ILLICIT OPERATION SENSING METHOD AND COMPUTER THAT SENSES ILLICIT OPERATION

A client computer senses a user operation for sending data to either a server or a memory device, determines whether the sensed user operation is an illicit operation, and if the result of the determination is in the affirmative, carries out a security process, which is a process relating to the sec...

Full description

Saved in:
Bibliographic Details
Main Authors ISOKAWA, HIROMI, ONODERA, NOBUAKI, KAYASHIMA, MAKOTO, TSUNOO, SHINICHI, NAKAGOE, HIROSHI, SUZUKI, NORIO
Format Patent
LanguageEnglish
French
Japanese
Published 05.01.2012
Subjects
Online AccessGet full text

Cover

Loading…
Abstract A client computer senses a user operation for sending data to either a server or a memory device, determines whether the sensed user operation is an illicit operation, and if the result of the determination is in the affirmative, carries out a security process, which is a process relating to the security of the data being sent. If the data is data within a group of which the user is a member, and the destination of the data is either a server or memory device outside the group, then the result of the determination will be in the affirmative. Un ordinateur client détecte une opération de transmission de données par un utilisateur à un serveur ou à un dispositif mémoire, évalue si l'opération détectée de l'utilisateur est une opération illicite et, si le résultat de l'évaluation est positif, exécute une procédure de sécurité portant sur la sécurité des données transmises. Si les données appartiennent à un groupe dont l'utilisateur est membre et les données sont destinées à un serveur ou à un dispositif mémoire en dehors du groupe, le résultat de l'évaluation sera positif.
AbstractList A client computer senses a user operation for sending data to either a server or a memory device, determines whether the sensed user operation is an illicit operation, and if the result of the determination is in the affirmative, carries out a security process, which is a process relating to the security of the data being sent. If the data is data within a group of which the user is a member, and the destination of the data is either a server or memory device outside the group, then the result of the determination will be in the affirmative. Un ordinateur client détecte une opération de transmission de données par un utilisateur à un serveur ou à un dispositif mémoire, évalue si l'opération détectée de l'utilisateur est une opération illicite et, si le résultat de l'évaluation est positif, exécute une procédure de sécurité portant sur la sécurité des données transmises. Si les données appartiennent à un groupe dont l'utilisateur est membre et les données sont destinées à un serveur ou à un dispositif mémoire en dehors du groupe, le résultat de l'évaluation sera positif.
Author NAKAGOE, HIROSHI
TSUNOO, SHINICHI
SUZUKI, NORIO
ONODERA, NOBUAKI
KAYASHIMA, MAKOTO
ISOKAWA, HIROMI
Author_xml – fullname: ISOKAWA, HIROMI
– fullname: ONODERA, NOBUAKI
– fullname: KAYASHIMA, MAKOTO
– fullname: TSUNOO, SHINICHI
– fullname: NAKAGOE, HIROSHI
– fullname: SUZUKI, NORIO
BookMark eNrjYmDJy89L5WTw9vTx8XT2DFHwD3ANcgzx9PdTCHb1C_b0c1fwdQ3x8HdRcPRzUXD29w0IDXENUgjxcAwBK3ANVsDQycPAmpaYU5zKC6W5GZTdXEOcPXRTC_LjU4sLEpNT81JL4sP9jQwMjQwMDM3NTB0NjYlTBQCLuTCC
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
DocumentTitleAlternate PROCÉDÉ ET ORDINATEUR PERMETTANT LA DÉTECTION D'OPÉRATIONS ILLICITES
ExternalDocumentID WO2012001765A1
GroupedDBID EVB
ID FETCH-epo_espacenet_WO2012001765A13
IEDL.DBID EVB
IngestDate Fri Jul 19 11:41:35 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
French
Japanese
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_WO2012001765A13
Notes Application Number: WO2010JP61013
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20120105&DB=EPODOC&CC=WO&NR=2012001765A1
ParticipantIDs epo_espacenet_WO2012001765A1
PublicationCentury 2000
PublicationDate 20120105
PublicationDateYYYYMMDD 2012-01-05
PublicationDate_xml – month: 01
  year: 2012
  text: 20120105
  day: 05
PublicationDecade 2010
PublicationYear 2012
RelatedCompanies HITACHI, LTD
NAKAGOE, HIROSHI
TSUNOO, SHINICHI
SUZUKI, NORIO
ONODERA, NOBUAKI
KAYASHIMA, MAKOTO
ISOKAWA, HIROMI
RelatedCompanies_xml – name: KAYASHIMA, MAKOTO
– name: ONODERA, NOBUAKI
– name: ISOKAWA, HIROMI
– name: HITACHI, LTD
– name: TSUNOO, SHINICHI
– name: NAKAGOE, HIROSHI
– name: SUZUKI, NORIO
Score 2.942164
Snippet A client computer senses a user operation for sending data to either a server or a memory device, determines whether the sensed user operation is an illicit...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
Title ILLICIT OPERATION SENSING METHOD AND COMPUTER THAT SENSES ILLICIT OPERATION
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20120105&DB=EPODOC&locale=&CC=WO&NR=2012001765A1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_G_HzTqfgxJaD0rdiua2sehmxpZqf0A9fp3kaataDINlzFf99rtulA2OPl40hCLpff5e4CcGOMBeIKQfU7hwq9mVoNXbhS6FLmJhKGyM0y3jkIHX_QfBzawwp8rGJhVJ7Qb5UcESVKorwX6rye_RmxPOVbOb9N37Boet9NWp62RMdm-bZra16nxePIi5jGGOI2LXxe1OHuc-w2YqUtvEi7pQMYf-mUcSmzdaXSPYDtGPlNikOovIsa7LHV32s12A2WT9412FE-mnKOhUs5nB_BU4nBWS8hUcwXVibS52G_Fz6QgCd-5JF26BEWBfEAr6sk8duJasD75F_PY7ju8oT5Oo5v9Lsco9dofTLWCVQn00l2CsS1ZEbNVLpm6japa1DLsQVCqryRU0Ma9Azqmzidb66-gP2SVOYHuw7V4vMru0SFXKRXah1_AH0Whzw
link.rule.ids 230,309,783,888,25578,76884
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT8IwEL8Q_MA3RQ0qahPN3hY3xjb6QAxsxSHsIzKUN9JVlmgMEJnx3_dWQElMeGyvvbRNr9ffXe8KcKu9csQVnKoNi3K1nhg1lduCq0KkOhY0nup5vLMfWN6w_jgyRwX4WMfCyDyh3zI5IkqUQHnP5Hk9_zNiufJt5eIuecOq2X0nbrrKCh3ruW_XVNx2k0WhGzqK4yBuU4KnJQ13n2W2ECvt4CW7kWfaZ8_tPC5lvqlUOoewGyG_aXYEhXdehpKz_nutDPv-yuVdhj35RlMssHIlh4tj6OUY3OnGJIzY0spEBiwYdIMH4rPYC13SClzihH40xOsqib1WLBuwAfnX8wRuOix2PBXHN_5djvFLuDkZ4xSK09l0UgFiG2JC9UTYemLXqa1RwzI5Qqq0llJNaPQMqts4nW8nX0PJi_3-uN8NehdwkJOkKcKsQjH7_JpconLOkiu5pj_9goos
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=ILLICIT+OPERATION+SENSING+METHOD+AND+COMPUTER+THAT+SENSES+ILLICIT+OPERATION&rft.inventor=ISOKAWA%2C+HIROMI&rft.inventor=ONODERA%2C+NOBUAKI&rft.inventor=KAYASHIMA%2C+MAKOTO&rft.inventor=TSUNOO%2C+SHINICHI&rft.inventor=NAKAGOE%2C+HIROSHI&rft.inventor=SUZUKI%2C+NORIO&rft.date=2012-01-05&rft.externalDBID=A1&rft.externalDocID=WO2012001765A1