Patents by Inventor Ai Ishida

Ai Ishida has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10936747
    Abstract: A system prevents divulgation of sensitive data in two snapshots, taken at different times, of one or more systems. The system identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes a difference with respect to each of the two snapshots. The system performs a pattern reducing process that removes, from the set, any file having, as the at least one difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The system performs a commonality reducing process that removes, from the set, any file having, as the at least one difference, a common difference between different system users. The system annotates data in remaining files in the set as potentially being sensitive data. The predetermined non-sensitive difference is determined using a Sandbox host. The common difference is determined using an actual one of the systems.
    Type: Grant
    Filed: October 25, 2019
    Date of Patent: March 2, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Patent number: 10839103
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.
    Type: Grant
    Filed: August 13, 2019
    Date of Patent: November 17, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Publication number: 20200057868
    Abstract: A system prevents divulgation of sensitive data in two snapshots, taken at different times, of one or more systems. The system identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes a difference with respect to each of the two snapshots. The system performs a pattern reducing process that removes, from the set, any file having, as the at least one difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The system performs a commonality reducing process that removes, from the set, any file having, as the at least one difference, a common difference between different system users. The system annotates data in remaining files in the set as potentially being sensitive data. The predetermined non-sensitive difference is determined using a Sandbox host. The common difference is determined using an actual one of the systems.
    Type: Application
    Filed: October 25, 2019
    Publication date: February 20, 2020
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Patent number: 10552633
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: February 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Patent number: 10540518
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: January 21, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Publication number: 20190362100
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.
    Type: Application
    Filed: August 13, 2019
    Publication date: November 28, 2019
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Publication number: 20180276403
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.
    Type: Application
    Filed: March 23, 2017
    Publication date: September 27, 2018
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Publication number: 20180276405
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.
    Type: Application
    Filed: November 9, 2017
    Publication date: September 27, 2018
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Patent number: 8800053
    Abstract: A executable content message stream filter applies a plurality of executable content filters to a stream of parsed elements of a network message. Each of the plurality of executable content filters targets executable content and is instantiated based on a set of one or more rule sets selected based, at least in part, on a type of the network message. For each of the plurality of executable content filters, it is determined if one or more of the stream of parsed elements includes executable content targeted by the executable content filter. The executable content message stream filter modifies those of the stream of parsed elements that include the executable content targeted by the plurality of executable content filters to disable the executable content.
    Type: Grant
    Filed: July 2, 2012
    Date of Patent: August 5, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ai Ishida, Todd E. Kaplinger, Satoshi Makino, Masayoshi Teraguchi, Naohiko Uramoto
  • Patent number: 8643672
    Abstract: Evaluating a delivered video using a marker. A marker can be generated to be superimposed and displayed on an evaluation range from coordinate values specifying the evaluation range input to evaluate the video and that adds the marker to the video and causing the video with the marker to be deliver. An image can be generated in the evaluation range at predetermined intervals starting from the input time of the coordinate values. A similarity between two images arranged in the order of time from the input time by comparing the two images can be calculated, and a determination can be made whether the similarity is within an allowable range. The time of one of the two images generated as an extinction time of the displayed marker can be selected when the similarity is determined to be not within the allowable range.
    Type: Grant
    Filed: April 16, 2012
    Date of Patent: February 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ai Ishida, Daisuke Maruyama, Hiroshi Ouchiyama, Takayuki Sato
  • Patent number: 8619096
    Abstract: Evaluating a delivered video using a marker. A marker can be generated to be superimposed and displayed on an evaluation range from coordinate values specifying the evaluation range input to evaluate the video and that adds the marker to the video and causing the video with the marker to be deliver. An image can be generated in the evaluation range at predetermined intervals starting from the input time of the coordinate values. A similarity between two images arranged in the order of time from the input time by comparing the two images can be calculated, and a determination can be made whether the similarity is within an allowable range. The time of one of the two images generated as an extinction time of the displayed marker can be selected when the similarity is determined to be not within the allowable range.
    Type: Grant
    Filed: June 4, 2010
    Date of Patent: December 31, 2013
    Assignee: International Business Machines Corporation
    Inventors: Ai Ishida, Daisuke Maruyama, Hiroshi Ouchiyama, Takayuki Sato
  • Publication number: 20120278852
    Abstract: A executable content message stream filter applies a plurality of executable content filters to a stream of parsed elements of a network message. Each of the plurality of executable content filters targets executable content and is instantiated based on a set of one or more rule sets selected based, at least in part, on a type of the network message. For each of the plurality of executable content filters, it is determined if one or more of the stream of parsed elements includes executable content targeted by the executable content filter. The executable content message stream filter modifies those of the stream of parsed elements that include the executable content targeted by the plurality of executable content filters to disable the executable content.
    Type: Application
    Filed: July 2, 2012
    Publication date: November 1, 2012
    Applicant: International Business Machines Corporation
    Inventors: Ai Ishida, Todd E. Kaplinger, Satoshi Makino, Masayoshi Teraguchi, Naohiko Uramoto
  • Publication number: 20120257835
    Abstract: Evaluating a delivered video using a marker. A marker can be generated to be superimposed and displayed on an evaluation range from coordinate values specifying the evaluation range input to evaluate the video and that adds the marker to the video and causing the video with the marker to be deliver. An image can be generated in the evaluation range at predetermined intervals starting from the input time of the coordinate values. A similarity between two images arranged in the order of time from the input time by comparing the two images can be calculated, and a determination can be made whether the similarity is within an allowable range. The time of one of the two images generated as an extinction time of the displayed marker can be selected when the similarity is determined to be not within the allowable range.
    Type: Application
    Filed: April 16, 2012
    Publication date: October 11, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai ISHIDA, DAISUKE MARUYAMA, HIROSHI OUCHIYAMA, TAKAYUKI SATO
  • Patent number: 8234712
    Abstract: A method, apparatus, and machine-readable medium to implement executable content filtering is disclosed. According to a one example embodiment, a method is provided which comprises analyzing a stream of one or more parsed elements of a network message with a set of one or more executable content filters, wherein the stream of one or more elements are streamed from a network message parser. The described method embodiment further comprises modifying the stream of one or more parsed elements to disable executable content in the network message based, at least in part, on a set of one or more rule sets being applied with the set of one or more executable content filters to the stream of parsed elements.
    Type: Grant
    Filed: April 11, 2008
    Date of Patent: July 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: Ai Ishida, Todd E. Kaplinger, Satoshi Makino, Masayoshi Teraguchi, Naohiko Uramoto
  • Publication number: 20100315435
    Abstract: Evaluating a delivered video using a marker. A marker can be generated to be superimposed and displayed on an evaluation range from coordinate values specifying the evaluation range input to evaluate the video and that adds the marker to the video and causing the video with the marker to be deliver. An image can be generated in the evaluation range at predetermined intervals starting from the input time of the coordinate values. A similarity between two images arranged in the order of time from the input time by comparing the two images can be calculated, and a determination can be made whether the similarity is within an allowable range. The time of one of the two images generated as an extinction time of the displayed marker can be selected when the similarity is determined to be not within the allowable range.
    Type: Application
    Filed: June 4, 2010
    Publication date: December 16, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Daisuke Maruyama, Hiroshi Ouchiyama, Takayuki Sato
  • Publication number: 20090260087
    Abstract: Malicious executable content in network messages (e.g., request and response hypertext transfer protocol message) can circumvent some security measures. In addition, conventional security measures aimed at capturing malicious executable content noticeably impact system performance. Stream based filtering of network messages allows for efficient processing to remove malicious executable content. Furthermore, an extensible framework for executable content filtering streaming message elements allows for efficient adaptation of an executable content filter to new threats disguised as executable content.
    Type: Application
    Filed: April 11, 2008
    Publication date: October 15, 2009
    Applicant: International Business Machines Corporation
    Inventors: Ai Ishida, Todd E. Kaplinger, Satoshi Makino, Masayoshi Teraguchi, Naohiko Uramoto