Patents by Inventor Yasuhiro Onoda
Yasuhiro Onoda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11539505Abstract: A method and system. An instruction to encrypt plaintext to generate encrypted data from the plaintext is received. The encrypted data is to be stored in a database device in response to a first request received from a client terminal to store the plaintext in the database device. The first request includes the plaintext. Ciphertext is generated by applying both an initialization vector and an encryption key directly to the plaintext. An embedding rule used to generate the encrypted data is selected from a sequence of embedding rules. The encrypted data is stored in the database device, A second request to receive the plaintext data is received from the client terminal. The plaintext is obtained from the encrypted data, by separating the encrypted data into the ciphertext and the initialization vector; and generating the plaintext by decrypting the ciphertext that was separated from the encrypted data.Type: GrantFiled: June 17, 2019Date of Patent: December 27, 2022Assignee: KYNDRYL, INC.Inventor: Yasuhiro Onoda
-
Patent number: 10803079Abstract: A method of querying data including: providing a transaction management table; providing a system-period temporal table; assigning a unique identifier to a transaction; performing a first operation at a first timestamp; writing a first row identifier in the system-period temporal table; writing in the row corresponding to the first row identifier the unique identifier of the first operation in the row begin entry of the system-period temporal table; writing in the row corresponding to the first row identifier a dummy transaction identifier corresponding to a maximum timestamp value of the database system in the row end entry of the system-period temporal table; committing the transaction at a commit timestamp such that the commit timestamp is later than the first timestamp; inserting a row in the transaction management table and inserting values for the unique transaction identifier, the first timestamp and the commit timestamp in the transaction management table.Type: GrantFiled: July 25, 2017Date of Patent: October 13, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Yasuhiro Onoda
-
Publication number: 20190305929Abstract: A method and system. An instruction to encrypt plaintext to generate encrypted data from the plaintext is received. The encrypted data is to be stored in a database device in response to a first request received from a client terminal to store the plaintext in the database device. The first request includes the plaintext. Ciphertext is generated by applying both an initialization vector and an encryption key directly to the plaintext. An embedding rule used to generate the encrypted data is selected from a sequence of embedding rules. The encrypted data is stored in the database device, A second request to receive the plaintext data is received from the client terminal. The plaintext is obtained from the encrypted data, by separating the encrypted data into the ciphertext and the initialization vector; and generating the plaintext by decrypting the ciphertext that was separated from the encrypted data.Type: ApplicationFiled: June 17, 2019Publication date: October 3, 2019Inventor: Yasuhiro Onoda
-
Patent number: 10396977Abstract: A method and system. Ciphertext is generated by applying both an initialization vector and an encryption key directly to plaintext. The initialization vector is combined with the ciphertext to generate encrypted data, by using an embedding rule to perform the combining.Type: GrantFiled: January 23, 2017Date of Patent: August 27, 2019Assignee: International Business Machines CorporationInventor: Yasuhiro Onoda
-
Patent number: 10218712Abstract: Access control within a network is established by combining multiple factors to prevent unauthorized access to a computer and/or network target system. The factors which may be combined are selected from a combination of three main factors confirmation that the accessing device which is attempting access is by an authorized user; the access request is made by a device that corresponds to an authorized degree of importance; and the accessing device is connected from a network that corresponds to the authorized degree of importance.Type: GrantFiled: January 25, 2017Date of Patent: February 26, 2019Assignee: International Business Machines CorporationInventors: Yasuhiro Onoda, Hironori Yuasa
-
Publication number: 20190034502Abstract: A method of querying data including: providing a transaction management table; providing a system-period temporal table; assigning a unique identifier to a transaction; performing a first operation at a first timestamp; writing a first row identifier in the system-period temporal table; writing in the row corresponding to the first row identifier the unique identifier of the first operation in the row begin entry of the system-period temporal table; writing in the row corresponding to the first row identifier a dummy transaction identifier corresponding to a maximum timestamp value of the database system in the row end entry of the system-period temporal table; committing the transaction at a commit timestamp such that the commit timestamp is later than the first timestamp; inserting a row in the transaction management table and inserting values for the unique transaction identifier, the first timestamp and the commit timestamp in the transaction management table.Type: ApplicationFiled: July 25, 2017Publication date: January 31, 2019Inventor: Yasuhiro Onoda
-
Publication number: 20180212974Abstract: Access control within a network is established by combining multiple factors to prevent unauthorized access to a computer and/or network target system. The factors which may be combined are selected from a combination of three main factors confirmation that the accessing device which is attempting access is by an authorized user; the access request is made by a device that corresponds to an authorized degree of importance; and the accessing device is connected from a network that corresponds to the authorized degree of importance.Type: ApplicationFiled: January 25, 2017Publication date: July 26, 2018Inventors: Yasuhiro Onoda, Hironori Yuasa
-
Publication number: 20170134160Abstract: A method and system. Ciphertext is generated by applying both an initialization vector and an encryption key directly to plaintext. The initialization vector is combined with the ciphertext to generate encrypted data, by using an embedding rule to perform the combining.Type: ApplicationFiled: January 23, 2017Publication date: May 11, 2017Inventor: Yasuhiro Onoda
-
Patent number: 9634827Abstract: A method and system. Ciphertext is generated by applying an initialization vector and an encryption key to plaintext. The initialization vector is combined with the ciphertext to generate encrypted data, by using an embedding rule to perform the combining, wherein using the embedding rule includes generating the encrypted data by: dividing the initialization vector into a specified number of bits to obtain an ordered sequence of initialization vector fragments; dividing the ciphertext into a specified number of bits to obtain ciphertext fragments; and distributing the initialization vector fragments between the ciphertext fragments according to the order of the initialization vector fragments in the sequence.Type: GrantFiled: March 23, 2016Date of Patent: April 25, 2017Assignee: International Business Machines CorporationInventor: Yasuhiro Onoda
-
Publication number: 20160204932Abstract: A method and system. Ciphertext is generated by applying an initialization vector and an encryption key to plaintext. The initialization vector is combined with the ciphertext to generate encrypted data, by using an embedding rule to perform the combining.Type: ApplicationFiled: March 23, 2016Publication date: July 14, 2016Inventor: Yasuhiro Onoda
-
Patent number: 9344274Abstract: A method and system for encrypting data. Ciphertext is generated from plaintext by applying an initialization vector and an encryption key to the plaintext. The initialization vector is combined with the ciphertext to generate encrypted data, by using an embedding rule to perform the combining.Type: GrantFiled: June 10, 2015Date of Patent: May 17, 2016Assignee: International Business Machines CorporationInventor: Yasuhiro Onoda
-
Publication number: 20150312032Abstract: A method and system for encrypting data. Ciphertext is generated from plaintext by applying an initialization vector and an encryption key to the plaintext. The initialization vector is combined with the ciphertext to generate encrypted data, by using an embedding rule to perform the combining.Type: ApplicationFiled: June 10, 2015Publication date: October 29, 2015Inventor: Yasuhiro Onoda
-
Patent number: 9143326Abstract: A method and system for encrypting data. An initialization is generated. Ciphertext is generated from plaintext by applying the initialization vector and an encryption key to the plaintext. The initialization vector is combined with the ciphertext to generate encrypted data, by using an embedding rule to perform the combining.Type: GrantFiled: February 6, 2013Date of Patent: September 22, 2015Assignee: International Business Machines CorporationInventor: Yasuhiro Onoda
-
Publication number: 20130259225Abstract: A method and system for encrypting data. An initialization is generated. Ciphertext is generated from plaintext by applying the initialization vector and an encryption key to the plaintext. The initialization vector is combined with the ciphertext to generate encrypted data, by using an embedding rule to perform the combining.Type: ApplicationFiled: February 6, 2013Publication date: October 3, 2013Applicant: International Business Machines CorporationInventor: Yasuhiro Onoda