18175728. INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM simplified abstract (KABUSHIKI KAISHA TOSHIBA)

From WikiPatents
Jump to navigation Jump to search

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

Organization Name

KABUSHIKI KAISHA TOSHIBA

Inventor(s)

Tatsuya Uehara of Kawasaki Kanagawa (JP)

Jun Kanai of Inagi Tokyo (JP)

Ryuiti Koike of Kawasaki Kanagawa (JP)

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18175728 titled 'INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

Simplified Explanation

The patent application describes an information processing apparatus that matches vulnerability information with target software to determine investigation procedures for vulnerabilities.

  • The apparatus includes a vulnerability database storing vulnerability information, a matching processor, a causal component specifier, a type determiner, and an output processor.
  • The matching processor specifies vulnerability information matching a software identifier of a target software.
  • The causal component specifier identifies a causal component that is a cause of the vulnerability from the vulnerability description.
  • The type determiner determines the type of the causal component.
  • The output processor determines an investigation procedure based on the software identifier and the type of the causal component.

Potential Applications

This technology could be applied in cybersecurity systems to efficiently identify and address vulnerabilities in software systems.

Problems Solved

This technology helps in automating the process of identifying and investigating vulnerabilities in software, saving time and resources for organizations.

Benefits

The benefits of this technology include improved security measures, faster response to vulnerabilities, and enhanced protection of sensitive data.

Potential Commercial Applications

One potential commercial application of this technology could be in the development of cybersecurity software tools for businesses to enhance their security measures.

Possible Prior Art

One possible prior art for this technology could be vulnerability scanning tools that are used to identify vulnerabilities in software systems.

What are the specific types of vulnerabilities that can be identified using this technology?

This technology can identify various types of vulnerabilities such as buffer overflow, SQL injection, cross-site scripting, and other common security vulnerabilities in software systems.

How does this technology compare to existing vulnerability scanning tools in terms of accuracy and efficiency?

This technology offers a more targeted approach to vulnerability identification by matching specific software identifiers with vulnerability information, leading to more accurate and efficient investigation procedures compared to traditional vulnerability scanning tools.


Original Abstract Submitted

An information processing apparatus according to one embodiment, includes: a vulnerability database storing vulnerability information including a vulnerability identifier for uniquely specifying vulnerability, a software identifier for uniquely specifying software including the vulnerability, and vulnerability description indicating content of the vulnerability; a matching processor to specify, in the vulnerability database, vulnerability information matching a software identifier of a target software provided in target equipment; a causal component specifier to specify, from the vulnerability description in the vulnerability information specified by the matching processor, a causal component that is a cause of the vulnerability; a type determiner to determine a type of the causal component from a name of the specified causal component; and an output processor to determine, based on the software identifier of the target software and the type of the causal component, an investigation procedure concerning vulnerability of the target software and output information indicating the investigation procedure.