Patents by Inventor Ai Ishida
Ai Ishida has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10936747Abstract: A system prevents divulgation of sensitive data in two snapshots, taken at different times, of one or more systems. The system identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes a difference with respect to each of the two snapshots. The system performs a pattern reducing process that removes, from the set, any file having, as the at least one difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The system performs a commonality reducing process that removes, from the set, any file having, as the at least one difference, a common difference between different system users. The system annotates data in remaining files in the set as potentially being sensitive data. The predetermined non-sensitive difference is determined using a Sandbox host. The common difference is determined using an actual one of the systems.Type: GrantFiled: October 25, 2019Date of Patent: March 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Patent number: 10839103Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.Type: GrantFiled: August 13, 2019Date of Patent: November 17, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Publication number: 20200057868Abstract: A system prevents divulgation of sensitive data in two snapshots, taken at different times, of one or more systems. The system identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes a difference with respect to each of the two snapshots. The system performs a pattern reducing process that removes, from the set, any file having, as the at least one difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The system performs a commonality reducing process that removes, from the set, any file having, as the at least one difference, a common difference between different system users. The system annotates data in remaining files in the set as potentially being sensitive data. The predetermined non-sensitive difference is determined using a Sandbox host. The common difference is determined using an actual one of the systems.Type: ApplicationFiled: October 25, 2019Publication date: February 20, 2020Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Patent number: 10552633Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.Type: GrantFiled: March 23, 2017Date of Patent: February 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Patent number: 10540518Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.Type: GrantFiled: November 9, 2017Date of Patent: January 21, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Publication number: 20190362100Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.Type: ApplicationFiled: August 13, 2019Publication date: November 28, 2019Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Publication number: 20180276403Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.Type: ApplicationFiled: March 23, 2017Publication date: September 27, 2018Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Publication number: 20180276405Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.Type: ApplicationFiled: November 9, 2017Publication date: September 27, 2018Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Patent number: 8800053Abstract: A executable content message stream filter applies a plurality of executable content filters to a stream of parsed elements of a network message. Each of the plurality of executable content filters targets executable content and is instantiated based on a set of one or more rule sets selected based, at least in part, on a type of the network message. For each of the plurality of executable content filters, it is determined if one or more of the stream of parsed elements includes executable content targeted by the executable content filter. The executable content message stream filter modifies those of the stream of parsed elements that include the executable content targeted by the plurality of executable content filters to disable the executable content.Type: GrantFiled: July 2, 2012Date of Patent: August 5, 2014Assignee: International Business Machines CorporationInventors: Ai Ishida, Todd E. Kaplinger, Satoshi Makino, Masayoshi Teraguchi, Naohiko Uramoto
-
Patent number: 8643672Abstract: Evaluating a delivered video using a marker. A marker can be generated to be superimposed and displayed on an evaluation range from coordinate values specifying the evaluation range input to evaluate the video and that adds the marker to the video and causing the video with the marker to be deliver. An image can be generated in the evaluation range at predetermined intervals starting from the input time of the coordinate values. A similarity between two images arranged in the order of time from the input time by comparing the two images can be calculated, and a determination can be made whether the similarity is within an allowable range. The time of one of the two images generated as an extinction time of the displayed marker can be selected when the similarity is determined to be not within the allowable range.Type: GrantFiled: April 16, 2012Date of Patent: February 4, 2014Assignee: International Business Machines CorporationInventors: Ai Ishida, Daisuke Maruyama, Hiroshi Ouchiyama, Takayuki Sato
-
Patent number: 8619096Abstract: Evaluating a delivered video using a marker. A marker can be generated to be superimposed and displayed on an evaluation range from coordinate values specifying the evaluation range input to evaluate the video and that adds the marker to the video and causing the video with the marker to be deliver. An image can be generated in the evaluation range at predetermined intervals starting from the input time of the coordinate values. A similarity between two images arranged in the order of time from the input time by comparing the two images can be calculated, and a determination can be made whether the similarity is within an allowable range. The time of one of the two images generated as an extinction time of the displayed marker can be selected when the similarity is determined to be not within the allowable range.Type: GrantFiled: June 4, 2010Date of Patent: December 31, 2013Assignee: International Business Machines CorporationInventors: Ai Ishida, Daisuke Maruyama, Hiroshi Ouchiyama, Takayuki Sato
-
Publication number: 20120278852Abstract: A executable content message stream filter applies a plurality of executable content filters to a stream of parsed elements of a network message. Each of the plurality of executable content filters targets executable content and is instantiated based on a set of one or more rule sets selected based, at least in part, on a type of the network message. For each of the plurality of executable content filters, it is determined if one or more of the stream of parsed elements includes executable content targeted by the executable content filter. The executable content message stream filter modifies those of the stream of parsed elements that include the executable content targeted by the plurality of executable content filters to disable the executable content.Type: ApplicationFiled: July 2, 2012Publication date: November 1, 2012Applicant: International Business Machines CorporationInventors: Ai Ishida, Todd E. Kaplinger, Satoshi Makino, Masayoshi Teraguchi, Naohiko Uramoto
-
Publication number: 20120257835Abstract: Evaluating a delivered video using a marker. A marker can be generated to be superimposed and displayed on an evaluation range from coordinate values specifying the evaluation range input to evaluate the video and that adds the marker to the video and causing the video with the marker to be deliver. An image can be generated in the evaluation range at predetermined intervals starting from the input time of the coordinate values. A similarity between two images arranged in the order of time from the input time by comparing the two images can be calculated, and a determination can be made whether the similarity is within an allowable range. The time of one of the two images generated as an extinction time of the displayed marker can be selected when the similarity is determined to be not within the allowable range.Type: ApplicationFiled: April 16, 2012Publication date: October 11, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai ISHIDA, DAISUKE MARUYAMA, HIROSHI OUCHIYAMA, TAKAYUKI SATO
-
Patent number: 8234712Abstract: A method, apparatus, and machine-readable medium to implement executable content filtering is disclosed. According to a one example embodiment, a method is provided which comprises analyzing a stream of one or more parsed elements of a network message with a set of one or more executable content filters, wherein the stream of one or more elements are streamed from a network message parser. The described method embodiment further comprises modifying the stream of one or more parsed elements to disable executable content in the network message based, at least in part, on a set of one or more rule sets being applied with the set of one or more executable content filters to the stream of parsed elements.Type: GrantFiled: April 11, 2008Date of Patent: July 31, 2012Assignee: International Business Machines CorporationInventors: Ai Ishida, Todd E. Kaplinger, Satoshi Makino, Masayoshi Teraguchi, Naohiko Uramoto
-
Publication number: 20100315435Abstract: Evaluating a delivered video using a marker. A marker can be generated to be superimposed and displayed on an evaluation range from coordinate values specifying the evaluation range input to evaluate the video and that adds the marker to the video and causing the video with the marker to be deliver. An image can be generated in the evaluation range at predetermined intervals starting from the input time of the coordinate values. A similarity between two images arranged in the order of time from the input time by comparing the two images can be calculated, and a determination can be made whether the similarity is within an allowable range. The time of one of the two images generated as an extinction time of the displayed marker can be selected when the similarity is determined to be not within the allowable range.Type: ApplicationFiled: June 4, 2010Publication date: December 16, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Daisuke Maruyama, Hiroshi Ouchiyama, Takayuki Sato
-
Publication number: 20090260087Abstract: Malicious executable content in network messages (e.g., request and response hypertext transfer protocol message) can circumvent some security measures. In addition, conventional security measures aimed at capturing malicious executable content noticeably impact system performance. Stream based filtering of network messages allows for efficient processing to remove malicious executable content. Furthermore, an extensible framework for executable content filtering streaming message elements allows for efficient adaptation of an executable content filter to new threats disguised as executable content.Type: ApplicationFiled: April 11, 2008Publication date: October 15, 2009Applicant: International Business Machines CorporationInventors: Ai Ishida, Todd E. Kaplinger, Satoshi Makino, Masayoshi Teraguchi, Naohiko Uramoto