Patents by Inventor Hiroyoshi Takiguchi
Hiroyoshi Takiguchi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250132924Abstract: A log output device includes processing circuitry configured to perform a hook for a predetermined event relating to a log message and calculate a hash value from the log message for each hook, provide an encrypted digital signature to the hash value, and output the log message and the hash value to which the digital signature is provided.Type: ApplicationFiled: December 14, 2021Publication date: April 24, 2025Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuki YAMANAKA, Hiroyoshi TAKIGUCHI, Masanori SHINOHARA, Tomohiro NAGAI, Yasunori WADA
-
Publication number: 20250094643Abstract: A detection device includes processing circuitry configured to acquire position information and a file size of a falsification detection target file, and determine a change in the position information or the file size acquired, and detect falsification of the falsification detection target file in a case where there is a change in the position information or the file size.Type: ApplicationFiled: January 11, 2022Publication date: March 20, 2025Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Nobuhiro CHIBA, Hiroyoshi TAKIGUCHI, Takaaki KOYAMA, Yoshiaki NAKAJIMA
-
Publication number: 20250055680Abstract: A detection system includes a node and a verification server, wherein the node includes first processing circuitry configured to generate a plurality of random values based on a seed received from the verification server, and generate a response based on information on an area of a first storage content specified by the plurality of generated random values, and transmit the generated response to the verification server, and the verification server includes second processing circuitry configured to generate a plurality of random values based on the seed, generate a verification response based on information on an area of a second storage content specified by the plurality of generated random values, determine whether the response received from the node matches the verification response, and output a determination result.Type: ApplicationFiled: December 16, 2021Publication date: February 13, 2025Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuki YAMANAKA, Hiroyoshi TAKIGUCHI, Masanori SHINOHARA, Tomohiro NAGAI, Yasunori WADA
-
Publication number: 20250047494Abstract: A detection system includes two or more nodes and a base station that holds information on each of the nodes, wherein the base station includes first processing circuitry configured to search for a circuit passing through all nodes in a network only once, sequentially calculate as many hash values as a number of nodes in the network, and notify each node of an order in the circuit, a hash value according to the order among the calculated hash values, and a node in a subsequent stage in the circuit, and each of the nodes includes second processing circuitry configured to send a hash value notification of which is provided and a challenge to a node in a subsequent stage according to the order notification of which is provided, and verify whether or not the sent hash value matches a value calculated from the hash value notification of which is provided.Type: ApplicationFiled: December 10, 2021Publication date: February 6, 2025Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuki YAMANAKA, Hiroyoshi TAKIGUCHI, Masanori SHINOHARA, Tomohiro NAGAI, Yasunori WADA
-
Publication number: 20240411879Abstract: A detection device includes: an encoding unit that converts one packet to be detected into one fixed-length vector by using natural language processing technology; and a detection unit that detects presence or absence of an abnormality in the packet to be detected based on the fixed-length vector converted by the encoding unit using a detection model.Type: ApplicationFiled: February 12, 2021Publication date: December 12, 2024Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Reika ARAKAWA, Yuki YAMANAKA, Seishi OUCHI, Manami ITO, Nobuhiro CHIBA, Hiroyoshi TAKIGUCHI
-
Publication number: 20240370559Abstract: A collation unit checks the presence/absence of alteration of all files when an apparatus is started. A cyclic collation unit checks the presence/absence of alteration of a predetermined file at predetermined time intervals during the operation of the apparatus.Type: ApplicationFiled: May 28, 2021Publication date: November 7, 2024Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Kimihiro YAMAKOSHI, Nobuhiro CHIBA, Hiroyoshi TAKIGUCHI, Yoshiaki NAKAJIMA
-
Publication number: 20240303332Abstract: A tampering detection device includes tampering detection circuitry configured to acquire an access frequency of a monitoring target file, calculate a number of times of scanning in a scan pattern for each monitoring target file on a basis of the access frequency acquired, and determine the scan pattern on a basis of the number of times of scanning calculated.Type: ApplicationFiled: January 13, 2021Publication date: September 12, 2024Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuki YAMANAKA, Manami ITO, Ryota SATO, Hiroyoshi TAKIGUCHI, Nobuhiro CHIBA, Yoshiaki NAKAJIMA
-
Patent number: 12067152Abstract: A storage unit stores a size of a free area of storage of target equipment, and software saved in the storage. The generation unit generates a graph including a number of nodes according to the size of the free area of the storage, and transmits the graph to the target equipment. The calculation unit calculates a hash value corresponding to each software block saved in the storage. The verification unit verifies the presence or absence of tampering of the storage of the target equipment using the hash value corresponding to the block calculated, a response calculated using the graph returned to a challenge that specifies a node of the graph, and a hash value corresponding to the block returned as the response to the challenge that specifies the block.Type: GrantFiled: September 3, 2019Date of Patent: August 20, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Manami Ito, Kimihiro Yamakoshi, Hiroyoshi Takiguchi, Takeshi Nakatsuru
-
Publication number: 20240220451Abstract: A device acquires a file path of determination target equipment that is a determination target of file integrity, generates a concealment path for digesting the acquired file path for each file path, generates a concealment determination reference in which the generated concealment path and a hash value obtained by digesting file data stored in the determination target equipment are listed in association with each other, generates a concealment list by associating the file path stored in the determination target equipment with the generated concealment path, generates a determination reference by associating the file path with a hash value obtained by digesting the file data using the generated concealment determination reference and the generated concealment list, and calculates a hash value for each piece of the file data in the determination target equipment and determines file integrity based on the hash value and a hash value included in the determination reference.Type: ApplicationFiled: May 10, 2021Publication date: July 4, 2024Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Nobuhiro CHIBA, Seishi OUCHI, Hiroyoshi TAKIGUCHI, Yuki YAMANAKA, Reika ARAKAWA, Ryota SATO, Yoshiaki NAKAJIMA, Takaaki KOYAMA
-
Publication number: 20240086534Abstract: A tampering detection device includes tampering detection circuitry configured to acquire an access pattern of a monitoring target file, extract a time-series pattern of access for each monitoring target file from the access pattern acquired, and determine a scan pattern on a basis of the time-series pattern of access extracted.Type: ApplicationFiled: January 13, 2021Publication date: March 14, 2024Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuki YAMANAKA, Manami ITO, Ryota SATO, Hiroyoshi TAKIGUCHI, Nobuhiro CHIBA, Yoshiaki NAKAJIMA
-
Patent number: 11496893Abstract: A relay device transfers a plurality of original data fragments corresponding to a plurality of secret sharing values of original data to a plurality of secure computation devices, transfers, to each of the secure computation devices, a request to send a result fragment based on a secure computation result corresponding to any one of the original data fragments, and transfers the result fragment. The relay device controls timing with which the original data fragments are transferred and timing with which the request to send is transferred.Type: GrantFiled: October 2, 2015Date of Patent: November 8, 2022Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Hiroyoshi Takiguchi, Naoto Kiribuchi, Teruko Miyata
-
Publication number: 20220292225Abstract: A storage unit stores a size of a free area of storage of target equipment, and software saved in the storage. The generation unit generates a graph including a number of nodes according to the size of the free area of the storage, and transmits the graph to the target equipment. The calculation unit calculates a hash value corresponding to each software block saved in the storage. The verification unit verifies the presence or absence of tampering of the storage of the target equipment using the hash value corresponding to the block calculated, a response calculated using the graph returned to a challenge that specifies a node of the graph, and a hash value corresponding to the block returned as the response to the challenge that specifies the block.Type: ApplicationFiled: September 3, 2019Publication date: September 15, 2022Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Manami ITO, Kimihiro YAMAKOSHI, Hiroyoshi TAKIGUCHI, Takeshi NAKATSURU
-
Patent number: 10579813Abstract: A database system comprises a determining part 13 determining whether or not to conceal information to be registered in a database, a terminal device 1 that, if the determining part 13 determines that the information is to be concealed, generates N information fragments by secret-sharing the information and sends the N information fragments to a system management device 2, where N is a predetermined positive integer, the system management device 2 sending the N information fragments received from the terminal device 1 to N different database devices 3, and N database devices 3 each storing one of N information fragments received from the system management device 2.Type: GrantFiled: May 6, 2016Date of Patent: March 3, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Naoto Kiribuchi, Hiroyoshi Takiguchi
-
Patent number: 10218495Abstract: Data processing is performed while personal information is kept concealed. A registrant terminal splits a registration input password and allocates the split pieces to secure computation servers. The secure computation servers verify whether the password matches. The registrant terminal splits target data and allocates the data shared values to the secure computation servers. The secure computation servers store the data shared values. A user terminal splits a utilization input password and allocates the split pieces to the secure computation servers. The secure computation servers verify whether the password matches. The user terminal sends a data processing request to the secure computation servers. The secure computation servers execute secure computation of the data shared values to generate processing result shared values. The user terminal recovers the processing result from the processing result shared values.Type: GrantFiled: December 5, 2014Date of Patent: February 26, 2019Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Teruko Miyata, Hiroyoshi Takiguchi, Naoto Kiribuchi, Koji Chida, Dai Ikarashi, Gembu Morohashi, Hitoshi Fuji, Shigeru Kayaguchi
-
Publication number: 20180150642Abstract: A database system comprises a determining part 13 determining whether or not to conceal information to be registered in a database, a terminal device 1 that, if the determining part 13 determines that the information is to be concealed, generates N information fragments by secret-sharing the information and sends the N information fragments to a system management device 2, where N is a predetermined positive integer, the system management device 2 sending the N information fragments received from the terminal device 1 to N different database devices 3, and N database devices 3 each storing one of N information fragments received from the system management device 2.Type: ApplicationFiled: May 6, 2016Publication date: May 31, 2018Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Naoto KIRIBUCHI, Hiroyoshi TAKIGUCHI
-
Publication number: 20170310473Abstract: A relay device transfers a plurality of original data fragments corresponding to a plurality of secret sharing values of original data to a plurality of secure computation devices, transfers, to each of the secure computation devices, a request to send a result fragment based on a secure computation result corresponding to any one of the original data fragments, and transfers the result fragment. The relay device controls timing with which the original data fragments are transferred and timing with which the request to send is transferred.Type: ApplicationFiled: October 2, 2015Publication date: October 26, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Hiroyoshi TAKIGUCHI, Naoto KIRIBUCHI, Teruko MIYATA
-
Publication number: 20160330018Abstract: Data processing is performed while personal information is kept concealed. A registrant terminal splits a registration input password and allocates the split pieces to secure computation servers. The secure computation servers verify whether the password matches. The registrant terminal splits target data and allocates the data shared values to the secure computation servers. The secure computation servers store the data shared values. A user terminal splits a utilization input password and allocates the split pieces to the secure computation servers. The secure computation servers verify whether the password matches. The user terminal sends a data processing request to the secure computation servers. The secure computation servers execute secure computation of the data shared values to generate processing result shared values. The user terminal recovers the processing result from the processing result shared values.Type: ApplicationFiled: December 5, 2014Publication date: November 10, 2016Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Teruko MIYATA, Hiroyoshi TAKIGUCHI, Naoto KIRIBUCHI, Koji CHIDA, Dai IKARASHI, Gembu MOROHASHI, Hitoshi FUJI, Shigeru KAYAGUCHI
-
Publication number: 20100217990Abstract: A first connection between a first terminal 10 and a relay server device 30 is established when the relay server 30, having a connection standby function, is triggered by first connection establishment request information transmitted from the first terminal 10 having a connection establishment request function but not having the connection standby function. A second connection between a second terminal 20 and the relay server device 30 is established when the relay server 30 is triggered by second connection establishment request information transmitted from the second terminal 20 having the connection establishment request function. First endpoint information corresponding to the first connection and the identifier of the first terminal 10 are stored in association with each other in a memory 30g of the relay server device 30.Type: ApplicationFiled: May 28, 2008Publication date: August 26, 2010Applicant: Nippon Telegraph and Telephone Corp.Inventors: Tsuyoshi Abe, Makiko Aoyagi, Manabu Okamoto, Hiroki Itoh, Kenji Takahashi, Hiroyoshi Takiguchi