This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2014-155160, filed on Jul. 30, 2014, the entire content of which are incorporated herein by reference.
The embodiment discussed herein is related to an analyzing technique for a masked task log.
Conventionally, job efficiency improvement is achieved through performing tasks in accordance with a workflow system. In particular, a user can reduce the time taken for a trial and error process when performing a task and more carry out efficiently a job by retrieving and referring to a task log, which is a record of tasks previously performed by other users.
Since a task log sometimes includes confidential information that is prohibited from being disclosed to the outside or to other departments, an administrator of a workflow system sets whether to disclose the task log or not. It is desirable for a user of the workflow system that more task logs be disclosed in order to find a task log that is useful for a job which the user is about to perform.
From the viewpoint of protection of personal information and preservation of business confidentiality, a masking technique for replacing proper nouns such as personal names, place names, and organization names included in text data with symbols or common nouns is proposed. Applying such a masking technique to a task log to be disclosed makes it possible to disclose a task log that includes confidential information by masking the confidential parts. In this case, a trade-off between usefulness of the task log and risk of exposing confidential information after the masking process has to be devised. That is, a task log is more useful but the risk of confidential information being determined is greater as more information remains disclosed in the task log after a masking process.
According to a conventional masking technique, named entities that can be disclosed are defined in advance in a white list, and named entities that are not included in the white list among named entities included in a masking target document are masked. Then, the white list is redefined based on a readability index represented by a ratio of the number of unmasked named entities to the total number of named entities included in the document. In this way, a trade-off between usefulness and risk is adjusted.
As a representative safety index that indicates the difficulty of identification of a person from anonymized data, there is known an index called k-anonymity, which indicates that at least k combinations that have the same values in a plurality of fields exist. One option is to use this index for indicating the risk of a masked document.
The above technique is disclosed, for example, in Takanori UGAI et al. “Case based evolutional workflow system”, Information Processing Society of Japan Technical Report, October 2002, pp. 77-81 and Yohei IKAWA et al. “A Masking System for Confidential Documents by Unmasking Safe Words” Information Processing Society of Japan Technical Report, July 2006, pp. 421-428.
According to an aspect of the invention, a method of analyzing a masked task log obtained by masking part of a task log, which is a record of a task performed in a workflow system, the method includes: acquiring a plurality of pieces of disclosed information that are viewable to a plurality of users based on unmasked information in the masked task log; specifying relevance between the plurality of pieces of disclosed information and a plurality of tasks performed in the workflow system, the plurality of tasks including the task; and calculating an index based on the relevance by a processor, the index indicating a possibility that content of the masked task log is determined from the plurality of pieces of disclosed information.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
The conventional technique for redefining the contents of a white list by using readability as an index has a problem in that the risk of masked confidential information being determined from disclosed information that is retrieved based on disclosed named entities is not taken into consideration.
Furthermore, k-anonymity has a problem in that the risk of confidential information being determined from combinations of disclosed information items retrieved based on disclosed named entities is not able to be expressed as an index. In particular, in a workflow system, a task log that can be referred to depends on a job structure or the like. Therefore, k-anonymity is insufficient as an index for indicating the risk of determining masked confidential information in the task log.
An object of one aspect of the technique disclosed in the present embodiment is to calculate the ease of which a masked part in a task log in a workflow system can be determined in consideration of combinations of disclosed information items.
An exemplary embodiment of the disclosed technique is described below in detail with reference to the drawings. In the present embodiment, an example in which an administrator of a workflow system calculates the ease of determining a target task log when determining whether or not to disclose a non-disclosed task log and the degree of masking in the case of disclosing the non-disclosed task log is described.
A workflow system which is a premise of the present embodiment is constructed, for example, in accordance with an organization structure illustrated in A of
Each task log thus stored may be arranged so that the task log is disclosed to an organization to which a user who performed a task indicated by the task log belongs or may be arranged so that the task log is disclosed to all organizations. In the present embodiment, the case where a task log is disclosed only to an organization to which a user who performed a task belongs is referred to as “non-disclosure”, whereas the case where a task log is disclosed to all organizations is referred to as “disclosed (full disclosure)”. For example, in the example of
A user who performs a task acquires the task instruction 202 from the task instruction DB 203 and performs the task. In performing the task, the user retrieves a task log 81 used as a reference for performing the task from among task logs 81 which are records of tasks previously performed and stored in a task log DB 21 of the workflow system 200. The user makes a judgment concerning the task about to be performed by referring to the retrieved task log 81 and a document 82 that is referenced in the task log 81. The document 82 is an example of “disclosed information” of the disclosed technique. Examples of the document 82 include a document that is created through performing a task and is disclosed and a Web site that is retrieved based on information described in the task log 81. The document 82 is stored in a document DB 23.
The user records, in a task log 81, operation content concerning performing a task including the judgment concerning the task made by referring to the other task log 81 and the document 82, reports the task to a person who requested the task, and stores the task log 81 in a non-disclosed state in the task log DB 21.
As illustrated in
The task log DB 21 includes a task log table 21A, an operation judgment table 21B, and a disclosed range table 21C.
As illustrated in
In the organization table 22A, for example, information that defines the organization structure illustrated in A of
In the job classification table 22B, for example, information that defines job classifications in the job structure illustrated in B of
In the operation classification table 22C, for example, information that defines operation classifications in the job structure illustrated in B of
The document DB 23 includes, for example, a document table 23A illustrated in
As described above, the task log 81 includes an operation ID defined in the operation classification table 22C and an organization ID defined in the organization table 22A, and the disclosed range of each task log 81 is set in the disclosed range table 21C. These pieces of information make it possible to grasp the position of each task log 81 in the job structure and the organization structure, for example, as illustrated in
The masking section 11 acquires a task log 81 for which determining ease is to be calculated from the task log DB 21 and then extracts named entities from the acquired task log 81. The named entities are highly likely to be confidential information and are, for example, terms representing specific persons and specific organizations or terms related to specific persons and specific organizations such as organization names, personal names, place names, unique object names, date expressions, time expressions, money expressions, and percentage expressions. The masking section 11 performs a masking process such as blacking out the extracted named entities.
The masking section 11 receives an initial white list in which named entities that can be disclosed without masking and named entities that are subjected to a predetermined conversion process at the time of disclosure are defined in advance.
The masking section 11 adds the task log 81 after masking to the task log table 21A and adds the operation judgment 83 after masking to the operation judgment table 21B.
It is assumed here that, for example, documents 82A and 82B concerning Company B and Company C are retrieved from the disclosed expressions “OSS” and “Tuscany” described in the operation judgment 83D after masking whose judgment ID is 1501, as illustrated in
However, the following considers, for example, a plurality of document 82 including documents 82C and 82D that are retrieved based on the disclosed expressions in the operation judgment 83E whose judgment ID is 1502 and the operation judgment 83F whose judgment ID is 1503. It is assumed that the three documents 82B, 82C, and 82D including the disclosed document of Company B are, for example, documents referred to in task logs 81P and 81Q concerning a job “DEVELOPMENT JOB A”. In this case, masked parts can be determined by combining these three documents 82B, 82C, and 82D. In the example of
As described above, even in a case where there are a plurality of documents 82 that are retrieved based on disclosed expressions in a task log 81 after masking and when it seems difficult to determine non-disclosed expressions by using an index such as k-anonymity, it is sometimes possible to narrow down combinations of documents 82. That is, there is a case where determining non-disclosed expressions is easier than indicated by an index such as k-anonymity. Considering that determining based on a combination of documents 82 is easier than indicated by an index such as k-anonymity, an index indicating that determining is easier is desired.
In view of this, in the present embodiment, the ease of determining that takes into consideration ease of determining based on a combination of documents 82 is calculated. The calculating section 12 that calculates determining ease is described in detail below.
As illustrated in
The transition possibility calculating section 13 calculates a transition possibility indicative of the possibility of transition of determining of a non-disclosed expression from determining based on one document 82 to determining based on another document 82 among a plurality of documents 82 retrieved based on disclosed expressions in a task log 81 after masking. In the present embodiment, the transition possibility calculating section 13 calculates the transition possibility assuming that the transition possibility increases (transition is easier) as the number of non-disclosed expressions common to operation judgments 83 increases.
Specifically, the transition possibility calculating section 13 acquires, from the task log table 21A, a task log 81 after masking for which determining ease is to be calculated. Furthermore, the transition possibility calculating section 13 acquires a corresponding task log 81 before masking that is identified by a task ID registered in the field “BEFORE CONVERSION (TASK ID)” of the acquired task log 81 after masking. As illustrated in
The equation (1) expresses the sum of ratios, calculated for all of the non-disclosed expressions, of the number of operation judgments 83 including a non-disclosed expression to the total number of operation judgments 83 included in the task log 81 after masking. In the example of
transition possibility=⅔+⅔+⅓+⅓+⅓=2.33
The identification possibility calculating section 14 calculates an identification possibility indicative of the possibility of identification of a combination of documents 82 from which non-disclosed expressions can be determined among a plurality of documents 82 retrieved based on disclosed expressions in a task log 81 after masking. In the present embodiment, the identification possibility calculating section 14 calculates the identification possibility assuming that the identification possibility increases (identification is easier) as the number of documents including a non-disclosed expression among the documents retrieved based on the disclosed expressions increases.
Specifically, as illustrated in
In the example of
identification possibility= 2/4=0.50
The relevance calculating section 15 calculates relevance, in a job structure, among a plurality of documents 82 retrieved based on disclosed expressions in a task log 81 after masking. The relevance between documents is higher in a case where the documents are related to an identical job or as the relevance between jobs to which the documents are related increases. In a case where the relevance between documents is high, the possibility of using a combination of these documents 82 for determining is high. In the present embodiment, the relevance between documents is expressed by a distance on the job structure between task logs 81 corresponding to the documents. A shorter distance between the task logs 81 means a higher relevance between the documents.
Specifically, as illustrated in
The relevance calculating section 15 extracts a combination of documents 82 whose coverage ratio, which is calculated for each combination of documents 82, is equal to or higher than a threshold value. The relevance calculating section 15 regards each of the documents 82 that constitute the extracted combination of documents 82 as a combination candidate document and extracts, for each combination candidate document, a task ID of a task log 81 that refers to the combination candidate document as an information source or a product from the task log DB 21. Specifically, a case where a task ID of a task log 81 that refers to the document 82 whose document ID is 10 as an example of the combination candidate document is described. First, the document 82 whose document ID is 10 is retrieved from the document table 23A, and then judgment IDs registered in the fields “INFORMATION SOURCE REFERENCE (JUDGMENT ID)” and “PRODUCT REFERENCE (JUDGMENT ID)” of the document 82 whose document ID is 10 are extracted. Next, a task ID registered in the field “TASK LOG (TASK ID)” of the operation judgment table 21B is extracted for each of the extracted judgment IDs.
The relevance calculating section 15 obtains, for each extracted combination of documents 82, a minimum path length between task logs corresponding to both documents 82 in the job structure. For example, as illustrated in
Specifically, the relevance calculating section 15 extracts, for each extracted combination of documents 82, a combination of task logs 81 indicated by task IDs extracted for each combination candidate document. The relevance calculating section 15 specifies, for each extracted combination of task logs 81, the positions, on the job structure, of two task logs 81 that constitute the combination. Then, the number of nodes that are traced from the task logs 81 to a node of a higher-level job structure common to the task logs 81 through nodes indicative of operation classifications and nodes indicative of job classifications is obtained as a path length. For example, in the example of
As illustrated in
In the equation (3), α is an invariable that defines a lower limit value of the relevance and is, for example, set to a value such as “0.1” in advance. The value of the relevance expressed by the equation (3) is larger as the minimum path length obtained for each combination of documents 82 is shorter, i.e., as the relevance between jobs is higher.
The determining ease calculating section 16 calculates determining ease by uniting the transition possibility calculated by the transition possibility calculating section 13, the identification possibility calculated by the identification possibility calculating section 14, and the relevance calculated by the relevance calculating section 15. For example, the determining ease calculating section 16 can calculate, as the value of determining ease, a value obtained by multiplying together the values of the transition possibility, the identification possibility, and the relevance, the weighted sum of the values of the transition possibility, the identification possibility, and the relevance, or the like. Alternatively, the determining ease may be calculated by using a probability model with an assumed determining process.
The readability calculating section 17 calculates, as an indication of readability, a ratio of the number of disclosed expressions to the total number of named entities included in a target task log 81.
The changing section 18 creates white list replacement candidates by replacing, with disclosed expressions, named entities that are set as non-disclosed expressions in the initial white list among the named entities included in the target task log 81. Furthermore, the changing section 18 creates white list replacement candidates by removing named entities that are set as disclosed expressions in the initial white list among the named entities included in the target task log 81. The changing section 18 instructs the masking section 11 to perform a masking process with respect to the target task log 81 based on the white list replacement candidates. Furthermore, the changing section 18 instructs the calculating section 12 to calculate determining ease and readability of task logs 81 of respective patterns that have been subjected to the masking process based on the white list replacement candidates.
The masking section 11 and the calculating section 12 perform the masking process and the process of calculating determining ease and readability based on the white list replacement candidates in response to an instruction from the changing section 18 in a similar manner to the processes executed based on the initial white list. In executing the masking process, the masking section 11 associates, with the task logs 81 of the respective patterns that have been subjected to the masking process based on the white list replacement candidates, the task ID of the task log 81 that has been subjected to the masking process based on the initial white list. Then, the task logs 81 of the respective patterns are stored in a predetermined storage region together with the associated task ID and pattern information indicating which patterns the task logs 81 have and which white list replacement candidates were used in the masking process. Furthermore, determining ease and readability calculated for the task logs 81 of the respective patterns by the calculating section 12 are also associated with the task logs 81 of the respective patterns and stored in the predetermined storage region.
Furthermore, the changing section 18 presents, for example, to the administrator of the workflow system 200, the task log 81 that has been subjected to the masking process based on the initial white list by the masking section 11 and the determining ease and the readability calculated for the task log 81 by the calculating section 12. Furthermore, the changing section 18 presents the white list replacement candidates and the values of the determining ease and readability calculated for the corresponding task logs 81 of the respective patterns in such a manner that one white list replacement candidate is selectable by the administrator. For example, the changing section 18 causes a display screen 105 illustrated in
The display screen 105 illustrated in
In the changed content display region 107, a changed white list to which the content of the replacement candidate selected from the list displayed in the replacement list display region 106 have been applied is displayed. The initial state of the display screen 105 may be a state in which the initial white list is being selected. In the result display region 108, a task log 81 that has been subjected to the masking process based on the white list displayed in the changed content display region 107 is displayed.
The setting button 109 is a button selected in a case where the task log 81 displayed in the result display region 108 is disclosed. The cancel button 110 is a button selected in a case where the task log displayed in the result display region 108 is not disclosed.
The changing section 18 adopts, as a task log 81 after masking to be disclosed, the task log 81 displayed in the result display region 108 when the setting button 109 on the presented display screen 105 is selected, for example, by the administrator and notifies the managing section 19 of the adopted task log 81. In a case where the adopted task log 81 is a task log 81 based on the initial white list, the changing section 18 notifies the managing section 19 of the task ID. Meanwhile, in a case where the adopted task log 81 is a task log 81 having a pattern based on any one of the white list replacement candidates, the changing section 18 notifies the managing section 19 of pattern information indicative of the pattern of the task log 81 together with the task ID.
Upon notification of the pattern information together with the task ID from the changing section 18, the managing section 19 acquires the task log 81 having the pattern indicated by the pattern information from the predetermined storage region. Then, the managing section 19 updates parts corresponding to the notified task ID in the task log table 21A and the operation judgment table 21B with the acquired content of the task log 81. Accordingly, information of the adopted task log 81 is stored in the task log DB 21.
The managing section 19 records, in the disclosed range table 21C, setting information for disclosing the adopted task log 81. Specifically, as illustrated in
The determining ease calculating device 10 can be realized, for example, by a computer 40 illustrated in
The computer 40 is connected to a display device 71 such as a display and an input device 72 such as a mouse and a keyboard via the input output I/F 47. On the display device 71, the display screen 105 illustrated in
The storage section 46 can be realized by a hard disk drive (HDD), a solid state drive (SSD), a flash memory, or the like. In the storage section 46, which serves as a storage medium, a determining ease calculation program 50 for causing the computer 40 to function as the determining ease calculating device 10 is stored. The storage section 46 includes a task log DB storage region 61 in which information that constitutes the task log DB 21 is stored, a job structure DB storage region 62 in which information that constitutes the job structure DB 22 is stored, and a document DB storage region 63 in which information that constitutes the document DB 23 is stored. The CPU 42 reads the determining ease calculation program 50 out from the storage section 46, loads the determining ease calculation program 50 to the memory 44, and then sequentially executes processes of the determining ease calculation program 50. Furthermore, the CPU 42 reads out information stored in the task log DB storage region 61, the job structure DB storage region 62, and the document DB storage region 63 and loads the information to the memory 44 as tables that constitute the task log DB 21, the job structure DB 22, and the document DB 23.
The determining ease calculation program 50 has a masking process 51, a calculating process 52, a changing process 58, and a managing process 59. The CPU 42 operates as the masking section 11 illustrated in
Note that the determining ease calculating device 10 can also be realized, for example, by a semiconductor integrated circuit, more specifically an application specific integrated circuit (ASIC) or the like.
Next, the following describes how the determining ease calculating device 10 according to the present embodiment jobs. In the determining ease calculating device 10, a determining ease calculating process illustrated in
In Step S11 of the determining ease calculating process illustrated in
Next, in Step S13, the masking section 11 extracts named entities from the acquired task log 81 and performs a masking process with respect to the target task log 81 based on the received initial white list. The masking section 11 gives the task log 81 after masking a new task ID and adds the task log 81 to the task log table 21A. Furthermore, the masking section 11 gives each operation judgment 83 after masking a new judgment ID and adds the operation judgment 83 to the operation judgment table 21B.
Next, in Step S14, the transition possibility calculating section 13 extracts, for each operation judgment 83, non-disclosed expressions and disclosed expressions based on the task log 81 before masking and the task log 81 after masking. Then, the transition possibility calculating section 13 calculates, for example, a transition possibility expressed by the equation (1) based on the extracted non-disclosed expressions.
Next, in Step S15, the identification possibility calculating section 14 extracts, for each operation judgment 83, documents 82 including the disclosed expressions from the document DB 23 by using information of the disclosed expressions extracted for each operation judgment 83 in Step S14. Then, the identification possibility calculating section 14 calculates, for example, an identification possibility expressed by the equation (2) based on the extracted documents 82.
Next, in Step S16, the relevance calculating section 15 calculates, for all combinations of documents 82 extracted in Step S15, a coverage ratio which is a ratio of the number of non-disclosed expressions included in both documents 82 to the total number of non-disclosed expressions extracted in Step S14. Then, the relevance calculating section 15 extracts a combination of documents 82 whose coverage ratio, which is calculated for each combination of documents 82, is equal to or higher than a predetermined threshold value. Furthermore, the relevance calculating section 15 extracts, from the task log DB 21, task IDs of task logs 81 that refer to the documents that constitute the extracted combination of documents 82 as an information source or a product. Then, the relevance calculating section 15 obtains, for each extracted combination of documents 82, a minimum path length between the task logs 81 corresponding to both documents 82 in the job structure and calculates, for example, relevance expressed by the equation (3).
Next, in Step S17, the determining ease calculating section 16 calculates determining ease by unifying the transition possibility calculated in Step S14, the identification possibility calculated in Step S15, and the relevance calculated in Step S16. Next, in Step S18, the readability calculating section 17 calculates, as readability, a ratio of the number of disclosed expressions to the total number of named entities included in the target task log 81.
Next, in Step S19, the changing section 18 determines whether or not there is a white list replacement candidate that can be created. In a case of YES, the processing proceeds to Step S20. In Step S20, the changing section 18 creates a white list replacement candidate by replacing, with disclosed expressions, named entities that are set as non-disclosed expressions in the initial white list among the named entities included in the target task log 81. Alternatively, the changing section 18 creates a white list replacement candidate by removing named entities that are set as disclosed expressions in the initial white list among the named entities included in the target task log 81.
Next, the processing returns to Step S13, and the processes in Steps S13 through S18 are repeated based on the white list replacement candidate created in Step S20. In Step S13, the masking section 11 causes the task log 81 that has been masked based on the white list replacement candidate to be stored in a predetermined storage region without adding the task log 81 to the task log table 21A and the operation judgment table 21B. After all of the white list replacement candidates have been created, it is determined in Step S19 that there is no white list replacement candidate that can be created. Then, the processing proceeds to Step S21.
In Step S21, the changing section 18 causes, for example, the display screen 105 illustrated in
When the administrator inputs selection information in accordance with the display screen 105, the changing section 18 determines in Step S22 whether or not the input selection information is selection information for which the setting button 109 has been selected. In a case where NO in Step S22, the processing proceeds to Step S23, in which the changing section 18 determines whether or not the input selection information is selection information for selecting the white list replacement candidate. In a case where YES in Step S22, the processing proceeds to Step S24, in which the changing section 18 changes the content displayed in the changed content display region 107 and the result display region 108 based on the selected white list replacement candidate. Then, the processing returns to Step S22. In a case where it is determined in Step S22 that the input selection information is selection information for which the setting button 109 has been selected, the processing proceeds to Step S25.
In Step S25, the changing section 18 adopts, as a task log 81 after masking to be disclosed, a task log 81 displayed in the result display region 108 when the setting button 109 is selected. The changing section 18 notifies the managing section 19 of the task ID in a case where the adopted task log 81 is a task log 81 based on the initial white list. Meanwhile, in a case where the adopted task log 81 is a task log 81 having a pattern based on any one of the white list replacement candidates, the changing section 18 notifies the managing section 19 of information indicative of the pattern of the task log 81 together with the task ID. Then, in a case where the managing section 19 is notified of the information indicative of the pattern of the task log 81 together with the task ID by the changing section 18, the managing section 19 acquires the task log 81 having the pattern indicated by the pattern information from the predetermined storage region. Then, in the task log DB 21, a part corresponding to the notified task ID is updated with the content of the acquired task log 81. Furthermore, the managing section 19 records, in the disclosed range table 21C, setting information for disclosing the adopted task log. Then, the determining ease calculating process is finished.
Meanwhile, in a case of NO in Step S23, it is determined that the cancel button 110 has been selected, and the determining ease calculating process is finished without disclosure setting of the target task log 81.
As described above, according to the determining ease calculating device 10 according to the present embodiment, a masking process is performed with respect to confidential information in a task log for a task performed in accordance with a workflow system that is constructed in accordance with a job structure. Furthermore, relevance of a plurality of combinations of documents retrieved based on disclosed expressions in a task log after masking is calculated based on relevance, in the job structure, of task logs that refer to these documents. Furthermore, determining ease of non-disclosed expressions in the task log after masking is calculated by using the calculated relevance of the combinations of documents. It is therefore possible to calculate determining ease taking into consideration a combination of documents used to determine non-disclosed expressions.
For example, it is assumed that there are a job “DEVELOPMENT JOB A” and a job “MAINTENANCE JOB A”, each of which is independent, as illustrated in P of
According to a conventional method such as k-anonymity, even in a case where there is a difference in a job structure as described above, the value of determining ease does not vary as long as the same documents 82 are retrieved based on disclosed expressions. However, according to the present embodiment, it is possible to calculate an index depending on the job structure.
Furthermore, according to the determining ease calculating device 10 according to the present embodiment, determining ease obtained in a case where a white list is changed and a task log after masking to which the changed white list has been applied are presented. This makes it possible for an administrator to intuitively grasp what degree of masking leads to what degree of risk of information being determined when determining whether to disclose a task log. It is thus possible to support determination by the administrator.
Note that although a case where determining ease is calculated by using all of the transition possibility, the identification possibility, and the relevance has been described in the above embodiment, only the relevance may be calculated as the determining ease. Alternatively, the determining ease may be calculated by using a combination of the relevance and the transition possibility or a combination of the relevance and the identification possibility.
Although a case where task logs that have been masked based on white list replacement candidates are stored not in the task log DB 21 but in the predetermined storage region has been described, the above embodiment is not limited to this. The task logs that have been masked based on white list replacement candidates may be given new task IDs and operation judgment IDs and added to the task log DB 21 as well as the task log that has been masked based on the initial white list. In this case, when a task log to be disclosed is adopted, task logs that have not adopted just have to be deleted from the task log DB.
Although an arrangement in which the determining ease calculation program 50, which is an example of the determining ease calculation program according to the disclosed technique, is stored (installed) in advance in the storage section 46 has been described above, the above embodiment is not limited to this. An image processing program according to the disclosed technique can also be provided in the form recorded in a storage medium such as a CD-ROM, a DVD-ROM, or a USB memory.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiment of the present invention has been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2014-155160 | Jul 2014 | JP | national |