Patents by Inventor Hiroyoshi Takiguchi
Hiroyoshi Takiguchi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240220451Abstract: A device acquires a file path of determination target equipment that is a determination target of file integrity, generates a concealment path for digesting the acquired file path for each file path, generates a concealment determination reference in which the generated concealment path and a hash value obtained by digesting file data stored in the determination target equipment are listed in association with each other, generates a concealment list by associating the file path stored in the determination target equipment with the generated concealment path, generates a determination reference by associating the file path with a hash value obtained by digesting the file data using the generated concealment determination reference and the generated concealment list, and calculates a hash value for each piece of the file data in the determination target equipment and determines file integrity based on the hash value and a hash value included in the determination reference.Type: ApplicationFiled: May 10, 2021Publication date: July 4, 2024Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Nobuhiro CHIBA, Seishi OUCHI, Hiroyoshi TAKIGUCHI, Yuki YAMANAKA, Reika ARAKAWA, Ryota SATO, Yoshiaki NAKAJIMA, Takaaki KOYAMA
-
Publication number: 20240086534Abstract: A tampering detection device includes tampering detection circuitry configured to acquire an access pattern of a monitoring target file, extract a time-series pattern of access for each monitoring target file from the access pattern acquired, and determine a scan pattern on a basis of the time-series pattern of access extracted.Type: ApplicationFiled: January 13, 2021Publication date: March 14, 2024Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuki YAMANAKA, Manami ITO, Ryota SATO, Hiroyoshi TAKIGUCHI, Nobuhiro CHIBA, Yoshiaki NAKAJIMA
-
Patent number: 11496893Abstract: A relay device transfers a plurality of original data fragments corresponding to a plurality of secret sharing values of original data to a plurality of secure computation devices, transfers, to each of the secure computation devices, a request to send a result fragment based on a secure computation result corresponding to any one of the original data fragments, and transfers the result fragment. The relay device controls timing with which the original data fragments are transferred and timing with which the request to send is transferred.Type: GrantFiled: October 2, 2015Date of Patent: November 8, 2022Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Hiroyoshi Takiguchi, Naoto Kiribuchi, Teruko Miyata
-
Publication number: 20220292225Abstract: A storage unit stores a size of a free area of storage of target equipment, and software saved in the storage. The generation unit generates a graph including a number of nodes according to the size of the free area of the storage, and transmits the graph to the target equipment. The calculation unit calculates a hash value corresponding to each software block saved in the storage. The verification unit verifies the presence or absence of tampering of the storage of the target equipment using the hash value corresponding to the block calculated, a response calculated using the graph returned to a challenge that specifies a node of the graph, and a hash value corresponding to the block returned as the response to the challenge that specifies the block.Type: ApplicationFiled: September 3, 2019Publication date: September 15, 2022Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Manami ITO, Kimihiro YAMAKOSHI, Hiroyoshi TAKIGUCHI, Takeshi NAKATSURU
-
Patent number: 10579813Abstract: A database system comprises a determining part 13 determining whether or not to conceal information to be registered in a database, a terminal device 1 that, if the determining part 13 determines that the information is to be concealed, generates N information fragments by secret-sharing the information and sends the N information fragments to a system management device 2, where N is a predetermined positive integer, the system management device 2 sending the N information fragments received from the terminal device 1 to N different database devices 3, and N database devices 3 each storing one of N information fragments received from the system management device 2.Type: GrantFiled: May 6, 2016Date of Patent: March 3, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Naoto Kiribuchi, Hiroyoshi Takiguchi
-
Patent number: 10218495Abstract: Data processing is performed while personal information is kept concealed. A registrant terminal splits a registration input password and allocates the split pieces to secure computation servers. The secure computation servers verify whether the password matches. The registrant terminal splits target data and allocates the data shared values to the secure computation servers. The secure computation servers store the data shared values. A user terminal splits a utilization input password and allocates the split pieces to the secure computation servers. The secure computation servers verify whether the password matches. The user terminal sends a data processing request to the secure computation servers. The secure computation servers execute secure computation of the data shared values to generate processing result shared values. The user terminal recovers the processing result from the processing result shared values.Type: GrantFiled: December 5, 2014Date of Patent: February 26, 2019Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Teruko Miyata, Hiroyoshi Takiguchi, Naoto Kiribuchi, Koji Chida, Dai Ikarashi, Gembu Morohashi, Hitoshi Fuji, Shigeru Kayaguchi
-
Publication number: 20180150642Abstract: A database system comprises a determining part 13 determining whether or not to conceal information to be registered in a database, a terminal device 1 that, if the determining part 13 determines that the information is to be concealed, generates N information fragments by secret-sharing the information and sends the N information fragments to a system management device 2, where N is a predetermined positive integer, the system management device 2 sending the N information fragments received from the terminal device 1 to N different database devices 3, and N database devices 3 each storing one of N information fragments received from the system management device 2.Type: ApplicationFiled: May 6, 2016Publication date: May 31, 2018Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Naoto KIRIBUCHI, Hiroyoshi TAKIGUCHI
-
Publication number: 20170310473Abstract: A relay device transfers a plurality of original data fragments corresponding to a plurality of secret sharing values of original data to a plurality of secure computation devices, transfers, to each of the secure computation devices, a request to send a result fragment based on a secure computation result corresponding to any one of the original data fragments, and transfers the result fragment. The relay device controls timing with which the original data fragments are transferred and timing with which the request to send is transferred.Type: ApplicationFiled: October 2, 2015Publication date: October 26, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Hiroyoshi TAKIGUCHI, Naoto KIRIBUCHI, Teruko MIYATA
-
Publication number: 20160330018Abstract: Data processing is performed while personal information is kept concealed. A registrant terminal splits a registration input password and allocates the split pieces to secure computation servers. The secure computation servers verify whether the password matches. The registrant terminal splits target data and allocates the data shared values to the secure computation servers. The secure computation servers store the data shared values. A user terminal splits a utilization input password and allocates the split pieces to the secure computation servers. The secure computation servers verify whether the password matches. The user terminal sends a data processing request to the secure computation servers. The secure computation servers execute secure computation of the data shared values to generate processing result shared values. The user terminal recovers the processing result from the processing result shared values.Type: ApplicationFiled: December 5, 2014Publication date: November 10, 2016Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Teruko MIYATA, Hiroyoshi TAKIGUCHI, Naoto KIRIBUCHI, Koji CHIDA, Dai IKARASHI, Gembu MOROHASHI, Hitoshi FUJI, Shigeru KAYAGUCHI
-
Publication number: 20100217990Abstract: A first connection between a first terminal 10 and a relay server device 30 is established when the relay server 30, having a connection standby function, is triggered by first connection establishment request information transmitted from the first terminal 10 having a connection establishment request function but not having the connection standby function. A second connection between a second terminal 20 and the relay server device 30 is established when the relay server 30 is triggered by second connection establishment request information transmitted from the second terminal 20 having the connection establishment request function. First endpoint information corresponding to the first connection and the identifier of the first terminal 10 are stored in association with each other in a memory 30g of the relay server device 30.Type: ApplicationFiled: May 28, 2008Publication date: August 26, 2010Applicant: Nippon Telegraph and Telephone Corp.Inventors: Tsuyoshi Abe, Makiko Aoyagi, Manabu Okamoto, Hiroki Itoh, Kenji Takahashi, Hiroyoshi Takiguchi