Patents by Inventor Hiromi Isokawa

Hiromi Isokawa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10708045
    Abstract: A confidential information setting apparatus includes: a communication unit that acquires an encryption key and condition information, which is a condition for setting a secret key to a terminal, from a memory unit of a server and acquires a terminal ID, which is an identifier for uniquely identifying the terminal, and the secret key associated with the terminal ID and encrypted from a memory unit of a user apparatus; an encryption processing unit that decrypts the encrypted secret key with the encryption key; and a control unit that judges whether the decrypted secret key can be set to the terminal or not, based on the condition information and sets the secret key to the terminal when a result of the judgment indicates that the secret key can be set to the terminal.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: July 7, 2020
    Assignee: Hitachi, Ltd.
    Inventors: Hiroki Yamazaki, Hiromi Isokawa, Hiroyuki Higaki
  • Publication number: 20180212765
    Abstract: A confidential information setting apparatus includes: a communication unit that acquires an encryption key and condition information, which is a condition for setting a secret key to a terminal, from a memory unit of a server and acquires a terminal ID, which is an identifier for uniquely identifying the terminal, and the secret key associated with the terminal ID and encrypted from a memory unit of a user apparatus; an encryption processing unit that decrypts the encrypted secret key with the encryption key; and a control unit that judges whether the decrypted secret key can be set to the terminal or not, based on the condition information and sets the secret key to the terminal when a result of the judgment indicates that the secret key can be set to the terminal.
    Type: Application
    Filed: November 18, 2015
    Publication date: July 26, 2018
    Inventors: Hiroki YAMAZAKI, Hiromi ISOKAWA, Hiroyuki HIGAKI
  • Patent number: 9124616
    Abstract: The present invention efficiently displays in a tree structure form a file operation history. A file storage identifier, an operation identifier, and a count are stored as additional meta-information in an alternate data stream with respect to each file stored in a client terminal file system. The operation identifier manages a number of operations (operation generations). The count manages copy frequencies. This meta-information is also sent to a management apparatus, and used for displaying the file operation history in a tree structure form.
    Type: Grant
    Filed: June 28, 2010
    Date of Patent: September 1, 2015
    Assignee: Hitachi, Ltd.
    Inventors: Tomotada Naito, Makoto Kayashima, Shinichi Tsunoo, Hiroshi Nakagoe, Hiromi Isokawa, Norio Suzuki
  • Patent number: 8850592
    Abstract: The content of operations is identified and an alert is generated to an operation having a high risk of information leakage. An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.
    Type: Grant
    Filed: April 2, 2010
    Date of Patent: September 30, 2014
    Assignee: Hitachi, Ltd.
    Inventors: Makoto Kayashima, Shinichi Tsunoo, Hiroshi Nakagoe, Hiromi Isokawa, Norio Suzuki
  • Patent number: 8606935
    Abstract: An application distribution control system is made up of an information processing apparatus including a data collecting part that collects and stores data of a use state when using an application of an application distribution server into a memory and a data moving part that moves the use state data to a client terminal; the client terminal including a data setting part that receives the use state data from the information processing apparatus to set a use state of the application in accordance with the use state data and a request transmitting part that transmits a use request for the application to the application distribution server; and the application distribution server including a service providing part that receives the use request for the application from the client terminal to allow for the use of the application through the network.
    Type: Grant
    Filed: March 2, 2009
    Date of Patent: December 10, 2013
    Assignee: Hitachi, Ltd.
    Inventors: Kazushi Nakagawa, Takatoshi Kato, Hiromi Isokawa
  • Publication number: 20130267177
    Abstract: There is a demand for a technique that enable plural terminals devices to be easily paired with plural mobile terminals possessed by their respective users in a room where the terminal devices that can be shared among the users are installed. Each terminal device searches for mobile terminals present within the wireless range. If the plural mobile terminals are present within a searchable area, the search result indicates plural mobile terminals, making it difficult to determine with what mobile terminal should the terminal device be paired. The current states of various sensors of the mobile terminals are included in information indicating the names of the mobile terminals and are searched by the terminal device. Under circumstances where the plural terminal devices and the plural mobile terminals exist within short distances, the mobile terminal unit to be paired with the terminal device can be found with ease.
    Type: Application
    Filed: December 18, 2012
    Publication date: October 10, 2013
    Applicant: HITACHI, LTD.
    Inventors: Katsuyuki UMEZAWA, Hiromi ISOKAWA, Shinichiro FUKUSHIMA
  • Patent number: 8533850
    Abstract: A client computer detects a user operation for transmitting data to a server or a storage device, determines whether the detected user operation is a fraudulent manipulation, and, if the determination is a positive result, performs security processing which is processing related to security of data to be transmitted. If the data is data within a group to which the user belongs and a destination of the data is a server or a storage device outside the group, the determination is a positive result.
    Type: Grant
    Filed: June 29, 2010
    Date of Patent: September 10, 2013
    Assignee: Hitachi, Ltd.
    Inventors: Nobuaki Onodera, Makoto Kayashima, Shinichi Tsunoo, Hiroshi Nakagoe, Hiromi Isokawa, Norio Suzuki
  • Publication number: 20120215908
    Abstract: An embodiment of this invention detects an improper operation to a file in a computer of a monitoring target in a computer system including a plurality of computers connected via a network. The monitoring target computer receives a file. The computer receives acquisition source information on the file transmitted from a different computer. The computer refers to information on improper operation requirements to determine whether transmission of the file meets the improper operation requirements or not, based on a combination of the acquisition source of the file indicated by the acquisition source information and a transmission destination of the file and if the improper operation requirements are met, it determines that the transmission of the file is an improper operation.
    Type: Application
    Filed: February 18, 2011
    Publication date: August 23, 2012
    Inventors: Shinichi Tsunoo, Makoto Kayashima, Hiroshi Nakagoe, Hiromi Isokawa, Norio Suzuki, Tomotada Naito
  • Publication number: 20110321170
    Abstract: A client computer detects a user operation for transmitting data to a server or a storage device, determines whether the detected user operation is a fraudulent manipulation, and, if the determination is a positive result, performs security processing which is processing related to security of data to be transmitted. If the data is data within a group to which the user belongs and a destination of the data is a server or a storage device outside the group, the determination is a positive result.
    Type: Application
    Filed: June 29, 2010
    Publication date: December 29, 2011
    Applicant: Hitachi, Ltd.
    Inventors: Nobuaki Onodera, Makoto Kayashima, Shinichi Tsunoo, Hiroshi Nakagoe, Hiromi Isokawa, Norio Suzuki
  • Publication number: 20110320508
    Abstract: The present invention efficiently displays in a tree structure form a file operation history. A file storage identifier, an operation identifier, and a count are stored as additional meta-information in an alternate data stream with respect to each file stored in a client terminal file system. The operation identifier manages a number of operations (operation generations). The count manages copy frequencies. This meta-information is also sent to a management apparatus, and used for displaying the file operation history in a tree structure form.
    Type: Application
    Filed: June 28, 2010
    Publication date: December 29, 2011
    Inventors: Tomotada Naito, Makoto Kayashima, Shinichi Tsunoo, Hiroshi Nakagoe, Hiromi Isokawa, Norio Suzuki
  • Publication number: 20110289589
    Abstract: The content of operations is identified and an alert is generated to an operation having a high risk of information leakage. An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.
    Type: Application
    Filed: April 2, 2010
    Publication date: November 24, 2011
    Inventors: Makoto Kayashima, Shinichi Tsunoo, Hiroshi Nakagoe, Hiromi Isokawa, Norio Suzuki
  • Patent number: 8046836
    Abstract: A network quarantine management system eliminates registration or updating work of a quarantine-exempted device and prevents a fraudulent device from abusing authorized network information registered as a quarantine-exempted device and from impersonation. When a quarantine management system detects network connection of a new device, the system judges the type (printer, NAS, etc.) of the device by port scanning. The system enables the device to communicate with another device coupled to a business network without an inspection for connecting the device to the business network, if the newly coupled device is judged to be of an authorized type. The device type judgment is conducted whenever a connection is made and is repeatedly conducted after establishment of the connection to check that the type is of an authorized type and, if the type is found to be an unauthorized type, the device is isolated for inspection.
    Type: Grant
    Filed: May 31, 2006
    Date of Patent: October 25, 2011
    Assignee: Hitachi, Ltd.
    Inventor: Hiromi Isokawa
  • Patent number: 8041787
    Abstract: A thin client terminal that can perform information processing in an off-line state is provided. A thin client terminal 101a sends a request for registration of data to be used off-line and designation of application software to be used off-line to a management server 107 through a remote computer 104. The management server 107 registers the data and application software according to the request. The thin client terminal 101 requests the management server 107 to acquire the requested data and application software, receives the data and application software, and stores the received data and application software into a storage medium 110.
    Type: Grant
    Filed: January 31, 2008
    Date of Patent: October 18, 2011
    Assignee: Hitachi, Ltd.
    Inventors: Hiromi Isokawa, Takashi Tsunehiro
  • Publication number: 20100058441
    Abstract: This information processing limitation system includes an information processing server computer 103 which provides an information processing service, and a terminal computer 101 which is coupled to the information processing server computer 103 and utilizes that information processing service. The terminal computer 101, when utilizing the information processing service, limits the utilization of the information processing service on the basis of a security state which is required for the utilization of the information processing service.
    Type: Application
    Filed: February 17, 2009
    Publication date: March 4, 2010
    Applicant: Hitachi Ltd.
    Inventors: Hiromi Isokawa, Makoto Kayashima
  • Publication number: 20090287831
    Abstract: An application distribution control system is made up of an information processing apparatus including a data collecting part that collects and stores data of a use state when using an application of an application distribution server into a memory and a data moving part that moves the use state data to a client terminal; the client terminal including a data setting part that receives the use state data from the information processing apparatus to set a use state of the application in accordance with the use state data and a request transmitting part that transmits a use request for the application to the application distribution server; and the application distribution server including a service providing part that receives the use request for the application from the client terminal to allow for the use of the application through the network.
    Type: Application
    Filed: March 2, 2009
    Publication date: November 19, 2009
    Inventors: Kazushi Nakagawa, Takatoshi Kato, Hiromi Isokawa
  • Publication number: 20080183841
    Abstract: A thin client terminal that can perform information processing in an off-line state is provided. A thin client terminal 101a sends a request for registration of data to be used off-line and designation of application software to be used off-line to a management server 107 through a remote computer 104. The management server 107 registers the data and application software according to the request. The thin client terminal 101 requests the management server 107 to acquire the requested data and application software, receives the data and application software, and stores the received data and application software into a storage medium 110.
    Type: Application
    Filed: January 31, 2008
    Publication date: July 31, 2008
    Inventors: Hiromi Isokawa, Takashi Tsunehiro
  • Publication number: 20080120726
    Abstract: To provide a mechanism for preventing information leakage by erasing stored information if a preset condition is not satisfied, because if an external storage device in which the information is stored is stolen or lost the risk of information leakage through decryption still remains even in the case where the information is encrypted. An external storage device has a locking management function capable of setting available conditions for stored information and controlling permission/prohibition of user access depending on whether the conditions are satisfied. User access is permitted if the available conditions are satisfied. The stored information is erased if the available conditions are not satisfied.
    Type: Application
    Filed: September 28, 2007
    Publication date: May 22, 2008
    Inventors: Takashi Tsunehiro, Hiromi Isokawa, Tomihisa Hatano, Takatoshi Kato
  • Publication number: 20070118567
    Abstract: A network quarantine management system eliminates registration or updating work of a quarantine-exempted device and prevents a fraudulent device from abusing authorized network information registered as a quarantine-exempted device and from impersonation. when a quarantine management system detects network connection of a new device, the system judges the type (printer, NAS, etc.) of the device by port scanning. The system enables the device to communicate with another device coupled to a business network without an inspection for connecting the device to the business network, if the newly coupled device is judged to be of an authorized type. The device type judgment is conducted whenever a connection is made and is repeatedly conducted after establishment of the connection to check that the type is of an authorized type and, if the type is found to be an unauthorized type, the device is isolated for inspection.
    Type: Application
    Filed: May 31, 2006
    Publication date: May 24, 2007
    Inventor: Hiromi Isokawa
  • Publication number: 20070107041
    Abstract: An information processor, which controls an incident response device to perform an incident response toward a communication device, realizes the following functions: detecting an incident occurrence in the communication device; storing response information which is information indicative of the incident response that the incident response unit should perform, and target information which is information to identify the communication device, with corresponding policy information regarding a response policy to an incident; outputting a list of the policy information when the incident occurrence is detected; receiving a selection of the policy information; retrieving the response information and the target information corresponding to the selected policy information, from the memory; and sending the incident response unit a command to perform the incident response based on the retrieved response information toward the communication device identified based on the retrieved target information.
    Type: Application
    Filed: March 23, 2006
    Publication date: May 10, 2007
    Inventors: Makoto Kayashima, Kazushi Nakagawa, Hiromi Isokawa, Itsuki Watanabe
  • Patent number: 7194530
    Abstract: In an integrated management system for providing a network system having a plurality of computers with a security function and managing a plurality of target products, implementation of the management system itself is facilitated by providing the management system with setting information templates prepared for respective target products, a management program for managing setting information files of target products actually used in a target network, an edit program for editing setting information files, and an install program for installing setting information files created by using the management program and the edit program in respective target devices.
    Type: Grant
    Filed: August 7, 2002
    Date of Patent: March 20, 2007
    Assignee: Hitachi, Ltd.
    Inventors: Makoto Kayashima, Hiromi Isokawa, Yasuji Ishida, Toru Senoo