Patents Assigned to NTT INNOVATION INSTITUTE, INC.
  • Patent number: 10979411
    Abstract: A client apparatus converts second input authentication information having a data content compliant with a second authentication method different from a first authentication method into authentication target information in a data format compliant with the first authentication method and transmits information corresponding to the authentication target information to a communication server apparatus. A server apparatus is capable of carrying out both a first process of providing a first authentication server apparatus that carries out an authentication process compliant with the first authentication method with first information corresponding to the authentication target information and a second process of providing a second authentication server apparatus that carries out an authentication process compliant with the second authentication method with second information corresponding to the authentication target information.
    Type: Grant
    Filed: December 15, 2016
    Date of Patent: April 13, 2021
    Assignees: NIPPON TELEGRAPH AND TELEPHONE CORPORATION, NTT Innovation Institute, Inc.
    Inventors: Tetsutaro Kobayashi, Hitoshi Fuji, Akira Nagai, Go Yamamoto
  • Patent number: 10566084
    Abstract: A system and method for racing data analysis using telemetry data and wearable sensor data may be used, in one implementation, to analyze muscle use in extreme racing conditions to find actionable insights for the race car driver. An example of the actionable insights may be how to minimize the driver's muscle fatigue during a race. The system and method may perform data validation of the data from the wearable sensor(s) and then generate the actionable insights from the validated data.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: February 18, 2020
    Assignee: NTT Innovation Institute, Inc.
    Inventor: Yasuyuki Kataoka
  • Patent number: 10462159
    Abstract: A system and method are provided for detecting a botnet in a network based on traffic flow, daisy chained mechanism and white-list generation mechanism. The system and method uses the known malicious components in a botnet such as IP address, domain name and URL, to be the root of a daisy chain and creates a network graph based on given traffic flow data such as NetFlow data, DNS cache data, DNS sinkhole data, DDoS data and Attack log data in threat sensors. The system and method iteratively detects new malicious factors by tracing that network graph. The system and method also introduces a technique to create a white list which is used in the daisy chain to reduce false positive.
    Type: Grant
    Filed: June 22, 2016
    Date of Patent: October 29, 2019
    Assignee: NTT INNOVATION INSTITUTE, INC.
    Inventors: Masayuki Inoue, Satoshi Iitsuka, Yuhei Kawakoya
  • Patent number: 10389753
    Abstract: A security system and method are provided that manage the security of a plurality of internet of things (IoT) devices that are part of an enterprise infrastructure. The security system and method may use unspoofable tags wherein each unspoofable tag may be assigned to a category of IoT devices and each unspoofable tag may have a security policy rule assigned to the unspoofable tag (and thus the category of IoT devices) so that IoT devices that are part of the enterprise infrastructure are secured by the security policy rule.
    Type: Grant
    Filed: January 25, 2017
    Date of Patent: August 20, 2019
    Assignee: NTT INNOVATION INSTITUTE, INC.
    Inventors: Masahisa Kawashima, Moosa Choudhry, Go Yamamoto, Rich Boyer
  • Publication number: 20180359234
    Abstract: A client apparatus converts second input authentication information having a data content compliant with a second authentication method different from a first authentication method into authentication target information in a data format compliant with the first authentication method and transmits information corresponding to the authentication target information to a communication server apparatus. A server apparatus is capable of carrying out both a first process of providing a first authentication server apparatus that carries out an authentication process compliant with the first authentication method with first information corresponding to the authentication target information and a second process of providing a second authentication server apparatus that carries out an authentication process compliant with the second authentication method with second information corresponding to the authentication target information.
    Type: Application
    Filed: December 15, 2016
    Publication date: December 13, 2018
    Applicants: NIPPON TELEGRAPH AND TELEPHONE CORPORATION, NTT Innovation Institute, Inc.
    Inventors: Tetsutaro KOBAYASHI, Hitoshi FUJI, Akira NAGAI, Go YAMAMOTO
  • Publication number: 20150326425
    Abstract: A system that includes a recorder that records information of a flow table of at least one network device in a network by capturing information regarding the flow table that is transmitted to and from the network device, wherein the network device receives and forwards incoming packet data over the network, and the flow table is used to determine how each incoming packet is handled by the network device; an analyzer that analyzes state changes in the network and manages a network state; and a restorer that, when a type of failure occurs in the network, recovers the network state by restoring at least a portion of the flow table using the recorded information of the flow table and based on the type of failure event that has occurred.
    Type: Application
    Filed: May 12, 2014
    Publication date: November 12, 2015
    Applicant: NTT INNOVATION INSTITUTE, INC.
    Inventors: Sriram Natarajan, Eric Chen
  • Publication number: 20150295852
    Abstract: A system and method of access control and tracking capabilities of programmable switches are described. A system and associated method include an access controller component and a tracker component. The access controller component defines access control rights for a user in a flow of a programmable switch in a network. The access control rights are determined by access control table information and an associated bit-array based flow-level role data structure built by a controller network operator. The tracker component authorizes and permits the user to modify the flow according to a flow modification request, which is based upon information in the access control table information and the associated bit-array based flow-level role data structure for the user. A notification component of a programmable switch notifies the controller of the network about the modification request to the flow.
    Type: Application
    Filed: April 15, 2014
    Publication date: October 15, 2015
    Applicant: NTT INNOVATION INSTITUTE, INC.
    Inventor: Sriram Natarajan