Patents by Inventor Daisuke Mashima

Daisuke Mashima has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9703963
    Abstract: A method of energy usage data privacy preservation is described. The method includes downloading energy usage data and a signature from a repository. The method includes determining whether the signature is that of a utility. When the signature is not that of the utility, the method includes rejecting the energy usage data. When the signature is that of the utility, the method includes generating noisy data, encrypting a message-signature pair, constructing a proof, and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. The noisy data is generated by adding random noise to the energy usage data. The message-signature pair includes the energy usage data and a verified signature. The proof is configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language.
    Type: Grant
    Filed: May 9, 2014
    Date of Patent: July 11, 2017
    Assignee: FUJITSU LIMITED
    Inventors: Arnab Roy, Daisuke Mashima
  • Publication number: 20170089960
    Abstract: A method of electricity load disaggregation may include identifying a first monitored appliance in an electrical network based on ON/OFF status information. The method may further include identifying a period of time during which the first monitored appliance is on. The method may also include determining whether a second monitored appliance is on during the period of time. The method may include allocating a first load of an aggregate load associated with the period of time to the first monitored appliance in response to determining that the second monitored appliance is not on during the period of time, or in response to determining that the second monitored appliance is on during the period of time, allocating a second load of the aggregate load to the first monitored appliance and allocating a third load of the aggregate load to the second monitored appliance.
    Type: Application
    Filed: September 30, 2015
    Publication date: March 30, 2017
    Inventors: Daisuke MASHIMA, Mohammad-Mahdi MOAZZAMI
  • Publication number: 20170082666
    Abstract: According to some embodiments, the present disclosure may relate to a method that includes receiving an energy consumption trace representing energy usage over time that is sampled at a sampling interval. The method may also include parsing the energy consumption trace into one or more segments using change point detection, and selecting one or more of the one or more segments as a representative always-on load segment based on one or more of the following: a lowest average and a minimum duration. The method may also include determining a periodic always-on load based on the representative always-on load segment and the sampling interval. The present disclosure may also relate to associated systems and devices.
    Type: Application
    Filed: September 17, 2015
    Publication date: March 23, 2017
    Inventors: Daisuke MASHIMA, Mustafa FAISAL
  • Patent number: 9530010
    Abstract: A method including receiving energy usage data representative of energy usage of a customer during a particular time period. The energy usage data is sign with a digital signature of a utility. The method includes receiving input of a customer effective to select a data block of the energy usage data. The method includes redacting the selected data block from the energy usage data in response to the input. The method includes calculating a hash value for the redacted data block using a per-customer key that is unique to the customer, an initialization vector, and a counter. The method includes replacing in the energy usage data the redacted data block with the calculated hash value corresponding to the redacted data block.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: December 27, 2016
    Assignee: FUJITSU LIMITED
    Inventors: Daisuke Mashima, Gaurav Lahoti
  • Publication number: 20160371630
    Abstract: A system includes a quantified home, a mobile client device and an inventory analytics server. The quantified home includes an item set and one or more reader devices. The item set includes an item and a tag that is affixed to the item. The tag is configured to be monitored by the one or more reader devices. The mobile client device is configured to register the item with a personal inventory and receive description data describing a set of conditions associated with the item. The one or more reader devices are configured to monitor movement of the tag within the quantified home and generate history data describing the movement. The inventory analytics server is configured to receive the description data and history data. The inventory analytics server is configured to determine that a condition included in the set of conditions has been met and initiate a user specified action.
    Type: Application
    Filed: June 17, 2015
    Publication date: December 22, 2016
    Inventors: Jorjeta G. JETCHEVA, Daisuke MASHIMA
  • Publication number: 20160306373
    Abstract: A method of down-sampling time-series data may include receiving energy usage data representative of energy usage of a customer during a specified period. The energy usage data may be signed with a digital signature of a utility. The method may also include receiving input from a customer effective to select a granularity level to apply to the energy usage data and the energy usage data may be down-sampled to apply the selected granularity level to the energy usage data and produce down-sampled energy usage data. The method may also include communicating the down-sampled energy usage data and hash values of child nodes corresponding to the down-sampled energy usage data to a third party.
    Type: Application
    Filed: April 16, 2015
    Publication date: October 20, 2016
    Inventor: Daisuke MASHIMA
  • Patent number: 9401895
    Abstract: A method including generating a mapping in response to an enrollment message received from a customer device. The enrollment message includes a device identification number (device ID) of the customer device. The mapping includes a one-time password (OTP) encrypted using the device ID. The method includes generating a quick response (QR) code including a uniform resource locator (URL), a provider certificate (CRT), and certificate signing request (CSR) content. The method includes receiving a confirmation message at a website identified by the URL. The confirmation message includes a generated public key, a CSR, and a decrypted OTP. The method includes verifying the decrypted OTP against the mapping and communicating one or more application configuration settings. The method includes securely communicating information using the one or more application configuration settings, a provider public key, a provider private key, the generated public key, and a generated private key.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: July 26, 2016
    Assignee: FUJITSU LIMITED
    Inventors: Ulrich Herberg, Daisuke Mashima
  • Patent number: 9292706
    Abstract: A method of customer data management in data analytics outsourcing includes communicating to a third party service provider an anonymous customer identifier (customer ID) that is uniquely associated with a customer. The method includes receiving from the third party service provider a customer data query that references the customer using the customer ID and requests customer data. The method includes determining whether an access control policy allows disclosure of customer data requested in the customer data query. In response to the access control policy allowing disclosure of the requested customer data, the method includes accessing the requested customer data and communicating the requested customer data to the third party service provider. In response to the access control policy prohibiting disclosure of the requested customer data, the method includes denying the customer data query.
    Type: Grant
    Filed: August 22, 2014
    Date of Patent: March 22, 2016
    Assignee: FUJITSU LIMITED
    Inventors: Daisuke Mashima, Wei-Peng Chen
  • Publication number: 20160065653
    Abstract: A method of constructing Internet of Things (JOT) device configurations includes receiving a solution template selection for a device configuration for a particular automated interaction between two or more IOT devices. The method includes determining whether a complete solution template for the device configuration is selected. If so, the method includes deploying the device configuration. If not, the method includes receiving IOT device selections, accessing device capabilities from an IOT database of the selected IOT devices, configuring a network connection between the selected IOT devices, simulating a device configuration using the device capabilities accessed from the IOT database, and determining whether the device configuration is operational based on the simulation. When the device configuration is not operational, the method includes reconfiguring the device configuration to include a replacement IOT device.
    Type: Application
    Filed: August 26, 2014
    Publication date: March 3, 2016
    Inventors: Wei-Peng CHEN, Mohammad-Mahdi MOAZZAMI, Daisuke MASHIMA
  • Publication number: 20160055349
    Abstract: A method of customer data management in data analytics outsourcing includes communicating to a third party service provider an anonymous customer identifier (customer ID) that is uniquely associated with a customer. The method includes receiving from the third party service provider a customer data query that references the customer using the customer ID and requests customer data. The method includes determining whether an access control policy allows disclosure of customer data requested in the customer data query. In response to the access control policy allowing disclosure of the requested customer data, the method includes accessing the requested customer data and communicating the requested customer data to the third party service provider. In response to the access control policy prohibiting disclosure of the requested customer data, the method includes denying the customer data query.
    Type: Application
    Filed: August 22, 2014
    Publication date: February 25, 2016
    Inventors: Daisuke MASHIMA, Wei-Peng CHEN
  • Publication number: 20150324604
    Abstract: A method of energy usage data privacy preservation is described. The method includes downloading energy usage data and a signature from a repository. The method includes determining whether the signature is that of a utility. When the signature is not that of the utility, the method includes rejecting the energy usage data. When the signature is that of the utility, the method includes generating noisy data, encrypting a message-signature pair, constructing a proof, and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. The noisy data is generated by adding random noise to the energy usage data. The message-signature pair includes the energy usage data and a verified signature. The proof is configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language.
    Type: Application
    Filed: May 9, 2014
    Publication date: November 12, 2015
    Applicant: FUJITSU LIMITED
    Inventors: Arnab ROY, Daisuke MASHIMA
  • Publication number: 20150319142
    Abstract: A method including generating a mapping in response to an enrollment message received from a customer device. The enrollment message includes a device identification number (device ID) of the customer device. The mapping includes a one-time password (OTP) encrypted using the device ID. The method includes generating a quick response (QR) code including a uniform resource locator (URL), a provider certificate (CRT), and certificate signing request (CSR) content. The method includes receiving a confirmation message at a website identified by the URL. The confirmation message includes a generated public key, a CSR, and a decrypted OTP. The method includes verifying the decrypted OTP against the mapping and communicating one or more application configuration settings. The method includes securely communicating information using the one or more application configuration settings, a provider public key, a provider private key, the generated public key, and a generated private key.
    Type: Application
    Filed: April 30, 2014
    Publication date: November 5, 2015
    Applicant: FUJITSU LIMITED
    Inventors: Ulrich HERBERG, Daisuke MASHIMA
  • Publication number: 20150206084
    Abstract: A method of residential or small and medium business (SMB) demand response (DR) coordination may include receiving a DR event notification from a DR server. The DR event notification may include DR event information pertaining to a DR event and curtailment information. The method may also include communicating a notification acknowledgement to the DR server. The notification acknowledgement may indicate reception of the DR event notification. The method may include displaying a curtailment request pertaining to the DR event. The curtailment request may be based on the curtailment information included in the DR event notification and may include some portion of the DR event information. The method may also include receiving a user input including a DR event participation confirmation or a DR event participation refusal. The method may further include communicating a participation signal representative of at least a portion of the user input to the DR server.
    Type: Application
    Filed: January 22, 2014
    Publication date: July 23, 2015
    Applicant: FUJITSU LIMITED
    Inventors: Ulrich HERBERG, Jorjeta G. JETCHEVA, Daisuke MASHIMA, Wei-Peng CHEN
  • Patent number: 9032213
    Abstract: A method may include receiving data and first path-metadata. The first path-metadata may include a first entity identifier. The first entity identifier may be associated with a first receiving entity that receives the data and the first path-metadata from an originating entity. The first path-metadata may also include a first digital signature associated with the originating entity. The method may further include receiving second path-metadata that may include the first path-metadata and a second entity identifier associated with a second receiving entity. The second path-metadata may also include a second digital signature associated with the first receiving entity. The method may additionally include verifying that the data was communicated by the originating entity to the first receiving entity and from the first receiving entity to the second receiving entity based on the first path-metadata, the second path-metadata, the first digital signature, and the second digital signature.
    Type: Grant
    Filed: July 25, 2013
    Date of Patent: May 12, 2015
    Assignee: Fujitsu Limited
    Inventors: Daisuke Mashima, Ulrich Herberg, Wei-Peng Chen
  • Publication number: 20150128283
    Abstract: A method including receiving energy usage data representative of energy usage of a customer during a particular time period. The energy usage data is sign with a digital signature of a utility. The method includes receiving input of a customer effective to select a data block of the energy usage data. The method includes redacting the selected data block from the energy usage data in response to the input. The method includes calculating a hash value for the redacted data block using a per-customer key that is unique to the customer, an initialization vector, and a counter. The method includes replacing in the energy usage data the redacted data block with the calculated hash value corresponding to the redacted data block.
    Type: Application
    Filed: September 26, 2014
    Publication date: May 7, 2015
    Inventors: Daisuke MASHIMA, Gaurav LAHOTI
  • Publication number: 20150052188
    Abstract: A method may include receiving peer data describing a set of peer clients associated with a demand response application server and describing how the peer clients communicate with one another. The peer data may be configured so that a subset of the peer clients directly communicate with the demand response application server and the demand response application server does not directly communicate with each of the peer clients. The method may also include receiving announcement data describing an event specified by the demand response application server and determining event response data responsive to the announcement data. The method may also include identifying, from the set of peer clients specified by the demand response application server, a set of recipient peer clients to receive the event response data.
    Type: Application
    Filed: August 16, 2013
    Publication date: February 19, 2015
    Applicant: FUJITSU LIMITED
    Inventors: Ulrich HERBERG, Jorjeta G. JETCHEVA, Daisuke MASHIMA
  • Publication number: 20150033024
    Abstract: A method may include receiving data and first path-metadata. The first path-metadata may include a first entity identifier. The first entity identifier may be associated with a first receiving entity that receives the data and the first path-metadata from an originating entity. The first path-metadata may also include a first digital signature associated with the originating entity. The method may further include receiving second path-metadata that may include the first path-metadata and a second entity identifier associated with a second receiving entity. The second path-metadata may also include a second digital signature associated with the first receiving entity. The method may additionally include verifying that the data was communicated by the originating entity to the first receiving entity and from the first receiving entity to the second receiving entity based on the first path-metadata, the second path-metadata, the first digital signature, and the second digital signature.
    Type: Application
    Filed: July 25, 2013
    Publication date: January 29, 2015
    Applicant: Fujitsu Limited
    Inventors: Daisuke MASHIMA, Ulrich HERBERG, Wei-Peng CHEN
  • Publication number: 20150025934
    Abstract: A method of sharing energy usage data may include requesting customer-specific energy usage data (CSEUD). The method further includes receiving a modified CSEUD record. The modified CSEUD record includes modified energy usage data with respect to original energy usage data of an original CSEUD record from which the modified CSEUD record is derived. The method also includes authenticating the modified CSEUD record to verify the integrity of the modified energy usage data.
    Type: Application
    Filed: July 16, 2013
    Publication date: January 22, 2015
    Inventors: Daisuke MASHIMA, Wei-Peng CHEN
  • Publication number: 20130124436
    Abstract: Embodiments for detecting anomalous consumption of energy are provided. Information associated with energy consumption over a designated period of time is received. A threshold value is received. A classifier based on an Auto-Regressive Moving Average model is applied to the information and a result representing the likelihood of an attack is determined. The result is then analyzed to determine if it attained a threshold value. The information is then classified as indicating an attack. Additionally, embodiments for utilizing machine learning to train a classifier using training data to develop parameters for the auto-regressive moving average model are provided. Further, embodiments for evaluating the effectiveness of the parameters used in the Auto-Regressive Moving Average model to classify data are provided.
    Type: Application
    Filed: November 15, 2011
    Publication date: May 16, 2013
    Applicant: Fujitsu Limited
    Inventors: Alvaro A. Cardenas Mora, Daisuke Mashima