2015-04-07 Nl Systems, Llc Method and system for digital rights management of documents
JP4939851B2 (ja) * 2006-06-21 2012-05-30 パナソニック株式会社 情報処理端末、セキュアデバイスおよび状態処理方法
JP4917061B2 (ja) * 2007-12-18 2012-04-18 日本電信電話株式会社 特徴的キーワード検出装置、特徴的キーワード検出方法、プログラムおよび記録媒体
US8572050B2 (en) * 2009-12-01 2013-10-29 International Business Machines Corporation Method and system for real time system log integrity protection
US10007795B1 (en) 2014-02-13 2018-06-26 Trend Micro Incorporated Detection and recovery of documents that have been compromised by malware
US9754086B1 (en) * 2014-05-19 2017-09-05 Symantec Corporation Systems and methods for customizing privacy control systems
WO2016060568A1 (en) * 2014-10-13 2016-04-21 Invenia As Method and system for protecting and sharing digital data between users in a network
JP2016122917A (ja) * 2014-12-24 2016-07-07 パナソニックIpマネジメント株式会社 署名生成装置、署名検証装置、署名生成方法及び署名検証方法
US10354081B1 (en) * 2017-01-05 2019-07-16 Trend Micro Incorporated Protection of interprocess communications in a computer
US10860536B2 (en) * 2017-01-05 2020-12-08 Portworx, Inc. Graph driver layer management
US11057366B2 (en) * 2018-08-21 2021-07-06 HYPR Corp. Federated identity management with decentralized computing platforms
US20200193426A1 (en) * 2018-12-18 2020-06-18 Secude Ag Method and system for creating and updating an authentic log file for a computer system and transactions
EP3683712B1 (en) * 2019-01-16 2021-10-20 Siemens Aktiengesellschaft Protecting integrity of log data
CN111177703B (zh) * 2019-12-31 2023-03-31 青岛海尔科技有限公司 操作系统数据完整性的确定方法及装置
CN111259348B (zh) * 2020-02-20 2023-03-07 国网信息通信产业集团有限公司 一种安全运行可执行文件的方法及系统
CN111444528B (zh) * 2020-03-31 2022-03-29 海信视像科技股份有限公司 数据安全保护方法、装置及存储介质
CN113468535B (zh) * 2020-03-31 2024-06-25 华为技术有限公司 可信度量方法及相关装置

Also Published As

Publication number Publication date
WO2023112170A1 (ja) 2023-06-22
EP4435633A1 (en) 2024-09-25
CN118382862A (zh) 2024-07-23
JP7800561B2 (ja) 2026-01-16
US20250132924A1 (en) 2025-04-24
EP4435633A4 (en) 2025-09-10
JPWO2023112170A1 (https=) 2023-06-22

Similar Documents

Publication Publication Date Title
US11176255B2 (en) Securely booting a service processor and monitoring service processor integrity
US11503030B2 (en) Service processor and system with secure booting and monitoring of service processor integrity
US11502845B2 (en) Network interface device and method
EP3255549B1 (en) Verifiable audit log
US10430591B1 (en) Using threat model to monitor host execution in a virtualized environment
WO2021121382A1 (en) Security management of an autonomous vehicle
CN106355081A (zh) 一种安卓程序启动校验方法和装置
CN112422527A (zh) 变电站电力监控系统的安全防护系统、方法和装置
JP6063321B2 (ja) サーバ装置およびハッシュ値処理方法
US10713392B2 (en) Network interface device and method
CN113922975A (zh) 一种安全控制方法、服务器、终端、系统和存储介质
US20210209240A1 (en) Information processing device, information processing method, information processing program, and information processing system
JP7800561B2 (ja) ログ出力装置、ログ出力方法およびログ出力プログラム
JP7587492B2 (ja) 認証装置、認証装置の制御方法及びプログラム
JP5955165B2 (ja) 管理装置、管理方法及び管理プログラム
KR20190042018A (ko) 보호되는 시크릿을 보안 부팅 업데이트에 걸쳐 보존하는 기법
CN121051732B (zh) 一种固件安全热更新方法、电子设备
CN110362983A (zh) 一种保证双域系统一致性的方法、装置及电子设备
US11163909B2 (en) Using multiple signatures on a signed log
CN121210405A (zh) 文件写入行为的监控方法、系统和计算机程序产品
US20200213120A1 (en) Monitoring and preventing use of weak cryptographic logic
CN119557872A (zh) 数据处理方法、装置、设备、及存储介质
CN117763561A (zh) 用于可信终端系统的漏洞缓解方法及装置、电子设备
CN120498753A (zh) 总线信息安全防护方法、装置、设备及存储介质
JP2014192639A (ja) 端末装置および判定方法

Legal Events

Date Code Title Description
DA3 Amendments made section 104

Free format text: THE NATURE OF THE AMENDMENT IS: TO AMEND THE APPLICANT NAME TO NTT, INC. AND NTT, INC. AND NTT, INC.