Patents by Inventor Takahide Nogayama

Takahide Nogayama has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11995105
    Abstract: Methods and systems for software analysis include determining a similarity score for an ordered input set and at least one ordered cluster set that represents a distance between the ordered input set and the at least one ordered cluster set. It is determined that he ordered input is similar to a first cluster of the at least one ordered cluster set, based on the similarity score. The ordered input set is merged to the first cluster of the at least one cluster set to generate a merged set that preserves an ordering of the ordered input set and the first cluster. Software analysis is performed using the merged set.
    Type: Grant
    Filed: January 5, 2022
    Date of Patent: May 28, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Akihiko Tozawa, Takahide Nogayama, Ai Yoshino, Yasuharu Katsuno
  • Publication number: 20230214409
    Abstract: Methods and systems for software analysis include determining a similarity score for an ordered input set and at least one ordered cluster set that represents a distance between the ordered input set and the at least one ordered cluster set. It is determined that he ordered input is similar to a first cluster of the at least one ordered cluster set, based on the similarity score. The ordered input set is merged to the first cluster of the at least one cluster set to generate a merged set that preserves an ordering of the ordered input set and the first cluster. Software analysis is performed using the merged set.
    Type: Application
    Filed: January 5, 2022
    Publication date: July 6, 2023
    Inventors: Akihiko Tozawa, TAKAHIDE NOGAYAMA, AI YOSHINO, YASUHARU KATSUNO
  • Publication number: 20230185582
    Abstract: Automation methods and systems include identifying common parts of consecutive pairs of consecutive screen outputs. The consecutive screen outputs are clustered responsive to a determination that a distance between the common parts of the consecutive pairs is lower than a threshold distance value. Interactions with a remote computer system are automated based on the clustered consecutive screen outputs.
    Type: Application
    Filed: December 14, 2021
    Publication date: June 15, 2023
    Inventors: TAKAHIDE NOGAYAMA, Akihiko Tozawa
  • Patent number: 11122044
    Abstract: A computer-implemented method for invalidating an access token includes generating an access token and an HTML file in response to receipt of a request for issuing the access token, the HTML file comprising a set of instructions for rendering on one window in a browser, a code for generating a child segment in a memory which is controlled by the window, and a code for invalidating the access token in response to completion of rendering on the child segment, in response to completion of receiving, from a resource server, one or more resources requested by a client program executed on the child segment or in response to closing of the window, sending the access token and the HTML file to the browser, and invalidating the access token, in response to receipt, from the browser, of a request for invalidating the access token.
    Type: Grant
    Filed: May 16, 2019
    Date of Patent: September 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Miki Enoki, Rika Nagahara, Takahide Nogayama, Takashi Sakairi
  • Patent number: 11057188
    Abstract: An example operation may include one or more of requesting, by a client, a service that does not require an account registration, providing, by a server coupled to the client, calculation parameters comprising block content for a new block of a blockchain network to the client, calculating, by the client, one or more hashes of the block content while changing one or more nonces in the block, verifying the one or more hashes and nonces of the block content are valid, submitting, by the client, the one or more valid nonces to the server, submitting a valid hash to the blockchain network, and in response receiving a reward from the blockchain network.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: July 6, 2021
    Assignee: International Business Machines Corporation
    Inventors: Takahide Nogayama, Toshihiro Takahashi
  • Patent number: 10977577
    Abstract: Methods and systems for estimating latent service and latent wait times include extracting transition times between activities from a partial event log. Parameters for respective gamma distributions are estimated that characterize latent waiting time and latent service time for each activity. A latent waiting time and latent service time for each activity is estimated based on the estimated parameters using a processor.
    Type: Grant
    Filed: May 13, 2020
    Date of Patent: April 13, 2021
    Assignee: International Business Machines Corporation
    Inventor: Takahide Nogayama
  • Publication number: 20210058231
    Abstract: An example operation may include one or more of requesting, by a client, a service that does not require an account registration, providing, by a server coupled to the client, calculation parameters comprising block content for a new block of a blockchain network to the client, calculating, by the client, one or more hashes of the block content while changing one or more nonces in the block, verifying the one or more hashes and nonces of the block content are valid, submitting, by the client, the one or more valid nonces to the server, submitting a valid hash to the blockchain network, and in response receiving a reward from the blockchain network.
    Type: Application
    Filed: August 19, 2019
    Publication date: February 25, 2021
    Inventors: TAKAHIDE NOGAYAMA, TOSHIHIRO TAKAHASHI
  • Publication number: 20210034279
    Abstract: Operation testing without side effects may be enabled by a method including preparing a copy of a directory set of at least a part of a host system disk, creating a link to a file in a first directory in the host system disk, in a second directory of the copy of the directory set, wherein the second directory corresponds in position to the first directory in the directory set, and starting a non-privileged system using a disk image including the copy of the directory set and the created link.
    Type: Application
    Filed: August 1, 2019
    Publication date: February 4, 2021
    Inventors: Takuya Mishina, Yasuharu Katsuno, Takahide Nogayama, Fumiko Akiyama
  • Publication number: 20200272932
    Abstract: Methods and systems for estimating latent service and latent wait times include extracting transition times between activities from a partial event log. Parameters for respective gamma distributions are estimated that characterize latent waiting time and latent service time for each activity. A latent waiting time and latent service time for each activity is estimated based on the estimated parameters using a processor.
    Type: Application
    Filed: May 13, 2020
    Publication date: August 27, 2020
    Inventor: TAKAHIDE NOGAYAMA
  • Patent number: 10733526
    Abstract: Methods and systems for estimating latent service and latent wait times include extracting transition times between activities from a partial event log. Parameters for respective gamma distributions are estimated that characterize latent waiting time and latent service time for each activity. A latent waiting time and latent service time for each activity is estimated based on the estimated parameters using a processor.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: August 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Takahide Nogayama
  • Patent number: 10540379
    Abstract: A method, executed by one or more processors, includes receiving a first bit sequence corresponding to source data having a source encoding bit-length (BLS), generating one or more additional bit sequences by shifting the first bit sequence by shift lengths that are equal to a multiple of the source encoding bit-length, partitioning the first bit sequence and the one or more additional bit sequences according to a target encoding bit-length (BLT) to provide a plurality of target encoding search patterns, and searching a target character string encoded with the target encoding using the plurality of target encoding search patterns. A computer system and computer program product corresponding to the above method are also disclosed herein.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: January 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Takahide Nogayama, Daisuke Mogi, Takeshi Kubota, Hideki Inomata, Yu Ito
  • Publication number: 20190281058
    Abstract: A computer-implemented method for invalidating an access token includes generating an access token and an HTML file in response to receipt of a request for issuing the access token, the HTML file comprising a set of instructions for rendering on one window in a browser, a code for generating a child segment in a memory which is controlled by the window, and a code for invalidating the access token in response to completion of rendering on the child segment, in response to completion of receiving, from a resource server, one or more resources requested by a client program executed on the child segment or in response to closing of the window, sending the access token and the HTML file to the browser, and invalidating the access token, in response to receipt, from the browser, of a request for invalidating the access token.
    Type: Application
    Filed: May 16, 2019
    Publication date: September 12, 2019
    Inventors: Miki Enoki, Rika Nagahara, Takahide Nogayama, Takashi Sakairi
  • Patent number: 10367816
    Abstract: A computer-implemented method for invalidating an access token includes generating an access token and an HTML file in response to receipt of a request for issuing the access token, the HTML file comprising a set of instructions for rendering on one window in a browser, a code for generating a child segment in a memory which is controlled by the window, and a code for invalidating the access token in response to completion of rendering on the child segment, in response to completion of receiving, from a resource server, one or more resources requested by a client program executed on the child segment or in response to closing of the window, sending the access token and the HTML file to the browser, and invalidating the access token, in response to receipt, from the browser, of a request for invalidating the access token.
    Type: Grant
    Filed: October 18, 2016
    Date of Patent: July 30, 2019
    Assignee: International Business Machines Corporation
    Inventors: Miki Enoki, Rika Nagahara, Takahide Nogayama, Takashi Sakairi
  • Publication number: 20190179952
    Abstract: A method, executed by one or more processors, includes receiving a first bit sequence corresponding to source data having a source encoding bit-length (BLS), generating one or more additional bit sequences by shifting the first bit sequence by shift lengths that are equal to a multiple of the source encoding bit-length, partitioning the first bit sequence and the one or more additional bit sequences according to a target encoding bit-length (BLT) to provide a plurality of target encoding search patterns, and searching a target character string encoded with the target encoding using the plurality of target encoding search patterns. A computer system and computer program product corresponding to the above method are also disclosed herein.
    Type: Application
    Filed: December 11, 2017
    Publication date: June 13, 2019
    Inventors: Takahide Nogayama, Daisuke Mogi, Takeshi Kubota, Hideki Inomata, Yu Ito
  • Patent number: 10305936
    Abstract: A method and system are provided for performing a security inspection of a set of virtual images. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes applying a bisection method against a path in the tree from the root to a given one of the plurality of leaves having a given one of the virtual images in which a security violation has been identified to find a particular one of the virtual images that is a root cause of the security violation. The method also includes performing a corrective action for any of the plurality of images having the security violation.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: May 28, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H. P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe
  • Publication number: 20180241780
    Abstract: A method and system are provided for performing a security inspection of a set of virtual images. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes applying a bisection method against a path in the tree from the root to a given one of the plurality of leaves having a given one of the virtual images in which a security violation has been identified to find a particular one of the virtual images that is a root cause of the security violation. The method also includes performing a corrective action for any of the plurality of images having the security violation.
    Type: Application
    Filed: April 23, 2018
    Publication date: August 23, 2018
    Inventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H.P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe
  • Patent number: 10003613
    Abstract: A method and system are provided for performing a security inspection of a set of virtual images in a cloud infrastructure. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes identifying a security violation in a given one of the virtual images at a given one of the plurality of leaves. The method also includes applying a bisection method against a path in the tree from the root to the given one of the plurality of leaves to find a particular one of the virtual images that is a root cause of the security violation. The method additionally includes performing a corrective action for any of the plurality of images having the security violation.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: June 19, 2018
    Assignee: International Business Machines Corporation
    Inventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H. P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe
  • Publication number: 20180109539
    Abstract: A computer-implemented method for invalidating an access token includes generating an access token and an HTML file in response to receipt of a request for issuing the access token, the HTML file comprising a set of instructions for rendering on one window in a browser, a code for generating a child segment in a memory which is controlled by the window, and a code for invalidating the access token in response to completion of rendering on the child segment, in response to completion of receiving, from a resource server, one or more resources requested by a client program executed on the child segment or in response to closing of the window, sending the access token and the HTML file to the browser, and invalidating the access token, in response to receipt, from the browser, of a request for invalidating the access token.
    Type: Application
    Filed: October 18, 2016
    Publication date: April 19, 2018
    Inventors: Miki Enoki, Rika Nagahara, Takahide Nogayama, Takashi Sakairi
  • Patent number: 9792533
    Abstract: A three-dimensional shape of a subject is acquired in a healthy and realistic calculation time, using two-dimensional images taken by a general camera having a narrow angle of view. The processing apparatus calculates an image taking position of each of a plurality of images, and includes: a storage unit for storing thereinto a selected image set including images whose image taking position has been calculated; a calculation unit calculates a plurality of image taking position candidates for an unselected image of the plurality of images; a selection unit selects an optimum image taking position having a highest degree of coincidence in correspondence points, from among the plurality of image taking position candidates for the unselected image; and a determination unit determines whether or not the unselected image is added to the selected image set.
    Type: Grant
    Filed: December 16, 2015
    Date of Patent: October 17, 2017
    Assignee: International Business Machines Corporation
    Inventors: Takahide Nogayama, Toshihiro Takahashi
  • Publication number: 20170180422
    Abstract: A method and system are provided for performing a security inspection of a set of virtual images in a cloud infrastructure. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes identifying a security violation in a given one of the virtual images at a given one of the plurality of leaves. The method also includes applying a bisection method against a path in the tree from the root to the given one of the plurality of leaves to find a particular one of the virtual images that is a root cause of the security violation. The method additionally includes performing a corrective action for any of the plurality of images having the security violation.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Inventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H.P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe