Patents by Inventor Junya AKIBA

Junya AKIBA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10546140
    Abstract: A leakage prevention apparatus stores an assumed use permission range, stores an information asset caused to be in an unavailable state by encryption, stores an information asset caused to be in an available state by decryption, and stores an information asset caused to be in a leakage-concerned state. When use of an information asset in the unavailable state is requested by an application corresponding to the use permission range, the information asset is decrypted to cause the information asset to be in the available state. When the use of the information asset in the available state by the application ends, the information asset is encrypted to cause the information asset to be in the unavailable state. When use of an information asset in the unavailable state is requested by an application not corresponding to the use permission range, the information asset is caused to be in the leakage-concerned state.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: January 28, 2020
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Reo Yoshida, Hitoshi Fuji, Tetsutaro Kobayashi, Junya Akiba, Tomoaki Washio, Tsuyoshi Miyamoto
  • Publication number: 20170372086
    Abstract: An assumed use permission range storage stores a predetermined assumed use permission range. An unavailable state storage stores an information asset in an unavailable state by encryption. An available state storage stores an information asset in an available state by decryption. A leakage-concerned state storage stores an information asset in a leakage-concerned state. When use of an information asset in the unavailable state is requested by an application corresponding to the assumed use permission range, a state changing part decrypts the information asset into the available state. When use of the information asset in the available state by the application ends, the state changing part encrypts the information asset into the unavailable state. When use of an information asset in the unavailable state is requested by an application not corresponding to the assumed use permission range, a state monitoring part puts the information asset in the leakage-concerned state.
    Type: Application
    Filed: January 14, 2016
    Publication date: December 28, 2017
    Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Reo YOSHIDA, Hitoshi FUJI, Tetsutaro KOBAYASHI, Junya AKIBA, Tomoaki WASHIO, Tsuyoshi MIYAMOTO