Patents by Inventor Kunikazu Yoda

Kunikazu Yoda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7991876
    Abstract: A system includes a monitoring management server, a monitoring target server, and one or more monitoring clients. The management server determines monitoring parameters for each client. The monitoring parameters specify at least when a client is to begin a monitoring session with the target server and when the client is to end the session with the target server. The management server determines the monitoring parameters for each client such that a predetermined maximum number of monitoring sessions performed within each time period is never exceeded by the target server. Each client receives monitoring parameters from the management server in response to a request initiated by the client, initiates a monitoring session with the target server in accordance with the monitoring parameters, and reports results of the monitoring session to the management server upon the monitoring session ending.
    Type: Grant
    Filed: December 19, 2006
    Date of Patent: August 2, 2011
    Assignee: International Business Machines Corporation
    Inventors: Kunikazu Yoda, Takayuki Kushida
  • Patent number: 7647524
    Abstract: A system such as a Web-based system in which a plurality of computers interact with each other is monitored to detect online an anomaly. Transactions of a service provided by each of a plurality of computers to another computer are collected, a matrix of correlations between nodes in the system is calculated from the transactions, and a feature vector representing anode activity balance is obtained from the matrix. The feature vector is monitored using a probability model to detect a transition to an anomalous state.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: January 12, 2010
    Assignee: International Business Machines Corporation
    Inventors: Tsuyoshi Ide, Kunikazu Yoda, Hisashi Kashima, Hiroaki Etoh, Ryo Hirade
  • Publication number: 20090031176
    Abstract: A system such as a Web-based system in which a plurality of computers interact with each other is monitored to detect online an anomaly. Transactions of a service provided by each of a plurality of computers to another computer are collected, a matrix of correlations between nodes in the system is calculated from the transactions, and a feature vector representing anode activity balance is obtained from the matrix. The feature vector is monitored using a probability model to detect a transition to an anomalous state.
    Type: Application
    Filed: October 31, 2007
    Publication date: January 29, 2009
    Inventors: Tsuyoshi Ide, Kunikazu Yoda, Hisashi Kashima, Hiroaki Etoh, Ryo Hirade
  • Publication number: 20080147845
    Abstract: A system includes a monitoring management server, a monitoring target server, and one or more monitoring clients. The management server determines monitoring parameters for each client. The monitoring parameters specify at least when a client is to begin a monitoring session with the target server and when the client is to end the session with the target server. The management server determines the monitoring parameters for each client such that a predetermined maximum number of monitoring sessions performed within each time period is never exceeded by the target server. Each client receives monitoring parameters from the management server in response to a request initiated by the client, initiates a monitoring session with the target server in accordance with the monitoring parameters, and reports results of the monitoring session to the management server upon the monitoring session ending.
    Type: Application
    Filed: December 19, 2006
    Publication date: June 19, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kunikazu Yoda, Takayuki Kushida
  • Patent number: 7360246
    Abstract: Systems, apparatus and methods to monitor communications conducted via a host computer placed under the management of security measures such as firewalls or routers' filtering capabilities. A communications monitoring system which includes a packet input means for connecting to predetermined points on a network via a network interface and receiving communications packets flowing at the points; and matching means for performing real-time matching between two packet streams composed of received communications packets each time a communications packet is received. If the two packet streams are highly similar, it is highly likely that an attack or intrusion is being made and an alert is issued.
    Type: Grant
    Filed: September 26, 2003
    Date of Patent: April 15, 2008
    Assignee: International Business Machines Corporation
    Inventors: Hiroaki Etoh, Kunikazu Yoda
  • Patent number: 7346803
    Abstract: A system such as a Web-based system in which a plurality of computers interact with each other is monitored to detect online an anomaly. Transactions of a service provided by each of a plurality of computers to another computer are collected, a matrix of correlations between nodes in the system is calculated from the transactions, and a feature vector representing a node activity balance is obtained from the matrix. The feature vector is monitored using a probability model to detect a transition to an anomalous state.
    Type: Grant
    Filed: January 28, 2005
    Date of Patent: March 18, 2008
    Assignee: International Business Machines Corporation
    Inventors: Tsuyoshi Ide, Kunikazu Yoda, Hisashi Kashima, Hiroaki Etoh, Ryo Hirade
  • Patent number: 7127510
    Abstract: Log data for a packet that is exchanged across a network are recorded in a log box. At this time, the data size of the packet and the detection time are recorded. When an illegal access has occurred at a target computer, the tracing of an access chain is performed on the log information. The tracing of the access chain is performed as follows. A change in the size of the data in a packet in accordance with the time of the first connection, and a change in the size of the data in a packet in accordance with the time of the second connection are calculated using the log data, and then the shapes of the graphs formed by these packet series are compared. When the shapes of the graphs are similar, it is ascertained that the pertinent connections are included in the same chain.
    Type: Grant
    Filed: January 26, 2001
    Date of Patent: October 24, 2006
    Assignee: International Business Machines Corporation
    Inventors: Kunikazu Yoda, Hiroaki Etoh
  • Patent number: 7096075
    Abstract: For determination as to whether there is a possibility that temperature control satisfying conditions according to an upper limit LH_i and a lower limit LL_i of the annealing control temperatures of annealing object steel sections i will be realized under restrictions on limit values U and D of the control temperature increase and decrease rates, computation is performed without using dynamic programming requiring an enormous amount of data on a continuous annealing line of a steelwork. Annealing object steel sections in an annealing object steel band 12 to be computed are assigned numbers 1, 2, . . . , n in order from the first time division in the direction of movement. T_i is a time required to pass the annealing object steel section i through a predetermined point at which the steel section undergoes temperature control. LH_1=LL_1=b is given. X_i=[IL_i?D*T_i, IH_i+U*T_i] is computed. When X_L_i1f, Y_i=X_iL_i. When X_i L_i=f, Y_i=X_i. Y—i is computed from i=1 to i=n in ascending order.
    Type: Grant
    Filed: April 20, 2004
    Date of Patent: August 22, 2006
    Assignee: International Business Machines Corporation
    Inventors: Kunikazu Yoda, Hiroyuki Okano
  • Patent number: 6941473
    Abstract: A memory device is provided that is used by a computer system and that has a memory pattern obtained after a function is called when the computer system executes a program, the memory pattern comprising: a return address storage area for storing a return address 230 for the source of a call for the execution of a currently active function; a previous frame pointer storage area for storing a previous frame pointer 220 to the calling source for the execution of a currently active function; and a local variable storage area to be located below the return address storage area 230 and the previous frame pointer storage area 22, wherein when a data array 211 is stored in the local variable area, a guard variable 212 is stored in a location preceding the data array 211, and wherein the guard variable is used as a target to confirm whether the return address has been destroyed.
    Type: Grant
    Filed: January 30, 2001
    Date of Patent: September 6, 2005
    Assignee: International Business Machines Corporation
    Inventors: Hiroaki Etoh, Kunikazu Yoda
  • Publication number: 20050193281
    Abstract: A system such as a Web-based system in which a plurality of computers interact with each other is monitored to detect online an anomaly. Transactions of a service provided by each of a plurality of computers to another computer are collected, a matrix of correlations between nodes in the system is calculated from the transactions, and a feature vector representing anode activity balance is obtained from the matrix. The feature vector is monitored using a probability model to detect a transition to an anomalous state.
    Type: Application
    Filed: January 28, 2005
    Publication date: September 1, 2005
    Applicant: International Business Machines Corporation
    Inventors: Tsuyoshi Ide, Kunikazu Yoda, Hisashi Kashima, Hiroaki Etoh, Ryo Hirade
  • Publication number: 20040210324
    Abstract: For determination as to whether there is a possibility that temperature control satisfying conditions according to an upper limit LH_i and a lower limit LL_i of the annealing control temperatures of annealing object steel sections i will be realized under restrictions on limit values U and D of the control temperature increase and decrease rates, computation is performed without using dynamic programming requiring an enormous amount of data on a continuous annealing line of a steelwork.
    Type: Application
    Filed: April 20, 2004
    Publication date: October 21, 2004
    Applicant: International Business Machines Corporation
    Inventors: Kunikazu Yoda, Hiroyuki Okano
  • Publication number: 20040123155
    Abstract: Systems, apparatus and methods to monitor communications conducted via a host computer placed under the management of security measures such as firewalls or routers' filtering capabilities. A communications monitoring system which includes a packet input means for connecting to predetermined points on a network via a network interface and receiving communications packets flowing at the points; and matching means for performing real-time matching between two packet streams composed of received communications packets each time a communications packet is received. If the two packet streams are highly similar, it is highly likely that an attack or intrusion is being made and an alert is issued.
    Type: Application
    Filed: September 26, 2003
    Publication date: June 24, 2004
    Applicant: International Business Machines Corporation
    Inventors: Hiroaki Etoh, Kunikazu Yoda
  • Publication number: 20010014093
    Abstract: Log data for a packet that is exchanged across a network are recorded in a log box. At this time, the data size of the packet and the detection time are recorded. When an illegal access has occurred at a target computer, the tracing of an access chain is performed on the log information. The tracing of the access chain is performed as follows. A change in the size of the data in a packet in accordance with the time of the first connection, and a change in the size of the data in a packet in accordance with the time of the second connection are calculated using the log data, and then the shapes of the graphs formed by these packet series are compared. When the shapes of the graphs are similar, it is ascertained that the pertinent connections are included in the same chain.
    Type: Application
    Filed: January 26, 2001
    Publication date: August 16, 2001
    Inventors: Kunikazu Yoda, Hiroaki Etoh
  • Publication number: 20010013094
    Abstract: A memory device is provided that is used by a computer system and that has a memory pattern obtained after a function is called when the computer system executes a program, the memory pattern comprising: a return address storage area for storing a return address 230 for the source of a call for the execution of a currently active function; a previous frame pointer storage area for storing a previous frame pointer 220 to the calling source for the execution of a currently active function; and a local variable storage area to be located below the return address storage area 230 and the previous frame pointer storage area 22, wherein when a data array 211 is stored in the local variable area, a guard variable 212 is stored in a location preceding the data array 211, and wherein the guard variable is used as a target to confirm whether the return address has been destroyed.
    Type: Application
    Filed: January 30, 2001
    Publication date: August 9, 2001
    Inventors: Hiroaki Etoh, Kunikazu Yoda
  • Patent number: 5991752
    Abstract: The present application discloses a method and apparatus for extracting association rules from data having two or more numeric attributes and a true-false attribute, and for presenting the rules in an easily understandable form. The method comprises the steps of: (i) storing numbers u(i,j) and v(i,j) of data in each pixel whose true-false attribute is true, so as to correspond to each pixel in a plane; (ii) inputting a condition .theta.; (iii) segmenting from the plane a rectilinear region S of the pixels to maximize the equation ##EQU1## ;and (iv) outputting data included in the segmented rectilinear region S. The invention also allows regions to be derived which satisfy a desired support maximization rule, confidence maximization rule, optimized entropy rule, and optimized interclass variance rule.
    Type: Grant
    Filed: February 18, 1998
    Date of Patent: November 23, 1999
    Assignee: International Business Machines Corporation
    Inventors: Takeshi Fukuda, Kunikazu Yoda, Takeshi Tokuyama, Shinichi Morishita