Patents by Inventor Daisuke Mashima
Daisuke Mashima has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11572166Abstract: A method of deploying an unmanned aerial vehicle (UAV) operation system may be provided. A method may include estimating an amount of traffic for one or more routes based on a demand of the one or more routes. The method may also include determining a required number of docking stations for each route of the one or more routes based on the estimated amount of traffic for the route, a distance of the route, and a maximum travel distance for a UAV. Further, the method may include installing the required number of docking stations for each route of the one or more routes, wherein each docking station of the required number of docking stations including at least one of a power supply, a wireless charger, a communication module, a control module, and a camera.Type: GrantFiled: March 16, 2016Date of Patent: February 7, 2023Assignee: FUJITSU LIMITEDInventors: Wei-Peng Chen, Daisuke Mashima
-
Publication number: 20220417002Abstract: A method of provenance verification comprises providing a plurality of security devices, each security device being provided with a key set comprising: a secret key, and a plurality of shared keys, each shared key being derived by generating a hash of the secret key and a salt value that is specific to a pair consisting of said security device and another of the plurality of security devices. The method also comprises configuring each security device to: generate and/or receive one or more messages; and perform at least one cryptographic operation on the message or messages, and/or on data derived therefrom, using a respective secret key of the security device and/or one of said shared keys.Type: ApplicationFiled: October 16, 2020Publication date: December 29, 2022Inventors: Ertem ESINER, Binbin CHEN, Daisuke MASHIMA, Zbigniew KALBARCZYK, David M. NICOL, Wei LIN
-
Publication number: 20220376923Abstract: Disclosed herein is a method of provisioning a message authentication protocol in a system of connected devices, the method comprising, by at least one of the connected devices: generating a private key and a public key; transmitting the public key to each other connected device; generating, by a sequence of hash operations using the private key, a hash tree, wherein each leaf node of the hash tree can have two or more values, each of the two or more values being associated with a respective nonce value, and wherein each leaf node has a hash computed from the concatenation of the respective nonce values; signing a root of the hash tree with the private key; and transmitting the root and the root signature to each other connected device.Type: ApplicationFiled: October 16, 2020Publication date: November 24, 2022Inventors: Ertem ESINER, Binbin CHEN, Daisuke MASHIMA, David M. NICOL, Zbigniew KALBARCZYK, Utku TEFEK
-
Patent number: 11283903Abstract: A method may include receiving peer data describing a set of peer clients associated with a demand response application server and describing how the peer clients communicate with one another. The peer data may be configured so that a subset of the peer clients directly communicate with the demand response application server and the demand response application server does not directly communicate with each of the peer clients. The method may also include receiving announcement data describing an event specified by the demand response application server and determining event response data responsive to the announcement data. The method may also include identifying, from the set of peer clients specified by the demand response application server, a set of recipient peer clients to receive the event response data.Type: GrantFiled: September 9, 2019Date of Patent: March 22, 2022Assignee: FUJITSU LIMITEDInventors: Ulrich Herberg, Jorjeta G. Jetcheva, Daisuke Mashima
-
Publication number: 20200007660Abstract: A method may include receiving peer data describing a set of peer clients associated with a demand response application server and describing how the peer clients communicate with one another. The peer data may be configured so that a subset of the peer clients directly communicate with the demand response application server and the demand response application server does not directly communicate with each of the peer clients. The method may also include receiving announcement data describing an event specified by the demand response application server and determining event response data responsive to the announcement data. The method may also include identifying, from the set of peer clients specified by the demand response application server, a set of recipient peer clients to receive the event response data.Type: ApplicationFiled: September 9, 2019Publication date: January 2, 2020Applicant: FUJITSU LIMITEDInventors: Ulrich HERBERG, Jorjeta G. JETCHEVA, Daisuke MASHIMA
-
Patent number: 10432753Abstract: A method may include receiving peer data describing a set of peer clients associated with a demand response application server and describing how the peer clients communicate with one another. The peer data may be configured so that a subset of the peer clients directly communicate with the demand response application server and the demand response application server does not directly communicate with each of the peer clients. The method may also include receiving announcement data describing an event specified by the demand response application server and determining event response data responsive to the announcement data. The method may also include identifying, from the set of peer clients specified by the demand response application server, a set of recipient peer clients to receive the event response data.Type: GrantFiled: August 16, 2013Date of Patent: October 1, 2019Assignee: FUJITSU LIMITEDInventors: Ulrich Herberg, Jorjeta G. Jetcheva, Daisuke Mashima
-
Patent number: 9953285Abstract: A method of residential or small and medium business (SMB) demand response (DR) coordination may include receiving a DR event notification from a DR server. The DR event notification may include DR event information pertaining to a DR event and curtailment information. The method may also include communicating a notification acknowledgement to the DR server. The notification acknowledgement may indicate reception of the DR event notification. The method may include displaying a curtailment request pertaining to the DR event. The curtailment request may be based on the curtailment information included in the DR event notification and may include some portion of the DR event information. The method may also include receiving a user input including a DR event participation confirmation or a DR event participation refusal. The method may further include communicating a participation signal representative of at least a portion of the user input to the DR server.Type: GrantFiled: January 22, 2014Date of Patent: April 24, 2018Assignee: FUJITSU LIMITEDInventors: Ulrich Herberg, Jorjeta G. Jetcheva, Daisuke Mashima, Wei-Peng Chen
-
Publication number: 20170267343Abstract: A method of deploying an unmanned aerial vehicle (UAV) operation system may be provided. A method may include estimating an amount of traffic for one or more routes based on a demand of the one or more routes. The method may also include determining a required number of docking stations for each route of the one or more routes based on the estimated amount of traffic for the route, a distance of the route, and a maximum travel distance for a UAV. Further, the method may include installing the required number of docking stations for each route of the one or more routes, wherein each docking station of the required number of docking stations including at least one of a power supply, a wireless charger, a communication module, a control module, and a camera.Type: ApplicationFiled: March 16, 2016Publication date: September 21, 2017Applicant: FUJITSU LIMITEDInventors: Wei-Peng CHEN, Daisuke MASHIMA
-
Patent number: 9767469Abstract: A method of sharing energy usage data may include requesting customer-specific energy usage data (CSEUD). The method further includes receiving a modified CSEUD record. The modified CSEUD record includes modified energy usage data with respect to original energy usage data of an original CSEUD record from which the modified CSEUD record is derived. The method also includes authenticating the modified CSEUD record to verify the integrity of the modified energy usage data.Type: GrantFiled: July 16, 2013Date of Patent: September 19, 2017Assignee: FUJITSU LIMITEDInventors: Daisuke Mashima, Wei-Peng Chen
-
Patent number: 9703963Abstract: A method of energy usage data privacy preservation is described. The method includes downloading energy usage data and a signature from a repository. The method includes determining whether the signature is that of a utility. When the signature is not that of the utility, the method includes rejecting the energy usage data. When the signature is that of the utility, the method includes generating noisy data, encrypting a message-signature pair, constructing a proof, and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. The noisy data is generated by adding random noise to the energy usage data. The message-signature pair includes the energy usage data and a verified signature. The proof is configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language.Type: GrantFiled: May 9, 2014Date of Patent: July 11, 2017Assignee: FUJITSU LIMITEDInventors: Arnab Roy, Daisuke Mashima
-
Publication number: 20170089960Abstract: A method of electricity load disaggregation may include identifying a first monitored appliance in an electrical network based on ON/OFF status information. The method may further include identifying a period of time during which the first monitored appliance is on. The method may also include determining whether a second monitored appliance is on during the period of time. The method may include allocating a first load of an aggregate load associated with the period of time to the first monitored appliance in response to determining that the second monitored appliance is not on during the period of time, or in response to determining that the second monitored appliance is on during the period of time, allocating a second load of the aggregate load to the first monitored appliance and allocating a third load of the aggregate load to the second monitored appliance.Type: ApplicationFiled: September 30, 2015Publication date: March 30, 2017Inventors: Daisuke MASHIMA, Mohammad-Mahdi MOAZZAMI
-
Publication number: 20170082666Abstract: According to some embodiments, the present disclosure may relate to a method that includes receiving an energy consumption trace representing energy usage over time that is sampled at a sampling interval. The method may also include parsing the energy consumption trace into one or more segments using change point detection, and selecting one or more of the one or more segments as a representative always-on load segment based on one or more of the following: a lowest average and a minimum duration. The method may also include determining a periodic always-on load based on the representative always-on load segment and the sampling interval. The present disclosure may also relate to associated systems and devices.Type: ApplicationFiled: September 17, 2015Publication date: March 23, 2017Inventors: Daisuke MASHIMA, Mustafa FAISAL
-
Patent number: 9530010Abstract: A method including receiving energy usage data representative of energy usage of a customer during a particular time period. The energy usage data is sign with a digital signature of a utility. The method includes receiving input of a customer effective to select a data block of the energy usage data. The method includes redacting the selected data block from the energy usage data in response to the input. The method includes calculating a hash value for the redacted data block using a per-customer key that is unique to the customer, an initialization vector, and a counter. The method includes replacing in the energy usage data the redacted data block with the calculated hash value corresponding to the redacted data block.Type: GrantFiled: September 26, 2014Date of Patent: December 27, 2016Assignee: FUJITSU LIMITEDInventors: Daisuke Mashima, Gaurav Lahoti
-
Publication number: 20160371630Abstract: A system includes a quantified home, a mobile client device and an inventory analytics server. The quantified home includes an item set and one or more reader devices. The item set includes an item and a tag that is affixed to the item. The tag is configured to be monitored by the one or more reader devices. The mobile client device is configured to register the item with a personal inventory and receive description data describing a set of conditions associated with the item. The one or more reader devices are configured to monitor movement of the tag within the quantified home and generate history data describing the movement. The inventory analytics server is configured to receive the description data and history data. The inventory analytics server is configured to determine that a condition included in the set of conditions has been met and initiate a user specified action.Type: ApplicationFiled: June 17, 2015Publication date: December 22, 2016Inventors: Jorjeta G. JETCHEVA, Daisuke MASHIMA
-
Publication number: 20160306373Abstract: A method of down-sampling time-series data may include receiving energy usage data representative of energy usage of a customer during a specified period. The energy usage data may be signed with a digital signature of a utility. The method may also include receiving input from a customer effective to select a granularity level to apply to the energy usage data and the energy usage data may be down-sampled to apply the selected granularity level to the energy usage data and produce down-sampled energy usage data. The method may also include communicating the down-sampled energy usage data and hash values of child nodes corresponding to the down-sampled energy usage data to a third party.Type: ApplicationFiled: April 16, 2015Publication date: October 20, 2016Inventor: Daisuke MASHIMA
-
Patent number: 9401895Abstract: A method including generating a mapping in response to an enrollment message received from a customer device. The enrollment message includes a device identification number (device ID) of the customer device. The mapping includes a one-time password (OTP) encrypted using the device ID. The method includes generating a quick response (QR) code including a uniform resource locator (URL), a provider certificate (CRT), and certificate signing request (CSR) content. The method includes receiving a confirmation message at a website identified by the URL. The confirmation message includes a generated public key, a CSR, and a decrypted OTP. The method includes verifying the decrypted OTP against the mapping and communicating one or more application configuration settings. The method includes securely communicating information using the one or more application configuration settings, a provider public key, a provider private key, the generated public key, and a generated private key.Type: GrantFiled: April 30, 2014Date of Patent: July 26, 2016Assignee: FUJITSU LIMITEDInventors: Ulrich Herberg, Daisuke Mashima
-
Patent number: 9292706Abstract: A method of customer data management in data analytics outsourcing includes communicating to a third party service provider an anonymous customer identifier (customer ID) that is uniquely associated with a customer. The method includes receiving from the third party service provider a customer data query that references the customer using the customer ID and requests customer data. The method includes determining whether an access control policy allows disclosure of customer data requested in the customer data query. In response to the access control policy allowing disclosure of the requested customer data, the method includes accessing the requested customer data and communicating the requested customer data to the third party service provider. In response to the access control policy prohibiting disclosure of the requested customer data, the method includes denying the customer data query.Type: GrantFiled: August 22, 2014Date of Patent: March 22, 2016Assignee: FUJITSU LIMITEDInventors: Daisuke Mashima, Wei-Peng Chen
-
Publication number: 20160065653Abstract: A method of constructing Internet of Things (JOT) device configurations includes receiving a solution template selection for a device configuration for a particular automated interaction between two or more IOT devices. The method includes determining whether a complete solution template for the device configuration is selected. If so, the method includes deploying the device configuration. If not, the method includes receiving IOT device selections, accessing device capabilities from an IOT database of the selected IOT devices, configuring a network connection between the selected IOT devices, simulating a device configuration using the device capabilities accessed from the IOT database, and determining whether the device configuration is operational based on the simulation. When the device configuration is not operational, the method includes reconfiguring the device configuration to include a replacement IOT device.Type: ApplicationFiled: August 26, 2014Publication date: March 3, 2016Inventors: Wei-Peng CHEN, Mohammad-Mahdi MOAZZAMI, Daisuke MASHIMA
-
Publication number: 20160055349Abstract: A method of customer data management in data analytics outsourcing includes communicating to a third party service provider an anonymous customer identifier (customer ID) that is uniquely associated with a customer. The method includes receiving from the third party service provider a customer data query that references the customer using the customer ID and requests customer data. The method includes determining whether an access control policy allows disclosure of customer data requested in the customer data query. In response to the access control policy allowing disclosure of the requested customer data, the method includes accessing the requested customer data and communicating the requested customer data to the third party service provider. In response to the access control policy prohibiting disclosure of the requested customer data, the method includes denying the customer data query.Type: ApplicationFiled: August 22, 2014Publication date: February 25, 2016Inventors: Daisuke MASHIMA, Wei-Peng CHEN
-
Publication number: 20150324604Abstract: A method of energy usage data privacy preservation is described. The method includes downloading energy usage data and a signature from a repository. The method includes determining whether the signature is that of a utility. When the signature is not that of the utility, the method includes rejecting the energy usage data. When the signature is that of the utility, the method includes generating noisy data, encrypting a message-signature pair, constructing a proof, and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. The noisy data is generated by adding random noise to the energy usage data. The message-signature pair includes the energy usage data and a verified signature. The proof is configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language.Type: ApplicationFiled: May 9, 2014Publication date: November 12, 2015Applicant: FUJITSU LIMITEDInventors: Arnab ROY, Daisuke MASHIMA