Kabushiki kaisha toshiba (20240095371). INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM simplified abstract

From WikiPatents
Jump to navigation Jump to search

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

Organization Name

kabushiki kaisha toshiba

Inventor(s)

Tatsuya Uehara of Kawasaki Kanagawa (JP)

Jun Kanai of Inagi Tokyo (JP)

Ryuiti Koike of Kawasaki Kanagawa (JP)

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240095371 titled 'INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

Simplified Explanation

The information processing apparatus described in the abstract is a system designed to identify vulnerabilities in software by matching software identifiers with vulnerability information in a database, specifying causal components of vulnerabilities, determining the type of causal components, and providing investigation procedures for addressing the vulnerabilities.

  • The vulnerability database stores vulnerability information, including a vulnerability identifier, software identifier, and vulnerability description.
  • The matching processor identifies vulnerability information that matches the software identifier of a target software.
  • The causal component specifier specifies the causal component of the vulnerability from the vulnerability description.
  • The type determiner determines the type of the causal component based on its name.
  • The output processor determines an investigation procedure based on the software identifier and type of the causal component, and outputs information indicating the procedure.

Potential Applications

This technology can be applied in cybersecurity to identify and address vulnerabilities in software systems, enhancing overall security measures.

Problems Solved

This technology helps in proactively identifying and addressing vulnerabilities in software, reducing the risk of security breaches and data loss.

Benefits

The benefits of this technology include improved software security, enhanced protection against cyber threats, and increased confidence in the reliability of software systems.

Potential Commercial Applications

One potential commercial application of this technology is in the development of cybersecurity software tools that can automatically identify and address vulnerabilities in various software systems.

Possible Prior Art

One possible prior art for this technology could be vulnerability scanning tools used in cybersecurity to identify and address vulnerabilities in software systems.

Unanswered Questions

How does the system handle false positives in identifying vulnerabilities?

The system may need to have mechanisms in place to verify the accuracy of identified vulnerabilities and prevent false positives from causing unnecessary alarm or disruption.

What measures are taken to ensure the privacy and security of the vulnerability database?

It is important to consider how the vulnerability database is secured to prevent unauthorized access or tampering with sensitive vulnerability information.


Original Abstract Submitted

an information processing apparatus according to one embodiment, includes: a vulnerability database storing vulnerability information including a vulnerability identifier for uniquely specifying vulnerability, a software identifier for uniquely specifying software including the vulnerability, and vulnerability description indicating content of the vulnerability; a matching processor to specify, in the vulnerability database, vulnerability information matching a software identifier of a target software provided in target equipment; a causal component specifier to specify, from the vulnerability description in the vulnerability information specified by the matching processor, a causal component that is a cause of the vulnerability; a type determiner to determine a type of the causal component from a name of the specified causal component; and an output processor to determine, based on the software identifier of the target software and the type of the causal component, an investigation procedure concerning vulnerability of the target software and output information indicating the investigation procedure.