Patents by Inventor Bintatsu Noda

Bintatsu Noda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11050722
    Abstract: An information processing device using a primary function provided by a first server, includes a processor configured to receive, from the first server, access destination data effecting redirection to a second server providing a secondary function to be used by the primary function, send key data for encryption to the second server by adding the key data for encryption to the access destination data, transferring the access destination data to a browser, and redirecting the browser, and decrypt encrypted data based on at least a part of a response by the secondary function, the encrypted data being included in a response by the primary function, by using key data for decryption, the key data for decryption being adapted to the key data for encryption.
    Type: Grant
    Filed: September 10, 2018
    Date of Patent: June 29, 2021
    Assignee: FUJITSU LIMITED
    Inventor: Bintatsu Noda
  • Publication number: 20190081934
    Abstract: An information processing device using a primary function provided by a first server, includes a processor configured to receive, from the first server, access destination data effecting redirection to a second server providing a secondary function to be used by the primary function, send key data for encryption to the second server by adding the key data for encryption to the access destination data, transferring the access destination data to a browser, and redirecting the browser, and decrypt encrypted data based on at least a part of a response by the secondary function, the encrypted data being included in a response by the primary function, by using key data for decryption, the key data for decryption being adapted to the key data for encryption.
    Type: Application
    Filed: September 10, 2018
    Publication date: March 14, 2019
    Applicant: FUJITSU LIMITED
    Inventor: Bintatsu NODA
  • Patent number: 8307445
    Abstract: An anti-worm program allows a computer to execute control of communication suspected as worm communication, the program allowing the computer to execute: a communication information acquisition step that acquires communication information which is information concerning communication from a target source; and a communication control step that has a control amount calculation formula for calculating the control amount of the communication from the target source using the communication information and performs control of the communication from the target source based on the communication control amount obtained using the control amount calculation formula.
    Type: Grant
    Filed: July 7, 2008
    Date of Patent: November 6, 2012
    Assignee: Fujitsu Limited
    Inventors: Bintatsu Noda, Kazumasa Omote, Yoshiki Higashikado, Masahiro Komura, Masashi Mitomo, Satoru Torii
  • Patent number: 8205077
    Abstract: A management apparatus comprising memory to store owner information, dependence relationship information, and authorized user information are associated with file information identifying the secret file, an authorized user determination unit to determine whether a source user of the browse request is registered as the authorized user of the browse request file, a dependent file specifying unit to specify a dependent file having a dependence relationship with the browse request file by referring to the dependence relationship information when the source user is authorized; and a browse permission response transmitting unit to transmit the browse permission response to the source user based on whether or not the source user is registered as the authorized user of the dependent file by referring to the authorized user information.
    Type: Grant
    Filed: February 2, 2009
    Date of Patent: June 19, 2012
    Assignee: Fujitsu Limited
    Inventors: Bintatsu Noda, Masahiko Takenaka, Takayuki Hasebe, Takeaki Terada, Takashi Yoshioka
  • Patent number: 8032921
    Abstract: A first access policy is stored to provide information on a first distributee to which an electronic document is distributed, to which the first distributee is permitted to distribute the electronic document, and use rights that permit the second distributees to use the electronic document. Also stored is a distribution target information indicating the second distributees. When the first distributee requests permission to grant use rights to a specific distributee, the distribution target is consulted to confirm whether or not the specific distributee is included in the second distributees. A second access policy associating the specific distributee with the information on the use rights is then registered. When the specific distributee requests permission to use the electronic document, the second access policy is consulted to permit the specific distributee to use the electronic document.
    Type: Grant
    Filed: November 9, 2006
    Date of Patent: October 4, 2011
    Assignee: Fujitsu Limited
    Inventors: Masahiko Takenaka, Souichi Okada, Takashi Yoshioka, Bintatsu Noda
  • Patent number: 7966644
    Abstract: A computer program, apparatus, and method for managing access to documents, capable of identifying the exact events of document access on the basis of given access logs even when access policies are modified in the middle of operations. Upon receipt of an access policy setup request from a first client, an access policy manager adds a new access policy to the access policy database or modifies an existing access policy in an access policy database according to the request. A policy log collector then stores the records of such a new access policy or modified existing access policy in a policy log database. Afterwards an access log collector receives an access log for the document 5 from the second client 3 and saves it in the access log database 1c. When a third client issues a log request with a specific search keyword, a log searcher retrieves relevant policy log records and access log records that match with the specified search keyword.
    Type: Grant
    Filed: October 5, 2006
    Date of Patent: June 21, 2011
    Assignee: Fujitsu Limited
    Inventors: Bintatsu Noda, Souichi Okada, Takashi Yoshioka, Masahiko Takenaka
  • Publication number: 20090205029
    Abstract: A management apparatus comprising memory to store owner information, dependence relationship information, and authorized user information are associated with file information identifying the secret file, an authorized user determination unit to determine whether a source user of the browse request is registered as the authorized user of the browse request file, a dependent file specifying unit to specify a dependent file having a dependence relationship with the browse request file by referring to the dependence relationship information when the source user is authorized; and a browse permission response transmitting unit to transmit the browse permission response to the source user based on whether or not the source user is registered as the authorized user of the dependent file by referring to the authorized user information.
    Type: Application
    Filed: February 2, 2009
    Publication date: August 13, 2009
    Applicant: FUJITSU LIMITED
    Inventors: Bintatsu Noda, Masahiko Takenaka, Takayuki Hasebe, Takeaki Terada, Takashi Yoshioka
  • Patent number: 7564837
    Abstract: A recording medium recording a network shutdown control program permitting suitable preventive measures to be taken. A detector monitors each network segment to be managed, and on detecting a communication fulfilling a predetermined condition, the detector generates a detection notification and sends the notification to a quarantine manager. On acquiring the detection notification generated by the detector of the local device or a detection notification generated by a remote network shutdown device, the quarantine manager generates a shutdown operation request in accordance with quarantine policy stored in a quarantine policy storage, and sends the request to a communication shutdown unit. In accordance with the shutdown operation request, the communication shutdown unit sets shutdown data identifying a target of shutdown and controls packets to be input to and output from the network segment so that the packets may be shut off or passed.
    Type: Grant
    Filed: March 1, 2006
    Date of Patent: July 21, 2009
    Assignee: Fujitsu Limited
    Inventors: Masahiro Komura, Kazumasa Omote, Yoshiki Higashikado, Masashi Mitomo, Bintatsu Noda, Satoru Torii
  • Patent number: 7477742
    Abstract: A contents utilization control apparatus includes an input unit for inputting a) contents with control module that consist of contents and a control module, and b) a license with control module that consists of a license prepared from contents utilization approval information and a control module. The control module in the contents with control module and the control module in the license with control module cooperate with each other to carry out a control relating to the utilization of the contents.
    Type: Grant
    Filed: March 6, 2001
    Date of Patent: January 13, 2009
    Assignee: Fujitsu Limited
    Inventors: Bintatsu Noda, Seigo Kotani, Takehiko Hayashi, Jun Kamada
  • Publication number: 20080271148
    Abstract: An anti-worm program allows a computer to execute control of communication suspected as worm communication, the program allowing the computer to execute: a communication information acquisition step that acquires communication information which is information concerning communication from a target source; and a communication control step that has a control amount calculation formula for calculating the control amount of the communication from the target source using the communication information and performs control of the communication from the target source based on the communication control amount obtained using the control amount calculation formula.
    Type: Application
    Filed: July 7, 2008
    Publication date: October 30, 2008
    Applicant: FUJITSU LIMITED
    Inventors: Bintatsu NODA, Kazumasa Omote, Yoshiki Higashikado, Masahiro Komura, Masashi Mitomo, Satoru Torii
  • Publication number: 20080005779
    Abstract: A computer-readable recording medium storing an access rights management program which is capable of safely managing the use of an electronic document with ease and efficiency. An access policy-storing device stores a first access policy containing information on a first distributee to which the electronic document is distributed, and information on second distributees, which is indicative of a range within which the first distributes is permitted to distribute the electronic document, as well as information on use rights that permit the second distributees to use the electronic document with a defined scope of authority. A storage device stores a distribution target indicative of the second distributees. When a distributes specifying request for permission to grant the use rights to a specific distributes is received from the first distributee, an access policy-confirming device refers to the distribution target to confirm whether or not the specific distributes is included in the second distributees.
    Type: Application
    Filed: November 9, 2006
    Publication date: January 3, 2008
    Inventors: Masahiko Takenaka, Souichi Okada, Takashi Yoshioka, Bintatsu Noda
  • Publication number: 20070271592
    Abstract: A computer program, apparatus, and method for managing access to documents, capable of identifying the exact events of document access on the basis of given access logs even when access policies are modified in the middle of operations. Upon receipt of an access policy setup request from a first client, an access policy manager adds a new access policy to the access policy database or modifies an existing access policy in an access policy database according to the request. A policy log collector then stores the records of such a new access policy or modified existing access policy in a policy log database. Afterwards an access log collector receives an access log for the document 5 from the second client 3 and saves it in the access log database 1c. When a third client issues a log request with a specific search keyword, a log searcher retrieves relevant policy log records and access log records that match with the specified search keyword.
    Type: Application
    Filed: October 5, 2006
    Publication date: November 22, 2007
    Applicant: FUJITSU LIMITED
    Inventors: Bintatsu Noda, Souichi Okada, Takashi Yoshioka, Masahiko Takenaka
  • Publication number: 20070101404
    Abstract: In a network relay device, unauthorized access from an internal computer to an external network is detected, an unauthorized destination service port used for the unauthorized access is specified, and a substitute port is allocated. A service relay unit and the internal computer are instructed to use the substitute port instead of the unauthorized destination service port, and an unauthorized access notification is sent. Mutual conversion of the unauthorized destination service port and a substitute service port is carried out, to relay a packet between an internal network and the external network.
    Type: Application
    Filed: March 7, 2006
    Publication date: May 3, 2007
    Applicant: FUJITSU LIMITED
    Inventors: Yoshiki Higashikado, Masashi Mitomo, Masahiro Komura, Bintatsu Noda, Kazumasa Omote, Satoru Torii
  • Publication number: 20070011745
    Abstract: A computer-readable recording medium recording a worm detection parameter setting program for setting an appropriate worm detection parameter for target environments. When a log reader loads a communication log created within a prescribed time period, a log classifier classifies the entries of the communication log into categories based on communication contents. A frequency distribution creator analyzes the entries of a category, counts the number of appearance of each worm detection parameter value for each object of a preset network unit, and creates frequency distribution information. A threshold derivation unit analyzes the frequency distribution information and derives a threshold value that is used for determining whether a worm is propagating. An output unit outputs to an output device the threshold value for the worm detection parameter for the category, together with the frequency distribution information created by the frequency distribution creator, thereby providing a user with the information.
    Type: Application
    Filed: March 16, 2006
    Publication date: January 11, 2007
    Applicant: FUJITSU LIMITED
    Inventors: Masashi Mitomo, Yoshiki Higashikado, Masahiro Komura, Bintatsu Noda, Kazumasa Omote, Satoru Torii
  • Publication number: 20070002838
    Abstract: A recording medium recording a network shutdown control program permitting suitable preventive measures to be taken. A detector monitors each network segment to be managed, and on detecting a communication fulfilling a predetermined condition, the detector generates a detection notification and sends the notification to a quarantine manager. On acquiring the detection notification generated by the detector of the local device or a detection notification generated by a remote network shutdown device, the quarantine manager generates a shutdown operation request in accordance with quarantine policy stored in a quarantine policy storage, and sends the request to a communication shutdown unit. In accordance with the shutdown operation request, the communication shutdown unit sets shutdown data identifying a target of shutdown and controls packets to be input to and output from the network segment so that the packets may be shut off or passed.
    Type: Application
    Filed: March 1, 2006
    Publication date: January 4, 2007
    Applicant: FUJITSU LIMITED
    Inventors: Masahiro Komura, Kazumasa Omote, Yoshiki Higashikado, Masashi Mitomo, Bintatsu Noda, Satoru Torii
  • Publication number: 20060291469
    Abstract: A computer-readable recording medium recording a worm detection program which is preferably usable for a large-scale network and is capable of detecting worm communication with little information. A worm detection device which runs this program has a switching hub function, and comprises five physical ports that are network interfaces, a communication acquisition section, and a worm detector, for example. The communication acquisition section acquires ICMP type3 (destination unreachable message) packets going out of the physical ports. The worm detector determines whether the packet communication is worm communication, based on information on the ICMP type3 packets obtained for each source MAC address by the communication acquisition section and worm criteria set for determining whether communication is worm communication.
    Type: Application
    Filed: February 7, 2006
    Publication date: December 28, 2006
    Applicant: FUJITSU LIMITED
    Inventors: Kazumasa Omote, Yoshiki Higashikado, Masahiro Komura, Bintatsu Noda, Masashi Mitomo, Satoru Torii
  • Publication number: 20060291490
    Abstract: A computer-readable recording medium having recorded a worm determination program capable of reliably determining a worm-infected communication. A worm determination apparatus for executing the program includes a plurality of physical ports functioning as network connection ports, a communication-information-acquisition unit, and a worm determination unit. The communication-information-acquisition unit acquires information about a packet type, classified according to a transmission-source address. The worm determination unit determines whether a communication is performed by a worm, based on the information about the packet type, classified according to the transmission-source address, acquired by the communication-information-acquisition unit and a determination criterion used for determining whether a communication is performed by a worm.
    Type: Application
    Filed: February 3, 2006
    Publication date: December 28, 2006
    Applicant: FUJITSU LIMITED
    Inventors: Kazumasa Omote, Yoshiki Higashikado, Masahiro Komura, Bintatsu Noda, Masashi Mitomo, Satoru Torii
  • Patent number: 6915434
    Abstract: A storage apparatus includes a key management unit for managing an individual key unique to the apparatus and a common key shared with other storage apparatuses, and an encryption unit for performing an encrypting process or verifying data for performing the encrypting process on electronic data stored in the apparatus to which the unit belongs using the individual key, and performing the encrypting process or verifying the data on the electronic data transmitted to or received from another apparatus using the common key. Thus, the apparatus communicates data using an applicable common key in a local environment and a global environment, appropriately manages a key in each environment, and guarantees the security of the electronic data.
    Type: Grant
    Filed: June 8, 1999
    Date of Patent: July 5, 2005
    Assignee: Fujitsu Limited
    Inventors: Yasutsugu Kuroda, Jun Kamada, Shoko Iwase, Bintatsu Noda, Etsuo Ono
  • Publication number: 20020003883
    Abstract: A contents utilization control apparatus includes an input unit for inputting a) contents with control module that consist of contents and a control module, and b) a license with control module that consists of a license prepared from contents utilization approval information and a control module. The control module in the contents with control module and the control module in the license with control module cooperate with each other to carry out a control relating to the utilization of the contents.
    Type: Application
    Filed: March 6, 2001
    Publication date: January 10, 2002
    Inventors: Bintatsu Noda, Seigo Kotani, Takehiko Hayashi, Jun Kamada