Patents by Inventor Hideo KITAZUME
Hideo KITAZUME has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11050776Abstract: A security measure invalidation prevention device includes an acquisition unit that acquires invalidated security point information about an invalidated security point among security points each having a measure function performing a security measure on a node connected to a network. The invalidated security point has a measure function to be invalidated. The device also includes a determination unit that determines whether a security event to be addressed with the measure function of the invalidated security point is present on the basis of the invalidated security point information acquired by the acquisition unit. The device further includes an extraction unit that extracts a security point to which the measure function of the invalidated security point can be shifted when the determination unit determines that the security event is present.Type: GrantFiled: February 29, 2016Date of Patent: June 29, 2021Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshiharu Kishi, Yasuhiro Teramoto, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume
-
Patent number: 10972490Abstract: A specifying device receives detection information from a security device that detects hacking into a network or an activity of a terminal related to infection, and specifies a state of the terminal from information of the terminal and content of activity of the terminal included in the detection information. The specifying device specifies, when specifying that the terminal is in the state of being infected with malware, a terminal that may be infected before performing the content of the activity of the terminal included in the detection information based on connection information stored in a configuration information storage device, and specifies a terminal located on a route, along which the infected terminal is likely to be used for hacking or for infection of the terminal in the future, as a candidate for an infected terminal likely to be infected.Type: GrantFiled: October 5, 2016Date of Patent: April 6, 2021Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yasuhiro Teramoto, Bo Hu, Toshiharu Kishi, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume
-
Patent number: 10652211Abstract: When an attack is detected, a controller samples an attack-target addressed DNS reply, received by a border router, from each of the border routers. Then, the controller adds the transmission-source IP address of the sampled DNS reply to the black list of the border router. Furthermore, upon reception of any of a target-addressed DNS reply and a target-addressed UDP subsequent fragment from the IP address that is described in the black list, the controller gives a command to the border router to discard the packet. Furthermore, the controller specifies the setting, for each of the border routers, that DNS replies to a DNS request from the target are excluded from discarding.Type: GrantFiled: November 18, 2015Date of Patent: May 12, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuichi Sudo, Takahiro Hamada, Masami Ueno, Yuminobu Igarashi, Hideo Kitazume, Bo Hu, Yuichi Murata
-
Patent number: 10616270Abstract: An optimization apparatus collects cyber attack information that is information related to a cyber attack, and system information that is information related to an entire system including a device that has received the cyber attack. Based on the collected cyber attack information and system information, the optimization apparatus identifies an attack route of the cyber attack, and extracts, as dealing point candidates, devices that are on the attack route and have an effective dealing function against the cyber attack. Subsequently, the optimization apparatus selects a dealing point from the extracted dealing point candidates by using optimization logic that has been set.Type: GrantFiled: November 5, 2015Date of Patent: April 7, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Bo Hu, Toshiharu Kishi, Hideo Kitazume, Takaaki Koyama, Yukio Nagafuchi, Yasuhiro Teramoto
-
Publication number: 20190081970Abstract: A specifying device receives detection information from a security device that detects hacking into a network or an activity of a terminal related to infection, and specifies a state of the terminal from information of the terminal and content of activity of the terminal included in the detection information. The specifying device specifies, when specifying that the terminal is in the state of being infected with malware, a terminal that may be infected before performing the content of the activity of the terminal included in the detection information based on connection information stored in a configuration information storage device, and specifies a terminal located on a route, along which the infected terminal is likely to be used for hacking or for infection of the terminal in the future, as a candidate for an infected terminal likely to be infected.Type: ApplicationFiled: October 5, 2016Publication date: March 14, 2019Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yasuhiro TERAMOTO, Bo HU, Toshiharu KISHI, Yukio NAGAFUCHI, Takaaki KOYAMA, Hideo KITAZUME
-
Patent number: 10181031Abstract: A cloud controller performs, when an attack on a VM in any of data centers in a system is detected, setting of NAT of a private IP address of a VM(A), for a boundary router of each data center other than a data center that the VM(A) belongs to, the VM(A) being a victim. Next, the cloud controller performs setting for a redirecting device in the same data center as the VM(A), such that the redirecting device redirects access from a user terminal to a host under a boundary router of any of the respective data centers other than the data center. Thereafter, the cloud controller changes a private IP address of the VM(A) in a NAT setting of a boundary router of the data center to a private IP address of the redirecting device.Type: GrantFiled: August 26, 2015Date of Patent: January 15, 2019Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yukio Nagafuchi, Yasuhiro Teramoto, Toshiharu Kishi, Takaaki Koyama, Hideo Kitazume
-
Publication number: 20180041535Abstract: A security measure invalidation prevention device includes an acquisition unit that acquires invalidated security point information about an invalidated security point among security points each having a measure function performing a security measure on a node connected to a network. The invalidated security point has a measure function to be invalidated. The device also includes a determination unit that determines whether a security event to be addressed with the measure function of the invalidated security point is present on the basis of the invalidated security point information acquired by the acquisition unit. The device further includes an extraction unit that extracts a security point to which the measure function of the invalidated security point can be shifted when the determination unit determines that the security event is present.Type: ApplicationFiled: February 29, 2016Publication date: February 8, 2018Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshiharu KISHI, Yasuhiro TERAMOTO, Bo HU, Yukio NAGAFUCHI, Takaaki KOYAMA, Hideo KITAZUME
-
Publication number: 20180041471Abstract: When an attack is detected, a controller samples an attack-target addressed DNS reply, received by a border router, from each of the border routers. Then, the controller adds the transmission-source IP address of the sampled DNS reply to the black list of the border router. Furthermore, upon reception of any of a target-addressed DNS reply and a target-addressed UDP subsequent fragment from the IP address that is described in the black list, the controller gives a command to the border router to discard the packet. Furthermore, the controller specifies the setting, for each of the border routers, that DNS replies to a DNS request from the target are excluded from discarding.Type: ApplicationFiled: November 18, 2015Publication date: February 8, 2018Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuichi SUDO, Takahiro HAMADA, Masami UENO, Yuminobu IGARASHI, Hideo KITAZUME, Bo HU, Yuichi MURATA
-
Publication number: 20170339183Abstract: An optimization apparatus collects cyber attack information that is information related to a cyber attack, and system information that is information related to an entire system including a device that has received the cyber attack. Based on the collected cyber attack information and system information, the optimization apparatus identifies an attack route of the cyber attack, and extracts, as dealing point candidates, devices that are on the attack route and have an effective dealing function against the cyber attack. Subsequently, the optimization apparatus selects a dealing point from the extracted dealing point candidates by using optimization logic that has been set.Type: ApplicationFiled: November 5, 2015Publication date: November 23, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Bo HU, Toshiharu KISHI, Hideo KITAZUME, Takaaki KOYAMA, Yukio NAGAFUCHI, Yasuhiro TERAMOTO
-
Publication number: 20170228539Abstract: A cloud controller performs, when an attack on a VM in any of data centers in a system is detected, setting of NAT of a private IP address of a VM(A), for a boundary router of each data center other than a data center that the VM(A) belongs to, the VM(A) being a victim. Next, the cloud controller performs setting for a redirecting device in the same data center as the VM(A), such that the redirecting device redirects access from a user terminal to a host under a boundary router of any of the respective data centers other than the data center. Thereafter, the cloud controller changes a private IP address of the VM(A) in a NAT setting of a boundary router of the data center to a private IP address of the redirecting device.Type: ApplicationFiled: August 26, 2015Publication date: August 10, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yukio NAGAFUCHI, Yasuhiro TERAMOTO, Toshiharu KISHI, Takaaki KOYAMA, Hideo KITAZUME
-
Publication number: 20170155669Abstract: An unauthorized-access detection device in which when a relationship between information regarding a request transmitted from a terminal operated by a user to a service server that provides a service, which is acquired by a request acquisition unit, and information regarding a query transmitted from the service server to a DB that accumulates information regarding the service, which is acquired by a query acquisition unit, is different from a normal pattern, a detection unit detects the query as unauthorized access to the DB.Type: ApplicationFiled: July 1, 2015Publication date: June 1, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuichi SUDO, Kunio HATO, Takahiro HAMADA, Masami UENO, Hideo KITAZUME