MY189366A - Device for outputting information for inspection and for analyzing system tendency through analysis and translation of computer operation log - Google Patents
Device for outputting information for inspection and for analyzing system tendency through analysis and translation of computer operation logInfo
- Publication number
- MY189366A MY189366A MYPI2018700792A MYPI2018700792A MY189366A MY 189366 A MY189366 A MY 189366A MY PI2018700792 A MYPI2018700792 A MY PI2018700792A MY PI2018700792 A MYPI2018700792 A MY PI2018700792A MY 189366 A MY189366 A MY 189366A
- Authority
- MY
- Malaysia
- Prior art keywords
- inspection
- translation
- analysis
- operation log
- outputting information
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Debugging And Monitoring (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The purpose of the present invention is to deter criminal acts by monitoring for, inspecting, and tracking such acts as the input of fraudulent records, falsification of accounting-related records, and unauthorized acquisition of confidential corporate information due to the common practice of using computers at work. An event log, an inspection log, a system log, and the like are decoded, analyzed, and translated into a human-understandable natural language (126) such that when and who did what can be ascertained at any time. (FIG. 10)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2015187392A JP6501159B2 (en) | 2015-09-04 | 2015-09-04 | Analysis and translation of operation records of computer devices, output of information for audit and trend analysis device of the system. |
| PCT/JP2016/068740 WO2017038221A1 (en) | 2015-09-04 | 2016-06-17 | Device for outputting information for inspection and for analyzing system tendency through analysis and translation of computer operation log |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MY189366A true MY189366A (en) | 2022-02-07 |
Family
ID=58188868
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MYPI2018700792A MY189366A (en) | 2015-09-04 | 2016-06-17 | Device for outputting information for inspection and for analyzing system tendency through analysis and translation of computer operation log |
Country Status (5)
| Country | Link |
|---|---|
| JP (1) | JP6501159B2 (en) |
| MY (1) | MY189366A (en) |
| SG (1) | SG11201801619RA (en) |
| TW (1) | TWI722001B (en) |
| WO (1) | WO2017038221A1 (en) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114661691B (en) * | 2020-12-23 | 2025-02-14 | Tcl商用信息科技(惠州)有限责任公司 | A database information push method, intelligent terminal and storage medium |
| CN113076296B (en) * | 2021-03-30 | 2024-06-07 | 咪咕文化科技有限公司 | Log generation method and device, electronic equipment and storage medium |
| CN113535519B (en) * | 2021-07-27 | 2024-01-30 | 浪潮软件科技有限公司 | Monitoring alarm method |
| JP7677544B2 (en) * | 2023-05-08 | 2025-05-15 | コニカミノルタ株式会社 | Information analysis system, information analysis method and program |
| JP7547594B1 (en) | 2023-10-31 | 2024-09-09 | 株式会社アシュアード | Information processing device and information processing method |
Family Cites Families (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101529908A (en) * | 2006-10-25 | 2009-09-09 | 夏普株式会社 | Content delivery server, content providing server, content delivery system, content delivery method, content providing method, terminal device, control program and computer readable recording medium |
| CN101339551B (en) * | 2007-07-05 | 2013-01-30 | 日电(中国)有限公司 | Natural language query requirement expansion equipment and method thereof |
| CN101093509B (en) * | 2007-07-18 | 2010-06-16 | 中国科学院计算技术研究所 | A query interaction system and method |
| JP2010262491A (en) * | 2009-05-08 | 2010-11-18 | Hitachi Ltd | Log aggregator |
| EP2438542A2 (en) * | 2009-06-05 | 2012-04-11 | West Services, Inc. | Feature engineering and user behavior analysis |
| JP5381542B2 (en) * | 2009-09-17 | 2014-01-08 | 日本電気株式会社 | Unauthorized access detection device, unauthorized access detection program, and unauthorized access detection method |
| JP5478390B2 (en) * | 2010-07-12 | 2014-04-23 | Kddi株式会社 | Log extraction system and program |
| JP2012208565A (en) * | 2011-03-29 | 2012-10-25 | Sumitomo Electric System Solutions Co Ltd | Log management method, log management device, and program |
| US8776241B2 (en) * | 2011-08-29 | 2014-07-08 | Kaspersky Lab Zao | Automatic analysis of security related incidents in computer networks |
| JP5712102B2 (en) * | 2011-10-12 | 2015-05-07 | 日本電信電話株式会社 | Log collection system, method and program |
| JP2013152657A (en) * | 2012-01-26 | 2013-08-08 | Kyocera Document Solutions Inc | Log conversion program, and information processing device |
| JP5642725B2 (en) * | 2012-02-22 | 2014-12-17 | 日本電信電話株式会社 | Performance analysis apparatus, performance analysis method, and performance analysis program |
| US20140120513A1 (en) * | 2012-10-25 | 2014-05-01 | International Business Machines Corporation | Question and Answer System Providing Indications of Information Gaps |
| JP5974856B2 (en) * | 2012-11-27 | 2016-08-23 | 富士通株式会社 | Sampling program, sampling method and information processing apparatus |
| JP2015141472A (en) * | 2014-01-27 | 2015-08-03 | 株式会社東芝 | Information processing apparatus and information processing program |
-
2015
- 2015-09-04 JP JP2015187392A patent/JP6501159B2/en active Active
-
2016
- 2016-06-17 WO PCT/JP2016/068740 patent/WO2017038221A1/en not_active Ceased
- 2016-06-17 MY MYPI2018700792A patent/MY189366A/en unknown
- 2016-06-17 SG SG11201801619RA patent/SG11201801619RA/en unknown
- 2016-07-25 TW TW105123384A patent/TWI722001B/en active
Also Published As
| Publication number | Publication date |
|---|---|
| WO2017038221A1 (en) | 2017-03-09 |
| JP6501159B2 (en) | 2019-04-17 |
| TW201719474A (en) | 2017-06-01 |
| JP2017049962A (en) | 2017-03-09 |
| TWI722001B (en) | 2021-03-21 |
| SG11201801619RA (en) | 2018-03-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MY189366A (en) | Device for outputting information for inspection and for analyzing system tendency through analysis and translation of computer operation log | |
| EP4270875A3 (en) | Security weakness and infiltration detection and repair in obfuscated website content | |
| MY189945A (en) | Statistical analytic method for the determination of the risk posed by file based content | |
| BR112018001523A2 (en) | laser sensor module, human interface device, mobile communication device, method for detecting at least two physical parameters and computer program product | |
| MY159100A (en) | Apparatus, system and method for detecting and preventing malicious scripts using code pattern-based static analysis and api flow-based dynamic analysis | |
| BRPI1004942A8 (en) | DATA PROCESSING SYSTEM, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND METHOD FOR PERFORMING A WRITE MECHANISM | |
| SG10201901587VA (en) | Application testing | |
| BR112016001934A2 (en) | METHOD FOR EXPLORATION AND PRODUCTION OF OIL AND GAS, NON-TRANSITORY MACHINE READABLE STORAGE DEVICE, AND SYSTEM FOR EXPLORATION AND PRODUCTION OF OIL AND GAS | |
| AR108833A1 (en) | SYSTEM AND METHOD OF DETERIORATION DETECTION | |
| WO2014194237A3 (en) | Systems and methods for remote analysis of software applications | |
| WO2018016671A3 (en) | Dangerous code detection system for checking security vulnerability and method thereof | |
| MY167959A (en) | System and method for semantic-level sentiment analysis of text | |
| BR112016026195A8 (en) | method to identify potential malicious program, system to identify malicious activity and computer readable storage medium | |
| TH1801001329A (en) | A device for exporting information for monitoring and analyzing system trends through the analysis and translation of computer operating logs. | |
| Xue et al. | Detecting hardware Trojan through feature extraction in subspace domain | |
| Cabral et al. | The record of the Metacopina (Ostracoda, Crustacea) extinction in the Toarcian of Rabaçal, Coimbra region | |
| Ortiz | Automated Penetration Analysis and Reporting Tool (APART) | |
| Aweke | Leveraging Processor Features for System Security | |
| Della et al. | The effects of the employee’s perceived safety behavior in ferry services | |
| Hu et al. | A detection method and system implementation for Android malware | |
| Manjoo | Apple stance highlights a scrappier tech industry; In long run, companies have upper hand in their battles with Washington. | |
| Klaus et al. | Retrieving the state of the art and of the practice in QA for data inconsistencies | |
| McArthur | Conceptions of difference within theories of social justice: Implications for higher education research | |
| Knutson | Digital Forensics: Is the Methodology Correct? | |
| Park et al. | An automatic detection scheme of anti-debugging routines to the environment for analysis |