Patents by Inventor Hiroyoshi Takiguchi

Hiroyoshi Takiguchi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240086534
    Abstract: A tampering detection device includes tampering detection circuitry configured to acquire an access pattern of a monitoring target file, extract a time-series pattern of access for each monitoring target file from the access pattern acquired, and determine a scan pattern on a basis of the time-series pattern of access extracted.
    Type: Application
    Filed: January 13, 2021
    Publication date: March 14, 2024
    Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Yuki YAMANAKA, Manami ITO, Ryota SATO, Hiroyoshi TAKIGUCHI, Nobuhiro CHIBA, Yoshiaki NAKAJIMA
  • Patent number: 11496893
    Abstract: A relay device transfers a plurality of original data fragments corresponding to a plurality of secret sharing values of original data to a plurality of secure computation devices, transfers, to each of the secure computation devices, a request to send a result fragment based on a secure computation result corresponding to any one of the original data fragments, and transfers the result fragment. The relay device controls timing with which the original data fragments are transferred and timing with which the request to send is transferred.
    Type: Grant
    Filed: October 2, 2015
    Date of Patent: November 8, 2022
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Hiroyoshi Takiguchi, Naoto Kiribuchi, Teruko Miyata
  • Publication number: 20220292225
    Abstract: A storage unit stores a size of a free area of storage of target equipment, and software saved in the storage. The generation unit generates a graph including a number of nodes according to the size of the free area of the storage, and transmits the graph to the target equipment. The calculation unit calculates a hash value corresponding to each software block saved in the storage. The verification unit verifies the presence or absence of tampering of the storage of the target equipment using the hash value corresponding to the block calculated, a response calculated using the graph returned to a challenge that specifies a node of the graph, and a hash value corresponding to the block returned as the response to the challenge that specifies the block.
    Type: Application
    Filed: September 3, 2019
    Publication date: September 15, 2022
    Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Manami ITO, Kimihiro YAMAKOSHI, Hiroyoshi TAKIGUCHI, Takeshi NAKATSURU
  • Patent number: 10579813
    Abstract: A database system comprises a determining part 13 determining whether or not to conceal information to be registered in a database, a terminal device 1 that, if the determining part 13 determines that the information is to be concealed, generates N information fragments by secret-sharing the information and sends the N information fragments to a system management device 2, where N is a predetermined positive integer, the system management device 2 sending the N information fragments received from the terminal device 1 to N different database devices 3, and N database devices 3 each storing one of N information fragments received from the system management device 2.
    Type: Grant
    Filed: May 6, 2016
    Date of Patent: March 3, 2020
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Naoto Kiribuchi, Hiroyoshi Takiguchi
  • Patent number: 10218495
    Abstract: Data processing is performed while personal information is kept concealed. A registrant terminal splits a registration input password and allocates the split pieces to secure computation servers. The secure computation servers verify whether the password matches. The registrant terminal splits target data and allocates the data shared values to the secure computation servers. The secure computation servers store the data shared values. A user terminal splits a utilization input password and allocates the split pieces to the secure computation servers. The secure computation servers verify whether the password matches. The user terminal sends a data processing request to the secure computation servers. The secure computation servers execute secure computation of the data shared values to generate processing result shared values. The user terminal recovers the processing result from the processing result shared values.
    Type: Grant
    Filed: December 5, 2014
    Date of Patent: February 26, 2019
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Teruko Miyata, Hiroyoshi Takiguchi, Naoto Kiribuchi, Koji Chida, Dai Ikarashi, Gembu Morohashi, Hitoshi Fuji, Shigeru Kayaguchi
  • Publication number: 20180150642
    Abstract: A database system comprises a determining part 13 determining whether or not to conceal information to be registered in a database, a terminal device 1 that, if the determining part 13 determines that the information is to be concealed, generates N information fragments by secret-sharing the information and sends the N information fragments to a system management device 2, where N is a predetermined positive integer, the system management device 2 sending the N information fragments received from the terminal device 1 to N different database devices 3, and N database devices 3 each storing one of N information fragments received from the system management device 2.
    Type: Application
    Filed: May 6, 2016
    Publication date: May 31, 2018
    Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Naoto KIRIBUCHI, Hiroyoshi TAKIGUCHI
  • Publication number: 20170310473
    Abstract: A relay device transfers a plurality of original data fragments corresponding to a plurality of secret sharing values of original data to a plurality of secure computation devices, transfers, to each of the secure computation devices, a request to send a result fragment based on a secure computation result corresponding to any one of the original data fragments, and transfers the result fragment. The relay device controls timing with which the original data fragments are transferred and timing with which the request to send is transferred.
    Type: Application
    Filed: October 2, 2015
    Publication date: October 26, 2017
    Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Hiroyoshi TAKIGUCHI, Naoto KIRIBUCHI, Teruko MIYATA
  • Publication number: 20160330018
    Abstract: Data processing is performed while personal information is kept concealed. A registrant terminal splits a registration input password and allocates the split pieces to secure computation servers. The secure computation servers verify whether the password matches. The registrant terminal splits target data and allocates the data shared values to the secure computation servers. The secure computation servers store the data shared values. A user terminal splits a utilization input password and allocates the split pieces to the secure computation servers. The secure computation servers verify whether the password matches. The user terminal sends a data processing request to the secure computation servers. The secure computation servers execute secure computation of the data shared values to generate processing result shared values. The user terminal recovers the processing result from the processing result shared values.
    Type: Application
    Filed: December 5, 2014
    Publication date: November 10, 2016
    Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Teruko MIYATA, Hiroyoshi TAKIGUCHI, Naoto KIRIBUCHI, Koji CHIDA, Dai IKARASHI, Gembu MOROHASHI, Hitoshi FUJI, Shigeru KAYAGUCHI
  • Publication number: 20100217990
    Abstract: A first connection between a first terminal 10 and a relay server device 30 is established when the relay server 30, having a connection standby function, is triggered by first connection establishment request information transmitted from the first terminal 10 having a connection establishment request function but not having the connection standby function. A second connection between a second terminal 20 and the relay server device 30 is established when the relay server 30 is triggered by second connection establishment request information transmitted from the second terminal 20 having the connection establishment request function. First endpoint information corresponding to the first connection and the identifier of the first terminal 10 are stored in association with each other in a memory 30g of the relay server device 30.
    Type: Application
    Filed: May 28, 2008
    Publication date: August 26, 2010
    Applicant: Nippon Telegraph and Telephone Corp.
    Inventors: Tsuyoshi Abe, Makiko Aoyagi, Manabu Okamoto, Hiroki Itoh, Kenji Takahashi, Hiroyoshi Takiguchi