Patents by Inventor Jun Yajima
Jun Yajima has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220215030Abstract: A non-transitory computer-readable storage medium storing an information processing program that causes at least one computer to execute a process, the process includes executing an prediction process on prediction target data input, by using a trained model; acquiring a plurality of prediction candidates for the prediction target data, and confidence of each of the prediction candidates; storing confidence ranking sequences which each of the plurality of the prediction candidates for the prediction target data are arranged in an order of the confidence, in a storage device; and detecting an adversarial example generation activity by the prediction target data, based on the confidence ranking sequences.Type: ApplicationFiled: October 15, 2021Publication date: July 7, 2022Applicant: FUJITSU LIMITEDInventor: Jun Yajima
-
Patent number: 11057400Abstract: An attack detection device includes: a receiver configured to receive messages that are periodically transmitted from a communication device in a network; and a processor. The processor predicts a number of messages to be received by the receiver in a specified monitor range based on a transmission cycle of the messages so as to generate a predicted value. The processor counts a number of messages received by the receiver in the specified monitor range so as to generate a count value. The processor detects an attack in the network according to a result of a comparison between the predicted value and the count value.Type: GrantFiled: June 6, 2018Date of Patent: July 6, 2021Assignee: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe, Yasuhiko Abe
-
Patent number: 10873591Abstract: An attack detection device includes: a receiver configured to receive a massage that includes target identification information transmitted in a network; and a processor. The processor predicts a number of massages to be received by the receiver in a specified monitor period based on a transmission cycle so as to generate a predicted value. The processor counts a number of massages received by the receiver in the monitor period so as to generate a count value. When the count value is larger than the predicted value and smaller than or equal to a reference value that is obtained by adding an early-arrival acceptable value to the predicted value, the processor decides whether the network has been attacked according to a result of a comparison between the predicted value and the count value after an early-arrival grace period corresponding to the early-arrival acceptable value elapses.Type: GrantFiled: January 17, 2019Date of Patent: December 22, 2020Assignee: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe
-
Patent number: 10848504Abstract: An attack detection device includes: a receiver configured to receive messages that are periodically transmitted from a communication device in a network; and a processor. The processor predicts a number of messages to be received by the receiver in a specified monitor range based on a transmission cycle of the messages so as to generate a predicted value. The processor counts a number of messages received by the receiver in the specified monitor range so as to generate a count value. The processor detects an attack in the network according to a result of a comparison between the predicted value and the count value.Type: GrantFiled: June 6, 2018Date of Patent: November 24, 2020Assignee: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe, Yasuhiko Abe
-
Patent number: 10567401Abstract: An attack detection device includes a transceiver and a processor. The transceiver receives a message from a communication device in a network. The processor calculates, according to a reception time of a first message in periodic messages that are periodically transmitted in a specified transmission cycle in the network, a reception range for a target message in the periodic messages that are received after the first message by the transceiver. When the transceiver receives a second message that is associated with information indicating that the second message is transmitted at a time interval shorter than the transmission cycle outside of the reception range after the reception time of the first message, the processor updates the reception range for a target message in the periodic messages that are received after the second message by the transceiver according to a reception time of the second message and the transmission cycle.Type: GrantFiled: November 15, 2017Date of Patent: February 18, 2020Assignee: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe
-
Patent number: 10567400Abstract: An attack detection device executes a process that includes receiving a message periodically transmitted from a communication device in a network, calculating a reception range for receiving a message including identification information in a reference message selected from the received messages by using a transmission period of a message identified by the identification information, the message being transmitted two or more periods after the reference message, storing the reception range associated with an order of reception of a message predicted to be received in the reception range when the reference message is used as a reference, and determining that an attack on the network is detected when a reception time of the received message including the identification information is not within the reception range associated with the order of reception of the received message in a case where the reference message is used as a reference.Type: GrantFiled: September 21, 2017Date of Patent: February 18, 2020Assignee: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe
-
Publication number: 20190230101Abstract: An attack detection device includes: a receiver configured to receive a massage that includes target identification information transmitted in a network; and a processor. The processor predicts a number of massages to be received by the receiver in a specified monitor period based on a transmission cycle so as to generate a predicted value. The processor counts a number of massages received by the receiver in the monitor period so as to generate a count value. When the count value is larger than the predicted value and smaller than or equal to a reference value that is obtained by adding an early-arrival acceptable value to the predicted value, the processor decides whether the network has been attacked according to a result of a comparison between the predicted value and the count value after an early-arrival grace period corresponding to the early-arrival acceptable value elapses.Type: ApplicationFiled: January 17, 2019Publication date: July 25, 2019Applicant: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe
-
Patent number: 10298578Abstract: A communication relay device that is situated between a corresponding communication node and a bus in a communication network in which a plurality of communication nodes mutually perform a data communication through the bus. A storage configured to store therein pieces of identification information that are likely to be included in data transmitted by the corresponding communication node. A processor configured to perform first authentication processing between the communication relay device and a management device that is connected to the bus, and to perform second authentication processing according to a result of comparing identification information included in data transmitted by the corresponding communication node with the pieces of identification information stored in the storage. A transceiver configured to report, to the management device, a result of the second authentication processing when the first authentication processing has been successful.Type: GrantFiled: June 28, 2016Date of Patent: May 21, 2019Assignee: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe, Yasuhiko Abe
-
Patent number: 10270768Abstract: A communication system includes a first communication device that determines, using identification information on a frame, whether to receive the frame, and a second communication device that belongs to a network identical to the first communication device. A report frame includes a detection of an attack on the network and target identification information that is identification information included in a frame used to perform the attack. When the first communication device receives a report frame from the second communication device, the first communication device sets the frame including the target identification information to be an authentication processing target. Upon transmitting a transmission frame set to be the authentication processing target, the first communication device transmits authentication information generated from the transmission frame along with the transmission frame.Type: GrantFiled: January 11, 2017Date of Patent: April 23, 2019Assignee: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe, Naoya Torii, Tsutomu Matsumoto
-
Publication number: 20190007427Abstract: An attack detection device includes: a receiver configured to receive messages that are periodically transmitted from a communication device in a network; and a processor. The processor predicts a number of messages to be received by the receiver in a specified monitor range based on a transmission cycle of the messages so as to generate a predicted value. The processor counts a number of messages received by the receiver in the specified monitor range so as to generate a count value. The processor detects an attack in the network according to a result of a comparison between the predicted value and the count value.Type: ApplicationFiled: June 6, 2018Publication date: January 3, 2019Applicant: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe, Yasuhiko ABE
-
Publication number: 20180152464Abstract: An attack detection device includes a transceiver and a processor. The transceiver receives a message from a communication device in a network. The processor calculates, according to a reception time of a first message in periodic messages that are periodically transmitted in a specified transmission cycle in the network, a reception range for a target message in the periodic messages that are received after the first message by the transceiver. When the transceiver receives a second message that is associated with information indicating that the second message is transmitted at a time interval shorter than the transmission cycle outside of the reception range after the reception time of the first message, the processor updates the reception range for a target message in the periodic messages that are received after the second message by the transceiver according to a reception time of the second message and the transmission cycle.Type: ApplicationFiled: November 15, 2017Publication date: May 31, 2018Applicant: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe
-
Patent number: 9942123Abstract: A communication monitoring device is used in a network that includes a plurality of nodes. The communication monitoring device includes: a plurality of ports; and a processor. The processor is configured to execute a procedure including: detecting an abnormal frame from among received frames, a first arrival port at which the abnormal frame has arrived, and an order in which the abnormal frame arrived in received frames that have arrived at any of the plurality of ports, and transmitting order information that indicates the detected order to a node connected to the first arrival port.Type: GrantFiled: March 4, 2016Date of Patent: April 10, 2018Assignee: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe, Masahiko Takenaka
-
Publication number: 20180091533Abstract: An attack detection device executes a process that includes receiving a message periodically transmitted from a communication device in a network, calculating a reception range for receiving a message including identification information in a reference message selected from the received messages by using a transmission period of a message identified by the identification information, the message being transmitted two or more periods after the reference message, storing the reception range associated with an order of reception of a message predicted to be received in the reception range when the reference message is used as a reference, and determining that an attack on the network is detected when a reception time of the received message including the identification information is not within the reception range associated with the order of reception of the received message in a case where the reference message is used as a reference.Type: ApplicationFiled: September 21, 2017Publication date: March 29, 2018Applicant: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe
-
Patent number: 9749135Abstract: From the least significant bit of the current secret key, k bits are retrieved, obtaining a binary window sequence. A binary bit string of concatenation of the random number to the more significant bits of the window sequence is obtained if the most significant bit of the window sequence is 0, subtracting a bit string from the current secret key to obtain a new secret key, or the bit string of a complement of the base number for the window sequence in binary system is calculated if the most significant bit of the window sequence is 1, obtaining a bit string by adding a minus sign to a bit string obtained by concatenating the random number to the more significant bits of the bit string, subtracting the bit string from the current secret key to obtain a new secret key.Type: GrantFiled: June 23, 2016Date of Patent: August 29, 2017Assignee: FUJITSU LIMITEDInventors: Jun Yajima, Kouichi Itoh, Masahiko Takenaka, Dai Yamamoto
-
Publication number: 20170208065Abstract: A communication system includes a first communication device that determines, using identification information on a frame, whether to receive the frame, and a second communication device that belongs to a network identical to the first communication device. A report frame includes a detection of an attack on the network and target identification information that is identification information included in a frame used to perform the attack. When the first communication device receives a report frame from the second communication device, the first communication device sets the frame including the target identification information to be an authentication processing target. Upon transmitting a transmission frame set to be the authentication processing target, the first communication device transmits authentication information generated from the transmission frame along with the transmission frame.Type: ApplicationFiled: January 11, 2017Publication date: July 20, 2017Applicant: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe, Naoya Torii, Tsutomu Matsumoto
-
Publication number: 20170048067Abstract: From the least significant bit of the current secret key, k bits are retrieved, obtaining a binary window sequence. A binary bit string of concatenation of the random number to the more significant bits of the window sequence is obtained if the most significant bit of the window sequence is 0, subtracting a bit string from the current secret key to obtain a new secret key, or the bit string of a complement of the base number for the window sequence in binary system is calculated if the most significant bit of the window sequence is 1, obtaining a bit string by adding a minus sign to a bit string obtained by concatenating the random number to the more significant bits of the bit string, subtracting the bit string from the current secret key to obtain a new secret key.Type: ApplicationFiled: June 23, 2016Publication date: February 16, 2017Applicant: FUJITSU LIMITEDInventors: Jun YAJIMA, Kouichi ITOH, Masahiko TAKENAKA, Dai YAMAMOTO
-
Patent number: 9555858Abstract: A power unit includes: a rotation plate 62 that is fixed to an end of a shift drum 50, includes a plurality of recessed portions 63, and rotates together with the shift drum 50; a shift lever 66 that engages with the rotation plate 62; a shift shaft 74 fixed to the shift lever 66; a support shaft 76 disposed substantially in parallel with the shift drum 50; a stopper lever 78 rotatably supported by the support shaft 76; and a stopper roller 88 that is provided in the stopper lever 78 and engages with the recessed portion 63 of the rotation plate 62. When viewed in an axial direction of the shift shaft 74, the stopper lever 78 is disposed to intersect a first line segment A that connects a center 74C of the shift shaft 74 and a center 62C of the rotation plate 62 to each other.Type: GrantFiled: November 17, 2014Date of Patent: January 31, 2017Assignee: YAMAHA HATSUDOKI KABUSHIKI KAISHAInventors: Jun Yajima, Takuya Hanano
-
Publication number: 20170026373Abstract: A communication relay device that is situated between a corresponding communication node and a bus in a communication network in which a plurality of communication nodes mutually perform a data communication through the bus. A storage configured to store therein pieces of identification information that are likely to be included in data transmitted by the corresponding communication node. A processor configured to perform first authentication processing between the communication relay device and a management device that is connected to the bus, and to perform second authentication processing according to a result of comparing identification information included in data transmitted by the corresponding communication node with the pieces of identification information stored in the storage. A transceiver configured to report, to the management device, a result of the second authentication processing when the first authentication processing has been successful.Type: ApplicationFiled: June 28, 2016Publication date: January 26, 2017Applicant: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe, Yasuhiko ABE
-
Patent number: 9530004Abstract: A secure boot method for a system, the system including a processor and a storage medium configured to store a program, a plurality of first partial hash values calculated based on a plurality of first partial programs into which the program is divided, and a first legitimate hash value which is a hash value calculated based on a plurality of first legitimate partial hash values, the plurality of first legitimate partial hash values being calculated based on a plurality of legitimate partial programs. The secure boot method includes calculating, a second calculated hash value based on the plurality of first partial hash values, and determining, whether or not the second calculated hash value matches the first legitimate hash value to continue the start-up processing of the system when the determination indicates match, and suspend the start-up processing of the system when the determination does not indicate match.Type: GrantFiled: August 28, 2014Date of Patent: December 27, 2016Assignee: SOCIONEXT INC.Inventors: Jun Yajima, Kenji Saito
-
Publication number: 20160269265Abstract: A communication monitoring device is used in a network that includes a plurality of nodes. The communication monitoring device includes: a plurality of ports; and a processor. The processor is configured to execute a procedure including: detecting an abnormal frame from among received frames, a first arrival port at which the abnormal frame has arrived, and an order in which the abnormal frame arrived in received frames that have arrived at any of the plurality of ports, and transmitting order information that indicates the detected order to a node connected to the first arrival port.Type: ApplicationFiled: March 4, 2016Publication date: September 15, 2016Applicant: FUJITSU LIMITEDInventors: Jun Yajima, Takayuki Hasebe, Masahiko TAKENAKA