Patents by Inventor Masami Tada

Masami Tada has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8528050
    Abstract: A method for delivering an instant message in a server connected to two or more computers via a network is provided. The two or more computers include groupware clients in which a user can perform login at the same time, using the same user ID, and for which status that may be different from each other can be set. Embodiments of the method includes authenticating a user of a groupware client who attempts to perform login using a user ID, recording the user ID and status information in association with an instant messaging user ID, receiving an instant message addressed to the user ID, and determining, on the basis of the status information, which of two or more client computers the instant message is sent to.
    Type: Grant
    Filed: August 15, 2008
    Date of Patent: September 3, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hiroaki Kashima, Masami Tada, Shigeki Takeuchi, Daisuke Tomoda, Hayato Uenohara, Yuhko Yamauchi
  • Publication number: 20130219462
    Abstract: A data distribution system, method and program for generating a distribution package for distribution data to a client. An environment of a requesting client requesting distribution data is detected. A determination is made of an access control execution program for implementing an access control mechanism and a loading unit on the requesting client. The access control execution program is adapted to the detected environment of the requesting client and control access to a resource from a process in the client. The loading unit loads the distribution data to a protected storage area of the client. A determination is made of a security policy specified for the distribution data. A distribution package is generated including the distribution data, the security policy, the loading unit, and the access control execution program adapted to the environment of the requesting client; and transmitting the generated distribution package to the requesting client.
    Type: Application
    Filed: July 1, 2011
    Publication date: August 22, 2013
    Applicant: International Business Machines Corporation
    Inventors: Taku Aratsu, Sanehiro Furuichi, Masami Tada
  • Patent number: 8499064
    Abstract: Mechanisms for managing a first unit and one or more other units connected to the first unit over a network are provided. The mechanisms detect, by a management unit, an operating state of the other units positioned within a specific range from the first unit on the basis of a location of each of the first and other units over the network. The operating state includes at least an operating state at which a service request is capable of being transmitted to the first unit. The mechanisms further transmit, by the management unit, to the first unit, an instruction to change an operating state of the first unit depending on a number of the other units being in the detected operating state at which the service request is capable of being transmitted.
    Type: Grant
    Filed: September 3, 2010
    Date of Patent: July 30, 2013
    Assignee: International Business Machines Corporation
    Inventors: Kazuhito Akiyama, Sanehiro Furuichi, Masami Tada
  • Patent number: 8478832
    Abstract: An email, which includes a header and historical information, is created. The header comprises a destination email address, which comprises a name of an addressed recipient of the email and a domain name of the destination email address. The historical information in the email comprises an approved address for a previously exchanged email with the addressed recipient. The first approved address is compared to a corresponding portion of the first destination email address. In response to the corresponding portion of the first destination email address being different from the first approved address as stored in the storage unit, a warning is outputted. The warning comprises both the approved address, and an unapproved address list that comprises the first destination email address.
    Type: Grant
    Filed: May 1, 2012
    Date of Patent: July 2, 2013
    Assignee: International Business Machines Corporation
    Inventors: Kenji Hirota, Tomonori Sugiura, Masami Tada, Hidekuni Ueda
  • Patent number: 8359359
    Abstract: A device and method are described to create a reply message in which, even in a case where electronic messages are exchanged among a plurality of users, a past electronic message to be referred to as a desired reply message can be efficiently retrieved, and trouble in creating a reply message can be reduced. When a first electronic message that has been stored most recently has been extracted from history information, and when an instruction indicating that the body part of the first electronic message is necessary has been accepted, the body part of the first electronic message is temporarily stored. A second electronic message that has been stored next most recently is extracted from the history information.
    Type: Grant
    Filed: November 30, 2009
    Date of Patent: January 22, 2013
    Assignee: International Business Machines Corporation
    Inventor: Masami Tada
  • Publication number: 20130007469
    Abstract: Provided are a computer readable storage medium, computer apparatus, and method for securely managing the execution of screen rendering instructions in a host operating system and virtual machine. A first rendering instruction hooking section is set to a first mode to hook a screen rendering instruction issued by a virtual machine application in a virtual machine. A second rendering instruction hooking section is set to a second mode to hook instructions issued by the virtual machine application. The hooked screen rendering instruction issued by the virtual machine application are encrypted in response to the setting of the first mode to produce illegible output. The hooked screen rendering instruction issued by the virtual machine application are encrypted in response to the setting of the second mode. The encrypted hooked screen rendering instruction encrypted in the second mode are issued to a host operating system to decrypt.
    Type: Application
    Filed: June 4, 2012
    Publication date: January 3, 2013
    Applicant: INTERNATIOANL BUSINESS MACHINES CORPORATION
    Inventors: Taku Aratsu, Sanehiro Furuichi, Masami Tada
  • Patent number: 8347346
    Abstract: Granular policy management is provided based upon an active status of a process and the display status of an associated visual display. A policy is constructed and applied to a process by a combination of individual control policy parameters associated with the status of a process or a graphical user interface. Each active policy is dynamically adjusted in response to a change in at least one policy condition.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: January 1, 2013
    Assignee: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Atsumi Ikebe, Takuya Mishina, Masami Tada
  • Publication number: 20120297452
    Abstract: A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation.
    Type: Application
    Filed: July 27, 2012
    Publication date: November 22, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seiji Munetoh, Akira Ohkado, Yukihiko Sohda, Masami Tada
  • Patent number: 8312293
    Abstract: An external storage device connectable to an information processing apparatus is provided. The storage device includes: an input/output interface via which data is exchanged with an information processing apparatus; a first storage region where data associated with first and second validity periods is stored; and a second storage region where a control program is stored. While the first validity period is used when the external storage device is connected to one information processing apparatus, the second validity period is used when the external storage device is connected to another information processing apparatus. The control program causes a processor to execute the steps of: establishing connection of the external storage device to an information processing apparatus; identifying any one of the validity periods as a validity period to be used for the data; and executing predetermined security protection processing on the data in accordance with the identified validity period.
    Type: Grant
    Filed: March 8, 2010
    Date of Patent: November 13, 2012
    Assignee: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Yasuhide Niimura, Masami Tada
  • Patent number: 8297504
    Abstract: The system includes a first receiver that, when information has been printed on the medium using a printing apparatus, receives, from the printing apparatus, an electronic tag ID of an electronic tag in the printed medium and a plurality of recipient IDs specified by a user, a second receiver that, when the printed medium has been stored in a repository, receives, from the repository, an electronic tag ID of an electronic tag in the stored medium and an ID in association with the repository (hereinafter called the repository ID), and an associating unit that, when the electronic tag ID sent from the printing apparatus agrees with the electronic tag ID sent from the repository, associates a recipient ID corresponding to the repository ID sent from the repository, out of the plurality of recipient IDs sent from the printing apparatus, with the agreed electronic tag ID.
    Type: Grant
    Filed: June 19, 2009
    Date of Patent: October 30, 2012
    Assignee: International Business Machines Corporation
    Inventors: Masami Tada, Keiji Satoh
  • Publication number: 20120265999
    Abstract: An external storage device connectable to an information processing apparatus is provided. The storage device includes: an input/output interface via which data is exchanged with an information processing apparatus; a first storage region where data associated with first and second validity periods is stored; and a second storage region where a control program is stored. While the first validity period is used when the external storage device is connected to one information processing apparatus, the second validity period is used when the external storage device is connected to another information processing apparatus. The control program causes a processor to execute the steps of: establishing connection of the external storage device to an information processing apparatus; identifying any one of the validity periods as a validity period to be used for the data; and executing predetermined security protection processing on the data in accordance with the identified validity period.
    Type: Application
    Filed: June 21, 2012
    Publication date: October 18, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SANEHIRO FURUICHI, YASUHIDE NIIMURA, MASAMI TADA
  • Publication number: 20120254951
    Abstract: A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation.
    Type: Application
    Filed: March 14, 2012
    Publication date: October 4, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seiji Munetoh, Akira Ohkado, Yukihiko Sohda, Masami Tada
  • Publication number: 20120222126
    Abstract: An email, which includes a header and historical information, is created. The header comprises a destination email address, which comprises a name of an addressed recipient of the email and a domain name of the destination email address. The historical information in the email comprises an approved address for a previously exchanged email with the addressed recipient. The first approved address is compared to a corresponding portion of the first destination email address. In response to the corresponding portion of the first destination email address being different from the first approved address as stored in the storage unit, a warning is outputted. The warning comprises both the approved address, and an unapproved address list that comprises the first destination email address.
    Type: Application
    Filed: May 1, 2012
    Publication date: August 30, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: KENJI HIROTA, TOMONORI SUGIURA, MASAMI TADA, HIDEKUNI UEDA
  • Publication number: 20120215591
    Abstract: A print server selects a printer system to execute a print job received from a client, the printer system selected from among a plurality of printer systems connected to the network, the print server comprising a basic information acquiring section that acquires, at predetermining timing, unit price calculation basic information on printer systems in operation including at least information on environmental load information from at least one of the plurality of printer systems and external computers, a unit price calculating section that calculates a print unit price for each printer system based on the acquired unit price calculation basic information, a storage section that stores the calculated unit price in association with identification information for identifying the printer system and a sending section that sends the print unit prices and the identities of the printer systems associated with the calculated unit prices to the client.
    Type: Application
    Filed: May 2, 2012
    Publication date: August 23, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kazuhito Akiyama, Sanehiro Furuichi, Masami Tada
  • Patent number: 8250160
    Abstract: An email is created that includes one or more destination email addresses, plus historical information regarding previously exchanged emails. Before sending this email, each of the destination email addresses is checked against the email addresses in the historical information and, if a destination email address (or the domain name of that destination address) is not found in the historical information, then a warning is displayed to alert the user to the fact that this historical information may be sent to an unintended recipient. In response to this warning, which may include a list of unapproved destination email address, the user may approve a previously unapproved destination email address, change the unapproved destination email address to one that has been previously approved, or enter a new distribution email to be substituted for the unapproved one. When creating the email, the user may also specify other approved email addresses.
    Type: Grant
    Filed: April 19, 2010
    Date of Patent: August 21, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kenji Hirota, Tomonori Sugiura, Masami Tada, Hidekuni Ueda
  • Publication number: 20120210080
    Abstract: A data protection program for protecting data to be processed by an application, and a computer including volatile storage means and nonvolatile storage means performs a volatile file unpack function of writing, to the nonvolatile storage means, data corresponding to a data file to be read or written by the application so that the data is associated with the data file; and a volatile file repackage function of outputting the data file corresponding to the data written to the volatile storage means.
    Type: Application
    Filed: April 23, 2012
    Publication date: August 16, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sanehiro Furuichi, Masami Tada
  • Publication number: 20120210158
    Abstract: An anomaly detection mechanism is provided that detects an anomaly in a control network, and includes an identifying unit to receive event information on an event that occurs, and to identify a group including a resource related to the event information by referring to a configuration management database for retaining dependence relationships between processes and resources including a control system; a policy storing unit to store one or more policies each of which associates one or more actions with a condition defining a situation suspected to have an anomaly; an adding unit to acquire group-related information needed for application to the one or more policies, and to add the acquired information to the event information; and a determining unit to apply the event information to the one or more policies and to determine the one or more actions associated with the matched condition as one or more actions to be taken.
    Type: Application
    Filed: February 3, 2012
    Publication date: August 16, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kazuhito Akiyama, Akira Ohkado, Yukihiko Sohda, Masami Tada, Tadashi Tsumura
  • Publication number: 20120209411
    Abstract: A mechanism is provided for effectively detecting an abnormality occurring in a control system and isolating the control system in which abnormality is acknowledged. The mechanism receives, from one or more control systems in the plurality of control systems, respective abnormality notifications for respective counter control systems to be monitored by the plurality of control systems. The mechanism adds up abnormality notifications transmitted from respective monitoring sections of the plurality of control systems so as to evaluate the reputation of a control system suspected to have an abnormality. The mechanism causes a protected area for operating the control system suspected to have an abnormality to restrict outbound traffic from at least the inside of the protected area, when an indication is identified that the control system is abnormal according to criteria from a result of the evaluation.
    Type: Application
    Filed: February 3, 2012
    Publication date: August 16, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Akira Ohkado, Yukihiko Sohda, Masami Tada, Tadashi Tsumura
  • Publication number: 20120166442
    Abstract: Systems and methods categorize data to perform access control. A system receives first data, where the first data comprises at least a portion of data to be categorized. The system analyzes the first data to determine Whether the first data belongs to a first category. If the first data belongs to a first category, the system applies a first access control set to actions on the data to be categorized. Further, if one or more of the actions on the data to be categorized has an access control status of pending after applying the first access control set, the system receives second data, where the second data comprises at least a portion of data to be categorized. The system analyzes the second data to determine whether the second data belongs to a second category. If the second data belongs to a second category, the system applies a second access control set to at least one of the actions having the access control status of pending.
    Type: Application
    Filed: December 22, 2011
    Publication date: June 28, 2012
    Applicant: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Hideo Ichinomiya, Hayato Kiriyama, Masami Tada, Taku Aratsu
  • Publication number: 20120166737
    Abstract: An enhanced security protection in data duplication using a shared storage area is provided. Specifically, an information processing apparatus, in which one or more applications operate, includes a copy-operation monitoring portion that acquires copy data that the copy source application issues an instruction to copy to a general-purpose shared memory, sets a lifetime interpreted from an operation pattern via an input device for the copy data, and then stores the copy data in a storage area; a display portion that displays, on a display, a paste candidate selected from one or more items of copy data stored in the storage area; a paste-operation monitoring portion that transfers the paste candidate read from the storage area to the paste destination application in response to a confirmation operation via the input device; and an erasing portion that erases, from the storage area, copy data that has become unpermitted to remain because the lifetime has expired.
    Type: Application
    Filed: December 22, 2011
    Publication date: June 28, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sanehiro Furuichi, Masami Tada