Retrieval device, monitoring device, monitoring method, and retrieval program
A data retrieval and two-party technology, applied in network data retrieval, secure communication devices, other database retrieval, etc., can solve the problem that sensor data contains confidential information and personal information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0044] use Figure 1 to Figure 10 This embodiment will be described.
[0045] ***Description of structure***
[0046] refer to figure 1 , the configuration of the hidden anomaly detection system 100 of this embodiment will be described.
[0047] In the present embodiment, the hidden anomaly detection system 100 is a system that performs threshold analysis in encrypted data using a public key searchable encryption method. That is, the hidden anomaly detection system 100 is a system that detects that data exceeds a specific threshold while the data is encrypted using a public key searchable encryption method.
[0048] The data to be analyzed by the threshold may be arbitrary data, but in this embodiment, it is power data. Hereinafter, power data obtained at intervals of 1 watt from 0 watts to 1,000 watts and which is abnormal if it is 901 watts or more is used as an example.
[0049] The hidden anomaly detection system 100 has a monitoring target system 101 , a retrieval de...
Embodiment approach 2
[0157] For this embodiment, use Figure 11 and Figure 12 Differences from Embodiment 1 will be mainly described.
[0158] ***Description of structure***
[0159] The structure and figure 1 Embodiment 1 shown is the same.
[0160] In Embodiment 1, the hidden anomaly detection system 100 is a system that performs threshold analysis in encrypted data using a public key searchable encryption method. On the other hand, in the present embodiment, the hidden anomaly detection system 100 is a system that performs threshold analysis in an encrypted state of data using a public key searchable encryption method. That is, the hidden anomaly detection system 100 is a system that detects that the data exceeds a specific threshold while the data is encrypted using the public key searchable encryption method.
[0161] The functional structure and hardware structure of each device of the concealed anomaly detection system 100 are respectively the same as figure 2 and image 3 Embodime...
Embodiment approach 3
[0180] For this embodiment, use Figure 13 ~ Figure 15 Differences from Embodiment 1 will be mainly described.
[0181] ***Description of structure***
[0182] The structure and figure 1 Embodiment 1 shown is the same.
[0183] In Embodiment 1, the hidden anomaly detection system 100 is a system that performs threshold analysis in encrypted data using a public key searchable encryption method. On the other hand, in the present embodiment, the hidden anomaly detection system 100 is a system that performs a schematic analysis of data waveforms in an encrypted state using a public key searchable encryption method. That is, the hidden anomaly detection system 100 is a system that analyzes the approximate shape of the data waveform in the encrypted state using the public key searchable encryption method. In addition, similarly to Embodiment 2, a public key searchable encryption method may be used instead of a public key searchable encryption method.
[0184] The data to be rou...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


