Patents by Inventor Ikuya Morikawa
Ikuya Morikawa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240078128Abstract: A control device is mountable on a vehicle. The control device includes a memory, and a hardware processor coupled to the memory. The hardware processor is configured to implement a first hypervisor and a second hypervisor. The first hypervisor controls execution of a first virtual machine. The second hypervisor performs communication with the first hypervisor via a gateway and controls execution of a second virtual machine. The hardware processor is configured to dynamically limit at least one of a communication traffic of application communication or a communication traffic of evaluation and verification communication, based on the application communication executed between the first hypervisor and the second hypervisor, and the evaluation and verification communication executed between the first hypervisor and the second hypervisor during activation of the first virtual machine and the second virtual machine, and based on a communication capacity of the gateway.Type: ApplicationFiled: September 1, 2023Publication date: March 7, 2024Applicant: Panasonic Intellectual Property Management Co., Ltd.Inventors: Toshinari MORIKAWA, Ikuya MITSUYA, Motoyasu TAGUCHI, Takashi NISHIWAKI, Yuya AOKI, Mitsunori ETO
-
Publication number: 20240039939Abstract: A non-transitory computer-readable recording medium storing an attack situation output program for causing a computer to execute a process, the process includes extracting, from information regarding communication that includes a threat level of an attack, information regarding first communication in which the threat level satisfies a first condition, executing anomaly detection processing that detects a suspicious terminal by using the information regarding the first communication of each terminal, and outputting information regarding a first terminal detected as the suspicious terminal by the anomaly detection processing and information regarding content of an attack that corresponds to the first condition, in association with each other.Type: ApplicationFiled: April 17, 2023Publication date: February 1, 2024Applicant: Fujitsu LimitedInventors: Takanori Oikawa, Hirotaka Kokubo, Ikuya Morikawa
-
Publication number: 20230009999Abstract: A recording medium storing a program causing a computer to execute: acquiring, for each model, an attack result of an estimation attack, the acquiring for a respective model being performed by using the respective model and a plurality of data, each model being a model trained by using synthetic data that simulates training data, an amount of the synthetic data for each model being different from each other; specifying, based on the attack result for each model, specific data from among the plurality of data; performing the estimation attack by using the specific data for a specific model of which an amount of the synthetic data is between the amounts of the synthetic data used for any two models; and evaluating, based on an attack result for the specific data and the attack result for each model, a resistance to the estimation attack for the specific model.Type: ApplicationFiled: April 25, 2022Publication date: January 12, 2023Applicant: FUJITSU LIMITEDInventors: Yuji Higuchi, Ikuya Morikawa, Toshiya Shimizu
-
Publication number: 20220365789Abstract: A non-transitory computer-readable storage medium storing an information processing program that causes at least one computer to execute a process, the process includes acquiring a log including a path of an execution file of an application installed in a terminal, an execution time of the execution file, and a hash value of the execution file executed at the execution time, from a plurality of terminals; specifying a time-series transition of the hash value of the same execution file based on the log for each of the plurality of terminals; and specifying a revision target of the execution file based on the time-series transition of the hash value between the plurality of terminals.Type: ApplicationFiled: February 16, 2022Publication date: November 17, 2022Applicant: FUJITSU LIMITEDInventors: Takanori OIKAWA, Ikuya MORIKAWA
-
Publication number: 20220301288Abstract: A storage unit holds a classification model that calculates a confidence score from image data, and a transformation model that is a model for transforming a feature value having fewer dimensions than the image data into the image data and is created such that a set of feature values corresponding to a set of image data follows a probability distribution. A processing unit extracts a feature value according to the probability distribution. The processing unit transforms the feature value into image data using the transformation model and calculates a confidence score corresponding to the image data using the classification model. The processing unit updates, based on the probability distribution and the feature value, a feature value to be input to the transformation model from the feature value to a feature value in such a manner that a confidence score to be calculated is higher than the confidence score.Type: ApplicationFiled: June 1, 2022Publication date: September 22, 2022Applicant: FUJITSU LIMITEDInventors: Yuji Higuchi, Toshiya Shimizu, Ikuya Morikawa
-
Patent number: 11245698Abstract: A registration system includes a management apparatus configured to acquire first information of an authentication key for registration from a communication processing apparatus to communicate with the management apparatus, put a signature for the first information with a first registration key, and transmit the first information completed with the signature to the communication processing apparatus, and a registration server configured to acquire a registration request including the first information completed with the signature by the management apparatus from the communication processing apparatus to communicate with the registration server, verify the signature put for the first information included in the registration request, by using a second registration key paired with the first registration key, and register the first information included in the registration request, based on a result of verifying the signature put for the first information.Type: GrantFiled: January 14, 2019Date of Patent: February 8, 2022Assignee: FUJITSU LIMITEDInventors: Ikuya Morikawa, Takao Ogura, Dai Yamamoto
-
Patent number: 10686768Abstract: In a profile data delivery control apparatus, a storage unit stores therein a public key and a private key. A control unit obtains profile data including the identification information of a service provided using a server, and when the profile data satisfies a prescribed validity condition, attaches a signature to the profile data using the private key. The control unit embeds the public key to be used to verify the signature, in a client application that causes a client to perform an authentication process based on the profile data, and delivers the client application with the public key embedded.Type: GrantFiled: May 10, 2017Date of Patent: June 16, 2020Assignee: FUJITSU LIMITEDInventors: Junji Takagi, Ikuya Morikawa, Takao Ogura, Dai Yamamoto, Yumi Sakemi, Naoya Torii
-
Patent number: 10425227Abstract: An information processing terminal generates a shared key by a public key cryptosystem using an identifier. The information processing terminal calculates a first calculation value by using an algorithm that outputs an element on an extension field of a prime field from two points on an additive cyclic group on an elliptic curve that is defined by the prime field. The information processing terminal holds the first calculation value. The information processing terminal calculates a second calculation value from a variable using an identifier of a sharer that shares the shared key, a private key of the information processing terminal, and the algorithm. The information processing terminal generates the shared key by executing a final exponentiation to each of the exponentiation of the first calculation value and the second calculation value.Type: GrantFiled: December 20, 2016Date of Patent: September 24, 2019Assignee: FUJITSU LIMITEDInventors: Yumi Sakemi, Ikuya Morikawa, Masahiko Takenaka
-
Patent number: 10419430Abstract: A first device generates first encrypted data from a second public key corresponding to second ID regarding a second device and a first random number and transmits first ID regarding the first device, second ID, and first encrypted data. The second device generates second encrypted data from a first public key corresponding to the first ID and a second random number, generates second verification data by generating a second shared-key candidate from the second random number, the first encrypted data, and a second private key, and transmits the second encrypted data and second verification data. The first device generates first verification data by generating a first shared-key candidate from the first random number, the second encrypted data, and a first private key and transmits the first verification data. The first and second devices examine the second and first verification data by using the first and second shared-key candidates, respectively.Type: GrantFiled: January 13, 2017Date of Patent: September 17, 2019Assignee: FUJITSU LIMITEDInventors: Ikuya Morikawa, Yumi Sakemi, Masahiko Takenaka
-
Publication number: 20190238543Abstract: A registration system includes a management apparatus configured to acquire first information of an authentication key for registration from a communication processing apparatus to communicate with the management apparatus, put a signature for the first information with a first registration key, and transmit the first information completed with the signature to the communication processing apparatus, and a registration server configured to acquire a registration request including the first information completed with the signature by the management apparatus from the communication processing apparatus to communicate with the registration server, verify the signature put for the first information included in the registration request, by using a second registration key paired with the first registration key, and register the first information included in the registration request, based on a result of verifying the signature put for the first information.Type: ApplicationFiled: January 14, 2019Publication date: August 1, 2019Applicant: FUJITSU LIMITEDInventors: Ikuya Morikawa, Takao Ogura, Dai YAMAMOTO
-
Patent number: 10171459Abstract: A method of processing a ciphertext, the method includes: acquiring a part of a plurality of encrypted elements included in the ciphertext, each of the plurality of encrypted elements being an encrypted element in which values of a plurality of elements in a multidimensional determination target vector are respectively encrypted by homomorphic encryption; decrypting the acquired part of the plurality of encrypted elements; and determining validity of the determination target vector based on a relationship between at least one value obtained by the decrypting and both of 0 and 1.Type: GrantFiled: October 3, 2016Date of Patent: January 1, 2019Assignee: FUJITSU LIMITEDInventors: Yumi Sakemi, Ikuya Morikawa
-
Patent number: 9871652Abstract: A computer generates a third encrypted polynomial that corresponds to a result of encrypting a third polynomial by use of a result of multiplying a first encrypted polynomial by a second encrypted polynomial, and outputs cryptographic information that represents the third encrypted polynomial. The first encrypted polynomial is a polynomial obtained by encrypting a first polynomial that corresponds to a first vector, and the second encrypted polynomial is a polynomial obtained by encrypting a second polynomial that corresponds to a second vector. The third polynomial includes a first term that has a coefficient based on an inner product of the first vector and the second vector and a second term other than the first term, in which a coefficient of the second term is masked.Type: GrantFiled: August 20, 2015Date of Patent: January 16, 2018Assignee: FUJITSU LIMITEDInventors: Ikuya Morikawa, Masaya Yasuda
-
Publication number: 20170366525Abstract: In a profile data delivery control apparatus, a storage unit stores therein a public key and a private key. A control unit obtains profile data including the identification information of a service provided using a server, and when the profile data satisfies a prescribed validity condition, attaches a signature to the profile data using the private key. The control unit embeds the public key to be used to verify the signature, in a client application that causes a client to perform an authentication process based on the profile data, and delivers the client application with the public key embedded.Type: ApplicationFiled: May 10, 2017Publication date: December 21, 2017Applicant: FUJITSU LIMITEDInventors: Junji TAKAGI, Ikuya Morikawa, Takao Ogura, Dai YAMAMOTO, Yumi Sakemi, Naoya Torii
-
Publication number: 20170303119Abstract: An information processing system includes an information processing device including a processor, an electronic tag configured to store first identification information used for identifying a monitor target, and a sensor device configured to acquire first monitor information of the monitor target, wherein the processor is configured to transmit, to the sensor device and a server device, a first encryption key corresponding to the first identification information, and transmit, to the sensor device and a server device, second identification information used for identifying the first encryption key, and the sensor device is configured to acquire the first identification information from the electronic tag, encrypt the first monitor information using the first encryption key that corresponds to the first identification information, and transmit, to the server device, the encrypted first monitor information and the second identification information.Type: ApplicationFiled: February 14, 2017Publication date: October 19, 2017Applicant: FUJITSU LIMITEDInventors: Takao Ogura, Ikuya Morikawa
-
Patent number: 9793895Abstract: An electronic circuit includes: a first logic circuit coupled to a first input line and a first output line; a second logic circuit coupled to a second input line and a second output line; a first line pattern coupled to the first output line and including an input line different from the second input line; and a second line pattern coupled to the second output line and different from the first input line, wherein at least a part of the first output line, the first line pattern, the second output line, or the second line pattern has a folded shape or a circular shape.Type: GrantFiled: December 12, 2016Date of Patent: October 17, 2017Assignee: FUJITSU LIMITEDInventors: Dai Yamamoto, Naoya Torii, Ikuya Morikawa
-
Patent number: 9760616Abstract: A computer is disclosed that performs an electronic mail creation process. The computer creates an electronic mail by referring to a storage part in which received electronic mails are stored, using at least one electronic mail of the received electronic mails stored in the storage part, the at least one electronic mail selected based on a criteria being set beforehand, and changing at least one of header information and a body text of the at least one electronic mail.Type: GrantFiled: September 5, 2014Date of Patent: September 12, 2017Assignee: FUJITSU LIMITEDInventors: Takeaki Terada, Satoru Torii, Masanobu Morinaga, Ikuya Morikawa, Kouichi Itoh, Hiroshi Tsuda
-
Publication number: 20170208062Abstract: A first device generates first encrypted data from a second public key corresponding to second ID regarding a second device and a first random number and transmits first ID regarding the first device, second ID, and first encrypted data. The second device generates second encrypted data from a first public key corresponding to the first ID and a second random number, generates second verification data by generating a second shared-key candidate from the second random number, the first encrypted data, and a second private key, and transmits the second encrypted data and second verification data. The first device generates first verification data by generating a first shared-key candidate from the first random number, the second encrypted data, and a first private key and transmits the first verification data. The first and second devices examine the second and first verification data by using the first and second shared-key candidates, respectively.Type: ApplicationFiled: January 13, 2017Publication date: July 20, 2017Applicant: FUJITSU LIMITEDInventors: Ikuya Morikawa, Yumi Sakemi, Masahiko TAKENAKA
-
Publication number: 20170207914Abstract: An information processing terminal generates a shared key by a public key cryptosystem using an identifier. The information processing terminal calculates a first calculation value by using an algorithm that outputs an element on an extension field of a prime field from two points on an additive cyclic group on an elliptic curve that is defined by the prime field. The information processing terminal holds the first calculation value. The information processing terminal calculates a second calculation value from a variable using an identifier of a sharer that shares the shared key, a private key of the information processing terminal, and the algorithm. The information processing terminal generates the shared key by executing a final exponentiation to each of the exponentiation of the first calculation value and the second calculation value.Type: ApplicationFiled: December 20, 2016Publication date: July 20, 2017Applicant: FUJITSU LIMITEDInventors: Yumi Sakemi, Ikuya Morikawa, Masahiko TAKENAKA
-
Publication number: 20170187381Abstract: An electronic circuit includes: a first logic circuit coupled to a first input line and a first output line; a second logic circuit coupled to a second input line and a second output line; a first line pattern coupled to the first output line and including an input line different from the second input line; and a second line pattern coupled to the second output line and different from the first input line, wherein at least a part of the first output line, the first line pattern, the second output line, or the second line pattern has a folded shape or a circular shape.Type: ApplicationFiled: December 12, 2016Publication date: June 29, 2017Applicant: FUJITSU LIMITEDInventors: Dai YAMAMOTO, Naoya Torii, Ikuya Morikawa
-
Publication number: 20170109545Abstract: The electronic device has a falsification detection bit string generation circuit, a transmission data generation circuit, and a data output circuit. The falsification detection bit string generation circuit generates a transmission falsification detection bit string having a bit array in which at least one “0” to “1” are changed depending on changing at least one “1” of a transmission bit string to “0”. The transmission data generation circuit generates transmission data including a transmission bit string and a transmission falsification detection bit string and the data output circuit transmits the transmission data in the open drain output mode.Type: ApplicationFiled: October 12, 2016Publication date: April 20, 2017Applicant: FUJITSU LIMITEDInventors: Dai YAMAMOTO, Ikuya Morikawa