JP7800561B2 - ログ出力装置、ログ出力方法およびログ出力プログラム - Google Patents

ログ出力装置、ログ出力方法およびログ出力プログラム

Info

Publication number
JP7800561B2
JP7800561B2 JP2023567357A JP2023567357A JP7800561B2 JP 7800561 B2 JP7800561 B2 JP 7800561B2 JP 2023567357 A JP2023567357 A JP 2023567357A JP 2023567357 A JP2023567357 A JP 2023567357A JP 7800561 B2 JP7800561 B2 JP 7800561B2
Authority
JP
Japan
Prior art keywords
log
hash value
log message
log output
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2023567357A
Other languages
English (en)
Japanese (ja)
Other versions
JPWO2023112170A1 (https=
Inventor
友貴 山中
浩義 瀧口
正紀 篠原
智大 永井
泰典 和田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NTT Inc
NTT Inc USA
Original Assignee
Nippon Telegraph and Telephone Corp
NTT Inc USA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp, NTT Inc USA filed Critical Nippon Telegraph and Telephone Corp
Publication of JPWO2023112170A1 publication Critical patent/JPWO2023112170A1/ja
Application granted granted Critical
Publication of JP7800561B2 publication Critical patent/JP7800561B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)
JP2023567357A 2021-12-14 2021-12-14 ログ出力装置、ログ出力方法およびログ出力プログラム Active JP7800561B2 (ja)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2021/046125 WO2023112170A1 (ja) 2021-12-14 2021-12-14 ログ出力装置、ログ出力方法およびログ出力プログラム

Publications (2)

Publication Number Publication Date
JPWO2023112170A1 JPWO2023112170A1 (https=) 2023-06-22
JP7800561B2 true JP7800561B2 (ja) 2026-01-16

Family

ID=86773803

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2023567357A Active JP7800561B2 (ja) 2021-12-14 2021-12-14 ログ出力装置、ログ出力方法およびログ出力プログラム

Country Status (6)

Country Link
US (1) US20250132924A1 (https=)
EP (1) EP4435633A4 (https=)
JP (1) JP7800561B2 (https=)
CN (1) CN118382862A (https=)
AU (1) AU2021477953A1 (https=)
WO (1) WO2023112170A1 (https=)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007148602A1 (ja) 2006-06-21 2007-12-27 Panasonic Corporation 情報処理端末および状態通知方法
JP2009169924A (ja) 2007-12-18 2009-07-30 Nippon Telegr & Teleph Corp <Ntt> 特徴的キーワード検出装置、特徴的キーワード検出方法、プログラムおよび記録媒体
JP2016122917A (ja) 2014-12-24 2016-07-07 パナソニックIpマネジメント株式会社 署名生成装置、署名検証装置、署名生成方法及び署名検証方法
US20170244556A1 (en) 2014-10-13 2017-08-24 Terje Wold Method and system for protecting and sharing digital data between users in a network
US10007795B1 (en) 2014-02-13 2018-06-26 Trend Micro Incorporated Detection and recovery of documents that have been compromised by malware
US20200067907A1 (en) 2018-08-21 2020-02-27 HYPR Corp. Federated identity management with decentralized computing platforms
CN111177703A (zh) 2019-12-31 2020-05-19 青岛海尔科技有限公司 操作系统数据完整性的确定方法及装置
CN111259348A (zh) 2020-02-20 2020-06-09 国网信息通信产业集团有限公司 一种安全运行可执行文件的方法及系统
US20200193426A1 (en) 2018-12-18 2020-06-18 Secude Ag Method and system for creating and updating an authentic log file for a computer system and transactions
CN111444528A (zh) 2020-03-31 2020-07-24 海信视像科技股份有限公司 数据安全保护方法、装置及存储介质
CN113468535A (zh) 2020-03-31 2021-10-01 华为技术有限公司 可信度量方法及相关装置

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3873557B2 (ja) * 2000-01-07 2007-01-24 株式会社日立製作所 半導体装置の製造方法
US9003548B2 (en) * 2004-04-13 2015-04-07 Nl Systems, Llc Method and system for digital rights management of documents
US8572050B2 (en) * 2009-12-01 2013-10-29 International Business Machines Corporation Method and system for real time system log integrity protection
US9754086B1 (en) * 2014-05-19 2017-09-05 Symantec Corporation Systems and methods for customizing privacy control systems
US10354081B1 (en) * 2017-01-05 2019-07-16 Trend Micro Incorporated Protection of interprocess communications in a computer
US10860536B2 (en) * 2017-01-05 2020-12-08 Portworx, Inc. Graph driver layer management
EP3683712B1 (en) * 2019-01-16 2021-10-20 Siemens Aktiengesellschaft Protecting integrity of log data

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007148602A1 (ja) 2006-06-21 2007-12-27 Panasonic Corporation 情報処理端末および状態通知方法
JP2009169924A (ja) 2007-12-18 2009-07-30 Nippon Telegr & Teleph Corp <Ntt> 特徴的キーワード検出装置、特徴的キーワード検出方法、プログラムおよび記録媒体
US10007795B1 (en) 2014-02-13 2018-06-26 Trend Micro Incorporated Detection and recovery of documents that have been compromised by malware
US20170244556A1 (en) 2014-10-13 2017-08-24 Terje Wold Method and system for protecting and sharing digital data between users in a network
JP2016122917A (ja) 2014-12-24 2016-07-07 パナソニックIpマネジメント株式会社 署名生成装置、署名検証装置、署名生成方法及び署名検証方法
US20200067907A1 (en) 2018-08-21 2020-02-27 HYPR Corp. Federated identity management with decentralized computing platforms
US20200193426A1 (en) 2018-12-18 2020-06-18 Secude Ag Method and system for creating and updating an authentic log file for a computer system and transactions
CN111177703A (zh) 2019-12-31 2020-05-19 青岛海尔科技有限公司 操作系统数据完整性的确定方法及装置
CN111259348A (zh) 2020-02-20 2020-06-09 国网信息通信产业集团有限公司 一种安全运行可执行文件的方法及系统
CN111444528A (zh) 2020-03-31 2020-07-24 海信视像科技股份有限公司 数据安全保护方法、装置及存储介质
CN113468535A (zh) 2020-03-31 2021-10-01 华为技术有限公司 可信度量方法及相关装置

Also Published As

Publication number Publication date
WO2023112170A1 (ja) 2023-06-22
AU2021477953A1 (en) 2024-06-27
EP4435633A1 (en) 2024-09-25
CN118382862A (zh) 2024-07-23
US20250132924A1 (en) 2025-04-24
EP4435633A4 (en) 2025-09-10
JPWO2023112170A1 (https=) 2023-06-22

Similar Documents

Publication Publication Date Title
US11176255B2 (en) Securely booting a service processor and monitoring service processor integrity
US11503030B2 (en) Service processor and system with secure booting and monitoring of service processor integrity
Paccagnella et al. Custos: Practical tamper-evident auditing of operating systems using trusted execution
EP3255549B1 (en) Verifiable audit log
US7788730B2 (en) Secure bytecode instrumentation facility
WO2021121382A1 (en) Security management of an autonomous vehicle
JP6063321B2 (ja) サーバ装置およびハッシュ値処理方法
Schiffman et al. Verifying system integrity by proxy
CN114818005B (zh) 一种Linux系统完整性检查方法与系统
CN113647053A (zh) 用于利用至少一个导出密钥配置安全模块的方法
US9785775B1 (en) Malware management
CN119788352B (zh) 端边设备的策略更新方法、装置、设备、介质及产品
JP7800561B2 (ja) ログ出力装置、ログ出力方法およびログ出力プログラム
JP6072584B2 (ja) サーバ装置およびプログラム管理方法
Ren et al. Tenants attested trusted cloud service
KR102386111B1 (ko) 보호되는 시크릿을 보안 부팅 업데이트에 걸쳐 보존하는 기법
Houlihan et al. An effective auditing scheme for cloud computing
Zlatkovski et al. A new real-time file integrity monitoring system for windows-based environments
JP5955165B2 (ja) 管理装置、管理方法及び管理プログラム
Van Oorschot et al. Reducing unauthorized modification of digital objects
CN114201761B (zh) 在可信计算系统中增强度量代理安全性
Corrick Progger 3: A low-overhead, tamper-proof provenance system
US11163909B2 (en) Using multiple signatures on a signed log
US20250232027A1 (en) Cloud managed confidential workload error recovery and reporting
US20260030368A1 (en) Systems, methods, and media for virtual disk devices

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20240508

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20250701

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20250829

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20251202

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20251215

R150 Certificate of patent or registration of utility model

Ref document number: 7800561

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150