Patents by Inventor Ikuya Morikawa

Ikuya Morikawa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240078128
    Abstract: A control device is mountable on a vehicle. The control device includes a memory, and a hardware processor coupled to the memory. The hardware processor is configured to implement a first hypervisor and a second hypervisor. The first hypervisor controls execution of a first virtual machine. The second hypervisor performs communication with the first hypervisor via a gateway and controls execution of a second virtual machine. The hardware processor is configured to dynamically limit at least one of a communication traffic of application communication or a communication traffic of evaluation and verification communication, based on the application communication executed between the first hypervisor and the second hypervisor, and the evaluation and verification communication executed between the first hypervisor and the second hypervisor during activation of the first virtual machine and the second virtual machine, and based on a communication capacity of the gateway.
    Type: Application
    Filed: September 1, 2023
    Publication date: March 7, 2024
    Applicant: Panasonic Intellectual Property Management Co., Ltd.
    Inventors: Toshinari MORIKAWA, Ikuya MITSUYA, Motoyasu TAGUCHI, Takashi NISHIWAKI, Yuya AOKI, Mitsunori ETO
  • Publication number: 20240039939
    Abstract: A non-transitory computer-readable recording medium storing an attack situation output program for causing a computer to execute a process, the process includes extracting, from information regarding communication that includes a threat level of an attack, information regarding first communication in which the threat level satisfies a first condition, executing anomaly detection processing that detects a suspicious terminal by using the information regarding the first communication of each terminal, and outputting information regarding a first terminal detected as the suspicious terminal by the anomaly detection processing and information regarding content of an attack that corresponds to the first condition, in association with each other.
    Type: Application
    Filed: April 17, 2023
    Publication date: February 1, 2024
    Applicant: Fujitsu Limited
    Inventors: Takanori Oikawa, Hirotaka Kokubo, Ikuya Morikawa
  • Publication number: 20230009999
    Abstract: A recording medium storing a program causing a computer to execute: acquiring, for each model, an attack result of an estimation attack, the acquiring for a respective model being performed by using the respective model and a plurality of data, each model being a model trained by using synthetic data that simulates training data, an amount of the synthetic data for each model being different from each other; specifying, based on the attack result for each model, specific data from among the plurality of data; performing the estimation attack by using the specific data for a specific model of which an amount of the synthetic data is between the amounts of the synthetic data used for any two models; and evaluating, based on an attack result for the specific data and the attack result for each model, a resistance to the estimation attack for the specific model.
    Type: Application
    Filed: April 25, 2022
    Publication date: January 12, 2023
    Applicant: FUJITSU LIMITED
    Inventors: Yuji Higuchi, Ikuya Morikawa, Toshiya Shimizu
  • Publication number: 20220365789
    Abstract: A non-transitory computer-readable storage medium storing an information processing program that causes at least one computer to execute a process, the process includes acquiring a log including a path of an execution file of an application installed in a terminal, an execution time of the execution file, and a hash value of the execution file executed at the execution time, from a plurality of terminals; specifying a time-series transition of the hash value of the same execution file based on the log for each of the plurality of terminals; and specifying a revision target of the execution file based on the time-series transition of the hash value between the plurality of terminals.
    Type: Application
    Filed: February 16, 2022
    Publication date: November 17, 2022
    Applicant: FUJITSU LIMITED
    Inventors: Takanori OIKAWA, Ikuya MORIKAWA
  • Publication number: 20220301288
    Abstract: A storage unit holds a classification model that calculates a confidence score from image data, and a transformation model that is a model for transforming a feature value having fewer dimensions than the image data into the image data and is created such that a set of feature values corresponding to a set of image data follows a probability distribution. A processing unit extracts a feature value according to the probability distribution. The processing unit transforms the feature value into image data using the transformation model and calculates a confidence score corresponding to the image data using the classification model. The processing unit updates, based on the probability distribution and the feature value, a feature value to be input to the transformation model from the feature value to a feature value in such a manner that a confidence score to be calculated is higher than the confidence score.
    Type: Application
    Filed: June 1, 2022
    Publication date: September 22, 2022
    Applicant: FUJITSU LIMITED
    Inventors: Yuji Higuchi, Toshiya Shimizu, Ikuya Morikawa
  • Patent number: 11245698
    Abstract: A registration system includes a management apparatus configured to acquire first information of an authentication key for registration from a communication processing apparatus to communicate with the management apparatus, put a signature for the first information with a first registration key, and transmit the first information completed with the signature to the communication processing apparatus, and a registration server configured to acquire a registration request including the first information completed with the signature by the management apparatus from the communication processing apparatus to communicate with the registration server, verify the signature put for the first information included in the registration request, by using a second registration key paired with the first registration key, and register the first information included in the registration request, based on a result of verifying the signature put for the first information.
    Type: Grant
    Filed: January 14, 2019
    Date of Patent: February 8, 2022
    Assignee: FUJITSU LIMITED
    Inventors: Ikuya Morikawa, Takao Ogura, Dai Yamamoto
  • Patent number: 10686768
    Abstract: In a profile data delivery control apparatus, a storage unit stores therein a public key and a private key. A control unit obtains profile data including the identification information of a service provided using a server, and when the profile data satisfies a prescribed validity condition, attaches a signature to the profile data using the private key. The control unit embeds the public key to be used to verify the signature, in a client application that causes a client to perform an authentication process based on the profile data, and delivers the client application with the public key embedded.
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: June 16, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Junji Takagi, Ikuya Morikawa, Takao Ogura, Dai Yamamoto, Yumi Sakemi, Naoya Torii
  • Patent number: 10425227
    Abstract: An information processing terminal generates a shared key by a public key cryptosystem using an identifier. The information processing terminal calculates a first calculation value by using an algorithm that outputs an element on an extension field of a prime field from two points on an additive cyclic group on an elliptic curve that is defined by the prime field. The information processing terminal holds the first calculation value. The information processing terminal calculates a second calculation value from a variable using an identifier of a sharer that shares the shared key, a private key of the information processing terminal, and the algorithm. The information processing terminal generates the shared key by executing a final exponentiation to each of the exponentiation of the first calculation value and the second calculation value.
    Type: Grant
    Filed: December 20, 2016
    Date of Patent: September 24, 2019
    Assignee: FUJITSU LIMITED
    Inventors: Yumi Sakemi, Ikuya Morikawa, Masahiko Takenaka
  • Patent number: 10419430
    Abstract: A first device generates first encrypted data from a second public key corresponding to second ID regarding a second device and a first random number and transmits first ID regarding the first device, second ID, and first encrypted data. The second device generates second encrypted data from a first public key corresponding to the first ID and a second random number, generates second verification data by generating a second shared-key candidate from the second random number, the first encrypted data, and a second private key, and transmits the second encrypted data and second verification data. The first device generates first verification data by generating a first shared-key candidate from the first random number, the second encrypted data, and a first private key and transmits the first verification data. The first and second devices examine the second and first verification data by using the first and second shared-key candidates, respectively.
    Type: Grant
    Filed: January 13, 2017
    Date of Patent: September 17, 2019
    Assignee: FUJITSU LIMITED
    Inventors: Ikuya Morikawa, Yumi Sakemi, Masahiko Takenaka
  • Publication number: 20190238543
    Abstract: A registration system includes a management apparatus configured to acquire first information of an authentication key for registration from a communication processing apparatus to communicate with the management apparatus, put a signature for the first information with a first registration key, and transmit the first information completed with the signature to the communication processing apparatus, and a registration server configured to acquire a registration request including the first information completed with the signature by the management apparatus from the communication processing apparatus to communicate with the registration server, verify the signature put for the first information included in the registration request, by using a second registration key paired with the first registration key, and register the first information included in the registration request, based on a result of verifying the signature put for the first information.
    Type: Application
    Filed: January 14, 2019
    Publication date: August 1, 2019
    Applicant: FUJITSU LIMITED
    Inventors: Ikuya Morikawa, Takao Ogura, Dai YAMAMOTO
  • Patent number: 10171459
    Abstract: A method of processing a ciphertext, the method includes: acquiring a part of a plurality of encrypted elements included in the ciphertext, each of the plurality of encrypted elements being an encrypted element in which values of a plurality of elements in a multidimensional determination target vector are respectively encrypted by homomorphic encryption; decrypting the acquired part of the plurality of encrypted elements; and determining validity of the determination target vector based on a relationship between at least one value obtained by the decrypting and both of 0 and 1.
    Type: Grant
    Filed: October 3, 2016
    Date of Patent: January 1, 2019
    Assignee: FUJITSU LIMITED
    Inventors: Yumi Sakemi, Ikuya Morikawa
  • Patent number: 9871652
    Abstract: A computer generates a third encrypted polynomial that corresponds to a result of encrypting a third polynomial by use of a result of multiplying a first encrypted polynomial by a second encrypted polynomial, and outputs cryptographic information that represents the third encrypted polynomial. The first encrypted polynomial is a polynomial obtained by encrypting a first polynomial that corresponds to a first vector, and the second encrypted polynomial is a polynomial obtained by encrypting a second polynomial that corresponds to a second vector. The third polynomial includes a first term that has a coefficient based on an inner product of the first vector and the second vector and a second term other than the first term, in which a coefficient of the second term is masked.
    Type: Grant
    Filed: August 20, 2015
    Date of Patent: January 16, 2018
    Assignee: FUJITSU LIMITED
    Inventors: Ikuya Morikawa, Masaya Yasuda
  • Publication number: 20170366525
    Abstract: In a profile data delivery control apparatus, a storage unit stores therein a public key and a private key. A control unit obtains profile data including the identification information of a service provided using a server, and when the profile data satisfies a prescribed validity condition, attaches a signature to the profile data using the private key. The control unit embeds the public key to be used to verify the signature, in a client application that causes a client to perform an authentication process based on the profile data, and delivers the client application with the public key embedded.
    Type: Application
    Filed: May 10, 2017
    Publication date: December 21, 2017
    Applicant: FUJITSU LIMITED
    Inventors: Junji TAKAGI, Ikuya Morikawa, Takao Ogura, Dai YAMAMOTO, Yumi Sakemi, Naoya Torii
  • Publication number: 20170303119
    Abstract: An information processing system includes an information processing device including a processor, an electronic tag configured to store first identification information used for identifying a monitor target, and a sensor device configured to acquire first monitor information of the monitor target, wherein the processor is configured to transmit, to the sensor device and a server device, a first encryption key corresponding to the first identification information, and transmit, to the sensor device and a server device, second identification information used for identifying the first encryption key, and the sensor device is configured to acquire the first identification information from the electronic tag, encrypt the first monitor information using the first encryption key that corresponds to the first identification information, and transmit, to the server device, the encrypted first monitor information and the second identification information.
    Type: Application
    Filed: February 14, 2017
    Publication date: October 19, 2017
    Applicant: FUJITSU LIMITED
    Inventors: Takao Ogura, Ikuya Morikawa
  • Patent number: 9793895
    Abstract: An electronic circuit includes: a first logic circuit coupled to a first input line and a first output line; a second logic circuit coupled to a second input line and a second output line; a first line pattern coupled to the first output line and including an input line different from the second input line; and a second line pattern coupled to the second output line and different from the first input line, wherein at least a part of the first output line, the first line pattern, the second output line, or the second line pattern has a folded shape or a circular shape.
    Type: Grant
    Filed: December 12, 2016
    Date of Patent: October 17, 2017
    Assignee: FUJITSU LIMITED
    Inventors: Dai Yamamoto, Naoya Torii, Ikuya Morikawa
  • Patent number: 9760616
    Abstract: A computer is disclosed that performs an electronic mail creation process. The computer creates an electronic mail by referring to a storage part in which received electronic mails are stored, using at least one electronic mail of the received electronic mails stored in the storage part, the at least one electronic mail selected based on a criteria being set beforehand, and changing at least one of header information and a body text of the at least one electronic mail.
    Type: Grant
    Filed: September 5, 2014
    Date of Patent: September 12, 2017
    Assignee: FUJITSU LIMITED
    Inventors: Takeaki Terada, Satoru Torii, Masanobu Morinaga, Ikuya Morikawa, Kouichi Itoh, Hiroshi Tsuda
  • Publication number: 20170208062
    Abstract: A first device generates first encrypted data from a second public key corresponding to second ID regarding a second device and a first random number and transmits first ID regarding the first device, second ID, and first encrypted data. The second device generates second encrypted data from a first public key corresponding to the first ID and a second random number, generates second verification data by generating a second shared-key candidate from the second random number, the first encrypted data, and a second private key, and transmits the second encrypted data and second verification data. The first device generates first verification data by generating a first shared-key candidate from the first random number, the second encrypted data, and a first private key and transmits the first verification data. The first and second devices examine the second and first verification data by using the first and second shared-key candidates, respectively.
    Type: Application
    Filed: January 13, 2017
    Publication date: July 20, 2017
    Applicant: FUJITSU LIMITED
    Inventors: Ikuya Morikawa, Yumi Sakemi, Masahiko TAKENAKA
  • Publication number: 20170207914
    Abstract: An information processing terminal generates a shared key by a public key cryptosystem using an identifier. The information processing terminal calculates a first calculation value by using an algorithm that outputs an element on an extension field of a prime field from two points on an additive cyclic group on an elliptic curve that is defined by the prime field. The information processing terminal holds the first calculation value. The information processing terminal calculates a second calculation value from a variable using an identifier of a sharer that shares the shared key, a private key of the information processing terminal, and the algorithm. The information processing terminal generates the shared key by executing a final exponentiation to each of the exponentiation of the first calculation value and the second calculation value.
    Type: Application
    Filed: December 20, 2016
    Publication date: July 20, 2017
    Applicant: FUJITSU LIMITED
    Inventors: Yumi Sakemi, Ikuya Morikawa, Masahiko TAKENAKA
  • Publication number: 20170187381
    Abstract: An electronic circuit includes: a first logic circuit coupled to a first input line and a first output line; a second logic circuit coupled to a second input line and a second output line; a first line pattern coupled to the first output line and including an input line different from the second input line; and a second line pattern coupled to the second output line and different from the first input line, wherein at least a part of the first output line, the first line pattern, the second output line, or the second line pattern has a folded shape or a circular shape.
    Type: Application
    Filed: December 12, 2016
    Publication date: June 29, 2017
    Applicant: FUJITSU LIMITED
    Inventors: Dai YAMAMOTO, Naoya Torii, Ikuya Morikawa
  • Publication number: 20170109545
    Abstract: The electronic device has a falsification detection bit string generation circuit, a transmission data generation circuit, and a data output circuit. The falsification detection bit string generation circuit generates a transmission falsification detection bit string having a bit array in which at least one “0” to “1” are changed depending on changing at least one “1” of a transmission bit string to “0”. The transmission data generation circuit generates transmission data including a transmission bit string and a transmission falsification detection bit string and the data output circuit transmits the transmission data in the open drain output mode.
    Type: Application
    Filed: October 12, 2016
    Publication date: April 20, 2017
    Applicant: FUJITSU LIMITED
    Inventors: Dai YAMAMOTO, Ikuya Morikawa