Unlock instant, AI-driven research and patent intelligence for your innovation.

Retrieval device, monitoring device, monitoring method, and retrieval program

A data retrieval and two-party technology, applied in network data retrieval, secure communication devices, other database retrieval, etc., can solve the problem that sensor data contains confidential information and personal information

Inactive Publication Date: 2019-09-10
MITSUBISHI ELECTRIC CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, sensor data has the potential to contain confidential and personal information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Retrieval device, monitoring device, monitoring method, and retrieval program
  • Retrieval device, monitoring device, monitoring method, and retrieval program
  • Retrieval device, monitoring device, monitoring method, and retrieval program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0044] use Figure 1 to Figure 10 This embodiment will be described.

[0045] ***Description of structure***

[0046] refer to figure 1 , the configuration of the hidden anomaly detection system 100 of this embodiment will be described.

[0047] In the present embodiment, the hidden anomaly detection system 100 is a system that performs threshold analysis in encrypted data using a public key searchable encryption method. That is, the hidden anomaly detection system 100 is a system that detects that data exceeds a specific threshold while the data is encrypted using a public key searchable encryption method.

[0048] The data to be analyzed by the threshold may be arbitrary data, but in this embodiment, it is power data. Hereinafter, power data obtained at intervals of 1 watt from 0 watts to 1,000 watts and which is abnormal if it is 901 watts or more is used as an example.

[0049] The hidden anomaly detection system 100 has a monitoring target system 101 , a retrieval de...

Embodiment approach 2

[0157] For this embodiment, use Figure 11 and Figure 12 Differences from Embodiment 1 will be mainly described.

[0158] ***Description of structure***

[0159] The structure and figure 1 Embodiment 1 shown is the same.

[0160] In Embodiment 1, the hidden anomaly detection system 100 is a system that performs threshold analysis in encrypted data using a public key searchable encryption method. On the other hand, in the present embodiment, the hidden anomaly detection system 100 is a system that performs threshold analysis in an encrypted state of data using a public key searchable encryption method. That is, the hidden anomaly detection system 100 is a system that detects that the data exceeds a specific threshold while the data is encrypted using the public key searchable encryption method.

[0161] The functional structure and hardware structure of each device of the concealed anomaly detection system 100 are respectively the same as figure 2 and image 3 Embodime...

Embodiment approach 3

[0180] For this embodiment, use Figure 13 ~ Figure 15 Differences from Embodiment 1 will be mainly described.

[0181] ***Description of structure***

[0182] The structure and figure 1 Embodiment 1 shown is the same.

[0183] In Embodiment 1, the hidden anomaly detection system 100 is a system that performs threshold analysis in encrypted data using a public key searchable encryption method. On the other hand, in the present embodiment, the hidden anomaly detection system 100 is a system that performs a schematic analysis of data waveforms in an encrypted state using a public key searchable encryption method. That is, the hidden anomaly detection system 100 is a system that analyzes the approximate shape of the data waveform in the encrypted state using the public key searchable encryption method. In addition, similarly to Embodiment 2, a public key searchable encryption method may be used instead of a public key searchable encryption method.

[0184] The data to be rou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A retrieval device (102), wherein a data retrieval unit (233) acquires from a data storage unit (232) an encrypted query that includes one keyword and has been stored in the data storage unit (232) since before encrypted data was received by a data reception unit (231). The data retrieval unit (233) determines whether the value of the encrypted data and the keyword of the encrypted query match while both of the encrypted data and the encrypted query remain encrypted. A data transmission unit (234) transmits identification data indicating an identifier of the encrypted query to a monitoring device (103) when it is determined by the data retrieval unit (233) that the value of the encrypted data and the keyword of the encrypted query match.

Description

technical field [0001] The present invention relates to a retrieval device, a monitoring device, a monitoring method and a retrieval program. Background technique [0002] The IoT continues to advance. "IoT" is the abbreviation of Internet of Things (Internet of Things). Due to the advancement of IoT, it has become easy to collect large amounts of sensor data from multiple sensor devices. Therefore, there is an increasing demand for new services such as equipment failure prediction and remote management by analyzing these data. However, constantly monitoring a large amount of sensor data requires large-scale network resources and computer resources. Therefore, it is difficult for an operator to carry out surveillance all the time by himself. Therefore, it is preferable to use a public cloud service and entrust the monitoring work to a cloud operator. However, sensor data may contain confidential and personal information. Therefore, some protective countermeasures are n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G09C1/00G06F16/953
CPCG06F16/245G06F21/602G06F21/6245G09C1/00H04L9/0825H04L63/0428H04L63/062H04L2209/805G06F21/6254G06F21/6272G06F2221/2117H04L9/30H04L63/0414
Inventor 服部充洋柴田阳一伊藤隆大松史生
Owner MITSUBISHI ELECTRIC CORP