18574401. LOG GENERATION APPARATUS, ABNORMALITY DETECTION SYSTEM, LOG GENERATION METHOD, AND NONTRANSITORY COMPUTER READABLE MEDIUM simplified abstract (NEC Corporation)
LOG GENERATION APPARATUS, ABNORMALITY DETECTION SYSTEM, LOG GENERATION METHOD, AND NONTRANSITORY COMPUTER READABLE MEDIUM
Organization Name
Inventor(s)
LOG GENERATION APPARATUS, ABNORMALITY DETECTION SYSTEM, LOG GENERATION METHOD, AND NONTRANSITORY COMPUTER READABLE MEDIUM - A simplified explanation of the abstract
This abstract first appeared for US patent application 18574401 titled 'LOG GENERATION APPARATUS, ABNORMALITY DETECTION SYSTEM, LOG GENERATION METHOD, AND NONTRANSITORY COMPUTER READABLE MEDIUM
The abstract describes a log generation apparatus that collects input operation logs and information logs to generate user operation logs and log groups for detecting abnormalities.
- Input operation log collection unit gathers logs of operation events from an input device.
- Information log collection unit collects logs of process events related to processing by an information apparatus connected to the input device.
- Generation unit creates user operation logs with application identification information inferred from the input operation logs.
- User operation log group is generated for anomaly detection, arranging logs in chronological order.
Potential Applications: - Monitoring and analyzing user interactions with applications. - Detecting anomalies or irregularities in user behavior. - Enhancing security measures by tracking user operations.
Problems Solved: - Efficiently tracking and analyzing user interactions with applications. - Improving anomaly detection and security measures. - Providing detailed logs for troubleshooting and auditing purposes.
Benefits: - Enhanced security through anomaly detection. - Improved user experience by analyzing application usage. - Detailed logs for troubleshooting and auditing.
Commercial Applications: Title: "Enhanced User Operation Log Generation for Security and Analysis" This technology can be applied in cybersecurity firms, software development companies, and IT departments for monitoring user activities, detecting anomalies, and improving security measures.
Questions about User Operation Log Generation: 1. How does this technology improve security measures through log generation?
- This technology enhances security by providing detailed logs for anomaly detection and tracking user operations.
2. What are the potential commercial applications of this log generation apparatus?
- The technology can be utilized in cybersecurity firms, software development companies, and IT departments for monitoring user activities and enhancing security measures.
Original Abstract Submitted
A log generation apparatus includes an input operation log collection unit that collects input operation logs in which an operation event of an input device is recorded; an information log collection unit that collects information logs in which a process event related to processing performed by an information apparatus connected to the input device is recorded, the information logs being different from the input operation logs; and a generation unit that generates, based on the information logs and the input operation logs, a user operation log including identification information of an application, the application being one which is inferred from the input operation logs and for which the processing is performed, and generates, as a log group for detecting an abnormality, a user operation log group including the user operation logs arranged in an order according to times of occurrences of operation events or process events.