Patents by Inventor Takahide Nogayama
Takahide Nogayama has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11995105Abstract: Methods and systems for software analysis include determining a similarity score for an ordered input set and at least one ordered cluster set that represents a distance between the ordered input set and the at least one ordered cluster set. It is determined that he ordered input is similar to a first cluster of the at least one ordered cluster set, based on the similarity score. The ordered input set is merged to the first cluster of the at least one cluster set to generate a merged set that preserves an ordering of the ordered input set and the first cluster. Software analysis is performed using the merged set.Type: GrantFiled: January 5, 2022Date of Patent: May 28, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Akihiko Tozawa, Takahide Nogayama, Ai Yoshino, Yasuharu Katsuno
-
Publication number: 20230214409Abstract: Methods and systems for software analysis include determining a similarity score for an ordered input set and at least one ordered cluster set that represents a distance between the ordered input set and the at least one ordered cluster set. It is determined that he ordered input is similar to a first cluster of the at least one ordered cluster set, based on the similarity score. The ordered input set is merged to the first cluster of the at least one cluster set to generate a merged set that preserves an ordering of the ordered input set and the first cluster. Software analysis is performed using the merged set.Type: ApplicationFiled: January 5, 2022Publication date: July 6, 2023Inventors: Akihiko Tozawa, TAKAHIDE NOGAYAMA, AI YOSHINO, YASUHARU KATSUNO
-
Publication number: 20230185582Abstract: Automation methods and systems include identifying common parts of consecutive pairs of consecutive screen outputs. The consecutive screen outputs are clustered responsive to a determination that a distance between the common parts of the consecutive pairs is lower than a threshold distance value. Interactions with a remote computer system are automated based on the clustered consecutive screen outputs.Type: ApplicationFiled: December 14, 2021Publication date: June 15, 2023Inventors: TAKAHIDE NOGAYAMA, Akihiko Tozawa
-
Patent number: 11122044Abstract: A computer-implemented method for invalidating an access token includes generating an access token and an HTML file in response to receipt of a request for issuing the access token, the HTML file comprising a set of instructions for rendering on one window in a browser, a code for generating a child segment in a memory which is controlled by the window, and a code for invalidating the access token in response to completion of rendering on the child segment, in response to completion of receiving, from a resource server, one or more resources requested by a client program executed on the child segment or in response to closing of the window, sending the access token and the HTML file to the browser, and invalidating the access token, in response to receipt, from the browser, of a request for invalidating the access token.Type: GrantFiled: May 16, 2019Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventors: Miki Enoki, Rika Nagahara, Takahide Nogayama, Takashi Sakairi
-
Patent number: 11057188Abstract: An example operation may include one or more of requesting, by a client, a service that does not require an account registration, providing, by a server coupled to the client, calculation parameters comprising block content for a new block of a blockchain network to the client, calculating, by the client, one or more hashes of the block content while changing one or more nonces in the block, verifying the one or more hashes and nonces of the block content are valid, submitting, by the client, the one or more valid nonces to the server, submitting a valid hash to the blockchain network, and in response receiving a reward from the blockchain network.Type: GrantFiled: August 19, 2019Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Takahide Nogayama, Toshihiro Takahashi
-
Patent number: 10977577Abstract: Methods and systems for estimating latent service and latent wait times include extracting transition times between activities from a partial event log. Parameters for respective gamma distributions are estimated that characterize latent waiting time and latent service time for each activity. A latent waiting time and latent service time for each activity is estimated based on the estimated parameters using a processor.Type: GrantFiled: May 13, 2020Date of Patent: April 13, 2021Assignee: International Business Machines CorporationInventor: Takahide Nogayama
-
Publication number: 20210058231Abstract: An example operation may include one or more of requesting, by a client, a service that does not require an account registration, providing, by a server coupled to the client, calculation parameters comprising block content for a new block of a blockchain network to the client, calculating, by the client, one or more hashes of the block content while changing one or more nonces in the block, verifying the one or more hashes and nonces of the block content are valid, submitting, by the client, the one or more valid nonces to the server, submitting a valid hash to the blockchain network, and in response receiving a reward from the blockchain network.Type: ApplicationFiled: August 19, 2019Publication date: February 25, 2021Inventors: TAKAHIDE NOGAYAMA, TOSHIHIRO TAKAHASHI
-
Publication number: 20210034279Abstract: Operation testing without side effects may be enabled by a method including preparing a copy of a directory set of at least a part of a host system disk, creating a link to a file in a first directory in the host system disk, in a second directory of the copy of the directory set, wherein the second directory corresponds in position to the first directory in the directory set, and starting a non-privileged system using a disk image including the copy of the directory set and the created link.Type: ApplicationFiled: August 1, 2019Publication date: February 4, 2021Inventors: Takuya Mishina, Yasuharu Katsuno, Takahide Nogayama, Fumiko Akiyama
-
Publication number: 20200272932Abstract: Methods and systems for estimating latent service and latent wait times include extracting transition times between activities from a partial event log. Parameters for respective gamma distributions are estimated that characterize latent waiting time and latent service time for each activity. A latent waiting time and latent service time for each activity is estimated based on the estimated parameters using a processor.Type: ApplicationFiled: May 13, 2020Publication date: August 27, 2020Inventor: TAKAHIDE NOGAYAMA
-
Patent number: 10733526Abstract: Methods and systems for estimating latent service and latent wait times include extracting transition times between activities from a partial event log. Parameters for respective gamma distributions are estimated that characterize latent waiting time and latent service time for each activity. A latent waiting time and latent service time for each activity is estimated based on the estimated parameters using a processor.Type: GrantFiled: December 9, 2015Date of Patent: August 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Takahide Nogayama
-
Patent number: 10540379Abstract: A method, executed by one or more processors, includes receiving a first bit sequence corresponding to source data having a source encoding bit-length (BLS), generating one or more additional bit sequences by shifting the first bit sequence by shift lengths that are equal to a multiple of the source encoding bit-length, partitioning the first bit sequence and the one or more additional bit sequences according to a target encoding bit-length (BLT) to provide a plurality of target encoding search patterns, and searching a target character string encoded with the target encoding using the plurality of target encoding search patterns. A computer system and computer program product corresponding to the above method are also disclosed herein.Type: GrantFiled: December 11, 2017Date of Patent: January 21, 2020Assignee: International Business Machines CorporationInventors: Takahide Nogayama, Daisuke Mogi, Takeshi Kubota, Hideki Inomata, Yu Ito
-
Publication number: 20190281058Abstract: A computer-implemented method for invalidating an access token includes generating an access token and an HTML file in response to receipt of a request for issuing the access token, the HTML file comprising a set of instructions for rendering on one window in a browser, a code for generating a child segment in a memory which is controlled by the window, and a code for invalidating the access token in response to completion of rendering on the child segment, in response to completion of receiving, from a resource server, one or more resources requested by a client program executed on the child segment or in response to closing of the window, sending the access token and the HTML file to the browser, and invalidating the access token, in response to receipt, from the browser, of a request for invalidating the access token.Type: ApplicationFiled: May 16, 2019Publication date: September 12, 2019Inventors: Miki Enoki, Rika Nagahara, Takahide Nogayama, Takashi Sakairi
-
Patent number: 10367816Abstract: A computer-implemented method for invalidating an access token includes generating an access token and an HTML file in response to receipt of a request for issuing the access token, the HTML file comprising a set of instructions for rendering on one window in a browser, a code for generating a child segment in a memory which is controlled by the window, and a code for invalidating the access token in response to completion of rendering on the child segment, in response to completion of receiving, from a resource server, one or more resources requested by a client program executed on the child segment or in response to closing of the window, sending the access token and the HTML file to the browser, and invalidating the access token, in response to receipt, from the browser, of a request for invalidating the access token.Type: GrantFiled: October 18, 2016Date of Patent: July 30, 2019Assignee: International Business Machines CorporationInventors: Miki Enoki, Rika Nagahara, Takahide Nogayama, Takashi Sakairi
-
Publication number: 20190179952Abstract: A method, executed by one or more processors, includes receiving a first bit sequence corresponding to source data having a source encoding bit-length (BLS), generating one or more additional bit sequences by shifting the first bit sequence by shift lengths that are equal to a multiple of the source encoding bit-length, partitioning the first bit sequence and the one or more additional bit sequences according to a target encoding bit-length (BLT) to provide a plurality of target encoding search patterns, and searching a target character string encoded with the target encoding using the plurality of target encoding search patterns. A computer system and computer program product corresponding to the above method are also disclosed herein.Type: ApplicationFiled: December 11, 2017Publication date: June 13, 2019Inventors: Takahide Nogayama, Daisuke Mogi, Takeshi Kubota, Hideki Inomata, Yu Ito
-
Security inspection of massive virtual hosts for immutable infrastructure and infrastructure as code
Patent number: 10305936Abstract: A method and system are provided for performing a security inspection of a set of virtual images. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes applying a bisection method against a path in the tree from the root to a given one of the plurality of leaves having a given one of the virtual images in which a security violation has been identified to find a particular one of the virtual images that is a root cause of the security violation. The method also includes performing a corrective action for any of the plurality of images having the security violation.Type: GrantFiled: April 23, 2018Date of Patent: May 28, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H. P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe -
SECURITY INSPECTION OF MASSIVE VIRTUAL HOSTS FOR IMMUTABLE INFRASTRUCTURE AND INFRASTRUCTURE AS CODE
Publication number: 20180241780Abstract: A method and system are provided for performing a security inspection of a set of virtual images. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes applying a bisection method against a path in the tree from the root to a given one of the plurality of leaves having a given one of the virtual images in which a security violation has been identified to find a particular one of the virtual images that is a root cause of the security violation. The method also includes performing a corrective action for any of the plurality of images having the security violation.Type: ApplicationFiled: April 23, 2018Publication date: August 23, 2018Inventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H.P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe -
Security inspection of massive virtual hosts for immutable infrastructure and infrastructure as code
Patent number: 10003613Abstract: A method and system are provided for performing a security inspection of a set of virtual images in a cloud infrastructure. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes identifying a security violation in a given one of the virtual images at a given one of the plurality of leaves. The method also includes applying a bisection method against a path in the tree from the root to the given one of the plurality of leaves to find a particular one of the virtual images that is a root cause of the security violation. The method additionally includes performing a corrective action for any of the plurality of images having the security violation.Type: GrantFiled: December 18, 2015Date of Patent: June 19, 2018Assignee: International Business Machines CorporationInventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H. P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe -
Publication number: 20180109539Abstract: A computer-implemented method for invalidating an access token includes generating an access token and an HTML file in response to receipt of a request for issuing the access token, the HTML file comprising a set of instructions for rendering on one window in a browser, a code for generating a child segment in a memory which is controlled by the window, and a code for invalidating the access token in response to completion of rendering on the child segment, in response to completion of receiving, from a resource server, one or more resources requested by a client program executed on the child segment or in response to closing of the window, sending the access token and the HTML file to the browser, and invalidating the access token, in response to receipt, from the browser, of a request for invalidating the access token.Type: ApplicationFiled: October 18, 2016Publication date: April 19, 2018Inventors: Miki Enoki, Rika Nagahara, Takahide Nogayama, Takashi Sakairi
-
Patent number: 9792533Abstract: A three-dimensional shape of a subject is acquired in a healthy and realistic calculation time, using two-dimensional images taken by a general camera having a narrow angle of view. The processing apparatus calculates an image taking position of each of a plurality of images, and includes: a storage unit for storing thereinto a selected image set including images whose image taking position has been calculated; a calculation unit calculates a plurality of image taking position candidates for an unselected image of the plurality of images; a selection unit selects an optimum image taking position having a highest degree of coincidence in correspondence points, from among the plurality of image taking position candidates for the unselected image; and a determination unit determines whether or not the unselected image is added to the selected image set.Type: GrantFiled: December 16, 2015Date of Patent: October 17, 2017Assignee: International Business Machines CorporationInventors: Takahide Nogayama, Toshihiro Takahashi
-
SECURITY INSPECTION OF MASSIVE VIRTUAL HOSTS FOR IMMUTABLE INFRASTRUCTURE AND INFRASTRUCTURE AS CODE
Publication number: 20170180422Abstract: A method and system are provided for performing a security inspection of a set of virtual images in a cloud infrastructure. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes identifying a security violation in a given one of the virtual images at a given one of the plurality of leaves. The method also includes applying a bisection method against a path in the tree from the root to the given one of the plurality of leaves to find a particular one of the virtual images that is a root cause of the security violation. The method additionally includes performing a corrective action for any of the plurality of images having the security violation.Type: ApplicationFiled: December 18, 2015Publication date: June 22, 2017Inventors: Masayoshi Mizutani, Takahide Nogayama, Raymond H.P. Rudy, Scott R. Trent, Yuta Tsuboi, Yuji Watanabe