Patent application number | Description | Published |
20110106951 | Dividing cloud computing service into individual jobs such that legal auditing requirements are satisfied and presenting plan for distributed execution of individual jobs - A computer network connects to a first computer, a second computer, other multiple computers, and a job category database A service to be executed by any of the other multiple computers is divided into multiple jobs; the job category is associated with each of the divided jobs; a region code and an instruction to execute the service are received from the first computer; and for each of the multiple jobs, the job category database is searched with the received region code and the associated job category as keys to acquire the operation identifier list corresponding to the job; the operation identifier list is transmitted to at least one of the other multiple computers; and a combination of the job, the identifier of that other computer and the identifier list are transmitted to the first computer. | 05-05-2011 |
20120166485 | Information Processor, Privilege Management Method, Program, and Recording Medium - In an information technology (IT) environment, a technique to manage privileges given to personnel to whom a process is assigned. An information processor includes: a configuration management database that stores resources, personnel, processes, and privileges provided on the resources as configuration items, respectively, the configuration management database prescribing relations between the configuration items including a privilege-dependency relationship between a privilege on a resource and a privilege on another resource required to exercise the privilege, a privilege-request relationship between a process and a privilege required for the process, and a privilege-giving relationship between the personnel and the privilege given to the personnel; and a privilege deriving unit for deriving a goal state of a privilege to be given to corresponding personnel by following the relation with the privilege on the resource required for a process to be executed used as a reference point by referring to the configuration management database. | 06-28-2012 |
Patent application number | Description | Published |
20080320495 | SYSTEM AND METHOD FOR DETECTING PATTERN OF EVENTS OCCURRED IN INFORMATION SYSTEM - There is provided a system having a plurality of information processing apparatuses, each of which includes a storage device where at least one piece of pattern data indicating an occurrence pattern of events to be detected in the information processing apparatus is stored, a generation section that specifies a collection of events to be detected in the occurrence pattern based on the pattern data read from the storage device and generates necessary event data indicating the specified collection of events, a selection section that selects an event included in the necessary event data from events which have occurred in the information processing apparatus and events transferred from another information processing apparatus, and a detection section that detects if the selected event matches with the occurrence pattern indicated by the pattern data, and outputs a detection result. | 12-25-2008 |
20090172034 | ENABLING SYMPTOM VERIFICATION - Systems, products and methods for enabling symptom verification. Verifying a symptom may include eliminating repeated symptom definitions or eliminating symptoms having low accuracy. A computer system enables verification of a symptom including a rule for detecting a set of events related to a given problem. The computer system includes a symptom database which stores the symptom, a specimen database which stores a specimen including a set of events detected according to a rule of a certain symptom, and an analysis unit which analyzes the specimen stored in the specimen database using a new symptom in order to determine whether to add the new symptom to the symptom database. The present disclosure also includes a method and a computer program for enabling verification of a symptom including a rule for detecting a set of events related to a given problem. | 07-02-2009 |
20090210435 | CONFIGURATION ITEM MANAGEMENT TOOL - A computer system is presented for managing a plurality of configuration items. A first computer may be connected to a second computer over a network. The first computer may manage configuration items conforming to a first specification, while the second computer may manage configuration items conforming to a second specification. A repository may store, for each of the configuration items, a set of data conforming to the first specification. The set of data may include one or more predetermined attributes of each configuration item, and at least one relationship between each configuration item and other configuration items. A discovery section may detect external reference data associated with configuration items conforming to the second specification. The set of data for each configuration item conforming to the second specification may be created from the external reference data and stored in the repository. | 08-20-2009 |
20090327630 | SOFTWARE CONFIGURATION ITEM BACK-UP FACILITY - A system may identify a second software configuration item for possible backup in response to selection of a first software configuration item for backup, where the first and second software configuration items are related. The system may include a detecting unit for detecting information regarding at least one hardware and at least two software configuration items. A repository may store a set of data for each configuration item based on the detected information. The set of data may include a predetermined attribute of the configuration item and a relation between the configuration item and another configuration item. An identifying unit may then identify the second software configuration item from the attribute and/or the relation upon selection of the first software configuration item for backup. | 12-31-2009 |
20100057780 | ACTION EXECUTION MANAGEMENT FACILITY FOR SERVICE CONFIGURATION ITEMS - A system for managing execution of actions corresponding to service configuration items in accordance with embodiments of the invention may include a discovery section for discovering information regarding a configuration item, and a repository for storing a set of data for each configuration item. The set of data may indicate at least one predetermined attribute of the configuration item, and a relation between the configuration item and other configuration items. An associating section may associate a service configuration item with one or more other configuration items that are objects of actions corresponding to the service configuration item. Finally, a determining section may determine whether execution of an action corresponding to a service configuration item is allowed. Such a determination may be made when a request for an action corresponding to a second configuration item is issued during execution of an action corresponding to a first service configuration item, or when a configuration item that is the object of the action corresponding to the second service configuration item is included in a configuration item that is the object of the action corresponding to the first service configuration item. | 03-04-2010 |
20100106436 | POWER CONSUMPTION CALCULATION FACILITY - Embodiments of the invention include an apparatus for calculating an index value indicating power consumption, processing cost, or environmental load in a system having hardware components used by multiple processes or users. The apparatus may include an index acquisition part for acquiring an index value of a hardware component. The index value may indicate power consumption of the hardware component. The apparatus may further include an observation value acquisition part for acquiring one or more observation values for multiple processes. The observation value for each process may vary depending on use of the hardware component by the process. Finally, a calculation part may calculate, based on the observation value, a use amount of the hardware component by each process. The calculation part may further calculate the index value for a process using the hardware component by distributing the index value according to the use amount. | 04-29-2010 |
20100131952 | Assistance In Performing Action Responsive To Detected Event - Assistance in performing an action for a detected event for a monitoring target resource whose connection is not an always-on connection to perform an appropriate action as soon as possible in response to occurrence of a failure. The assistance device stores, in association with an occurrence pattern of an event, information related to plural tasks for determining whether a predetermined condition is fulfilled, and an action to be performed by a corresponding device. Then, the assistance device calculates an index value for determining the level of probability of the occurrence pattern of the event, determines whether the calculated index value is larger than a predetermined value, and sends, to a device to perform the action, the occurrence pattern of the event the index value of which is determined to be larger than the predetermined value, and information related to the plural tasks and the action corresponding to the occurrence pattern. | 05-27-2010 |
20120272308 | MANAGEMENT SYSTEM, MANAGEMENT METHOD AND MANAGEMENT PROGRAM FOR MANAGING INDUSTRIAL CONTROL SYSTEM - A system and method of an appropriate countermeasure at the time of anomaly. The management system for an industrial control system includes a control apparatus, a control network connected to the control apparatus, and multiple devices controlled by the control apparatus via the control network, the management system includes multiple firewall modules provided for each of control zones each controlling one part of the industrial control system, the firewall modules relaying communication between devices in the control zones and the control network; an event analyzing module collecting events from each of the multiple firewall modules and analyzing the events to detect an anomaly of each of the control zones, and a communication managing module changing a communication operation performed via the firewall module provided for the control zone where an anomaly has been detected. | 10-25-2012 |
20120317636 | MANAGEMENT SYSTEM, MANAGEMENT METHOD AND MANAGEMENT PROGRAM FOR MANAGING INDUSTRIAL CONTROL SYSTEM - A system and method of an appropriate countermeasure at the time of anomaly. The management system for an industrial control system includes a control apparatus, a control network connected to the control apparatus, and multiple devices controlled by the control apparatus via the control network, the management system includes multiple firewall modules provided for each of control zones each controlling one part of the industrial control system, the firewall modules relaying communication between devices in the control zones and the control network; an event analyzing module collecting events from each of the multiple firewall modules and analyzing the events to detect an anomaly of each of the control zones, and a communication managing module changing a communication operation performed via the firewall module provided for the control zone where an anomaly has been detected. | 12-13-2012 |
Patent application number | Description | Published |
20080320326 | SYSTEM FOR DETECTING PATTERN OF EVENTS OCCURRED IN INFORMATION SYSTEM - There is provided a system having a plurality of information processing apparatuses, each of which comprises a storage device that stores, for each occurrence pattern of events to be detected, a plurality of tasks for respectively determining whether a plurality of conditions are fulfilled; a process determination section that, in response to occurrence of an event, reads a plurality of tasks corresponding to the occurrence pattern including the event from the storage device, and determines which information processing apparatus is caused to process each of the read tasks; a process execution section that processes a task determined to be processed by that information processing apparatus, and instructs another information processing apparatus to process a task determined to be processed by the other information processing apparatus; and a detection section that determines that the event has occurred in the predetermined occurrence pattern under a condition that process results of the processed task and the task allowed to be processed by the other information processing apparatus fulfill the plurality of conditions. | 12-25-2008 |
20090150716 | METHOD FOR MONITORING AND MANAGING A CLIENT DEVICE IN A DISTRIBUTED AUTONOMIC COMPUTING ENVIRONMENT - A stale of a managed client device in a distributed autonomic computing environment is attached to an event occurring on the managed client device. The event is sent, with the attached state of the managed client device, to a server. The state of the managed client device is saved at the server. The event is analyzed for identifying a problem at the client device. An action for solving the problem is generated based on a state of the managed client device at the time the event is analyzed. An execution condition is dynamically generated based on the saved state of the managed client device. The execution condition is added to the action to be executed and sent to the managed client device. At the managed client device, a determination is made whether to execute the action based on the execution condition and a current state of the managed client device. | 06-11-2009 |
20090187595 | MANAGING CONFIGURATION ITEMS - There is provided a method for managing a plurality of configuration items. The method includes holding, at a repository, for each configuration item, one set of data indicating at least one predetermined attribute of the configuration item and a relationship with another configuration item. The method also includes detecting, at a discovery section, information on configuration items. The discovery section performs subsequent detection based on at least one of a predetermined attribute and a predetermined relationship in a new set of data created from the information detected by the discovery section. | 07-23-2009 |
20090187596 | Managing Configuration Items - A computer system is disclosed that includes a repository, a discovery section, a determining section, and a data creating section. The repository holds, for each configuration item, data indicating at least one predetermined attribute of the configuration item and a relationship with another configuration item. The discovery section detects information on configuration items. The determining section determines association of a first configuration item with a second configuration item and association of the first configuration item with a third configuration item. The data creating section creates common data including an attribute common to attributes of the first configuration item associated with the second configuration item and attributes of the first configuration item associated with the third configuration item and plural derived data items, each including an attribute that is not common thereto. The common data and the plural derived data items are stored in the repository. | 07-23-2009 |
20100106821 | MANAGING CONFIGURATION ITEMS - There is provided a method for managing a plurality of configuration items that includes a repository that holds, for each configuration item, one set of data indicating at least one predetermined attribute of the configuration item and a relationship with another configuration item and a discovery section that detects information on configuration items. The method includes creating at least one new set of data from information detected by the discovery section. The method also includes storing the new set of data in the repository and managing the new set of data as a combined configuration item. | 04-29-2010 |
20110131300 | COMPUTER SYSTEM FOR MANAGING CONFIGURATION ITEM, AND METHOD AND COMPUTER PROGRAM THEREFOR - There is provided a method for managing a plurality of configuration items. The method includes holding, at a repository, for each configuration item, one set of data indicating at least one predetermined attribute of the configuration item and a relationship with another configuration item. The method also includes detecting, at a discovery section, information on configuration items. The discovery section performs subsequent detection based on at least one of a predetermined attribute and a predetermined relationship in a new set of data created from the information detected by the discovery section. | 06-02-2011 |
Patent application number | Description | Published |
20090216786 | Managing Service Processes - Computer systems, methods and computer program products for managing a service process that includes a plurality of service steps. A repository holds, for each of at least one configuration item, a set of data that represents at least one predetermined attribute of the configuration item and a relation between the configuration item and a second configuration item. The method includes detecting data on a resource for executing at least one of a plurality of service steps of the service process; creating in response to a particular service process starting, data using a first configuration item model in which the particular service process is defined as a single configuration item; and creating data from the detected data using a second configuration item model in which one or more particular service steps are defined as a single configuration item. | 08-27-2009 |
20130132414 | IMAGE INFORMATION SEARCH - To inform a user that image data including an image of the user or the like is posted on a network, an information providing apparatus includes an acquisition unit for acquiring an action log including a history of a set of a user's positions and dates and times when the user was at the positions. The apparatus further includes a search unit for searching for image data that has been captured at a location and a date and time corresponding to a position of the user and a date and time included in the action log from image data posted on a network. The apparatus also includes a matching unit for detecting image data that includes an image relating to the user from pieces of image data found by the search unit. | 05-23-2013 |
20140195677 | DETECTING PATTERNS OF EVENTS IN INFORMATION SYSTEMS - Event data pattern identification, storage, and sharing in a peer-to-peer network is disclosed. This includes peer-to-peer devices that store data events, review previously stored data events and identify patterns between the stored events and newly received events. Improvements can serve to reduce duplicative traffic and enhance network performance. | 07-10-2014 |
Patent application number | Description | Published |
20120095797 | Method of Managing Access Right, and System and Computer Program for the Same - A method of managing an access right to at least one asset associated with at least one digital work order, to at least one first element associated with the at least one asset, or to at least one second element associated with an access path to the at least one asset or the first element, and relates to a system and a computer program for the same. | 04-19-2012 |
20120095926 | Method of Managing Asset Associated with Work Order or Element Associated with Asset, and System and Computer Program for the Same - A method, system and computer program of managing an access right to at least one asset associated with at least one digital work order, or to at least one element associated with the asset, and provides a system and a computer program for the same. The method includes the steps of: loading a security policy associated with the work order, the asset, or the element; starting to monitor location information of the asset or the element and a moving object, or a elapsed time of the moving object at the location; and issuing an event for managing the asset, the element or the moving object in response to the start of the work order or in response to the fact that the loaded security policy is violated by any of the locations, a change in the location, or the elapsed time at the location obtained by the monitoring. | 04-19-2012 |
20120209411 | Abnormality Detection for Isolating a Control System - A mechanism is provided for effectively detecting an abnormality occurring in a control system and isolating the control system in which abnormality is acknowledged. The mechanism receives, from one or more control systems in the plurality of control systems, respective abnormality notifications for respective counter control systems to be monitored by the plurality of control systems. The mechanism adds up abnormality notifications transmitted from respective monitoring sections of the plurality of control systems so as to evaluate the reputation of a control system suspected to have an abnormality. The mechanism causes a protected area for operating the control system suspected to have an abnormality to restrict outbound traffic from at least the inside of the protected area, when an indication is identified that the control system is abnormal according to criteria from a result of the evaluation. | 08-16-2012 |
20120210158 | Anomaly Detection to Implement Security Protection of a Control System - An anomaly detection mechanism is provided that detects an anomaly in a control network, and includes an identifying unit to receive event information on an event that occurs, and to identify a group including a resource related to the event information by referring to a configuration management database for retaining dependence relationships between processes and resources including a control system; a policy storing unit to store one or more policies each of which associates one or more actions with a condition defining a situation suspected to have an anomaly; an adding unit to acquire group-related information needed for application to the one or more policies, and to add the acquired information to the event information; and a determining unit to apply the event information to the one or more policies and to determine the one or more actions associated with the matched condition as one or more actions to be taken. | 08-16-2012 |
20120296685 | Method of Managing Access Right, and System for Computer Program for the Same - A method of managing an access right to at least one asset associated with at least one digital work order, to at least one first element associated with the at least one asset, or to at least one second element associated with an access path to the at least one asset or the first element, and relates to a system and a computer program for the same. | 11-22-2012 |
20120297445 | Method of Managing Asset Associated with Work Order or Element Associated with Asset, and System and Computer Program for the Same - A method, system and computer program of managing an access right to at least one asset associated with at least one digital work order, or to at least one element associated with the asset, and provides a system and a computer program for the same. The method includes the steps of: loading a security policy associated with the work order, the asset, or the element; starting to monitor location information of the asset or the element and a moving object, or a elapsed time of the moving object at the location; and issuing an event for managing the asset, the element or the moving object in response to the start of the work order or in response to the fact that the loaded security policy is violated by any of the locations, a change in the location, or the elapsed time at the location obtained by the monitoring. | 11-22-2012 |
20130150985 | Abnormality Detection for Isolating a Control System - A mechanism is provided for effectively detecting an abnormality occurring in a control system and isolating the control system in which abnormality is acknowledged. The mechanism receives, from one or more control systems in the plurality of control systems, respective abnormality notifications for respective counter control systems to be monitored by the plurality of control systems. The mechanism adds up abnormality notifications transmitted from respective monitoring sections of the plurality of control systems so as to evaluate the reputation of a control system suspected to have an abnormality. The mechanism causes a protected area for operating the control system suspected to have an abnormality to restrict outbound traffic from at least the inside of the protected area, when an indication is identified that the control system is abnormal according to criteria from a result of the evaluation. | 06-13-2013 |
20130152198 | Anomaly Detection To Implement Security Protection of a Control System - An anomaly detection mechanism is provided that detects an anomaly in a control network, and includes an identifying unit to receive event information on an event that occurs, and to identify a group including a resource related to the event information by referring to a configuration management database for retaining dependence relationships between processes and resources including a control system; a policy storing unit to store one or more policies each of which associates one or more actions with a condition defining a situation suspected to have an anomaly; an adding unit to acquire group-related information needed for application to the one or more policies, and to add the acquired information to the event information; and a determining unit to apply the event information to the one or more policies and to determine the one or more actions associated with the matched condition as one or more actions to be taken. | 06-13-2013 |