Patents by Inventor Kiyoto Kawauchi

Kiyoto Kawauchi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11215975
    Abstract: An apparatus for identifying a path pattern of devices that produces a defective product in a production line where a product is produced via a plurality of device is provided. The device is configured to estimate a path pattern quality indicating a quality of a group of products produced through a production path included in a path pattern, based on a production path quality and an association relationship between a path pattern and a production path indicating devices via which the product is produced and an order of passing through the devices; and to identify a path pattern suspected to be defective based on the estimated path pattern quality.
    Type: Grant
    Filed: September 3, 2020
    Date of Patent: January 4, 2022
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Masashi Tatedoko, Tsuyoshi Higuchi, Kiyoto Kawauchi, Takeshi Yoneda
  • Publication number: 20210365431
    Abstract: In an SNS server (103) corresponding to a false submission filter device, an event specifying unit (604) analyzes contents of a submission informing of an occurrence of an event and specifies a location (721) of occurrence of the event. A query destination specifying unit (605) searches a query destination database (613) and specifies a query destination corresponding to the location (721) specified by the event specifying unit (604). A query unit (606) transmits a request for checking the presence or absence of occurrence of the event from the observation result of one or more machines to the query destination specified by the query destination specifying unit (605). The query unit (606) receives a response to the request. A result reflecting unit (607) determines whether the contents of the submission are true or false from a check result indicated by the response received by the query unit (606).
    Type: Application
    Filed: May 25, 2017
    Publication date: November 25, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Tomonori NEGI, Kiyoto KAWAUCHI, Yukio IZUMI, Takeshi ASAI, Takumi YAMAMOTO, Hiroki NISHIKAWA, Keisuke KITO, Kohei TAMMACHI
  • Publication number: 20210357501
    Abstract: An attack estimation device includes a storage unit configured to hold an attack tree, an abstract attack tree, and log check management information, and a prediction unit configured to predict, when a detection alert is received, a range of compromise from the attack by referring to the information in the storage unit. The prediction unit is configured to: determine that an attack of an unknown pattern has occurred as the attack when indicators of compromise that correspond to the attack are not successfully identified; identify an abstract attack name by referring to the abstract attack tree; and predict a range of compromise from the attack of an unknown pattern by identifying a device in which indicators of the attack of an unknown pattern are likely to be left, and by identifying a specific place in the log of the identified device, by referring to the log check management information.
    Type: Application
    Filed: July 27, 2021
    Publication date: November 18, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Hisashi NAITO, Kiyoto KAWAUCHI
  • Publication number: 20210329020
    Abstract: An erroneous detection amount obtaining unit (110) obtains using an overall detection rule group corresponding to an overall phase group that configures a series of attack activities, an erroneous detection amount of each phase of when attack detection is performed. A final stages verification unit (121) verifies whether or not an erroneous detection amount of a final phases group satisfies a final stages limitation. An overall verification unit (123) verifies whether or not the erroneous detection amount of the overall phase group satisfies an overall limitation. In a case where the erroneous detection amount of the final phases group does not satisfy the final stages limitation, a final stages adjustment unit (122) adjusts a parameter value of each detection rule of a final stages detection rule group.
    Type: Application
    Filed: June 30, 2021
    Publication date: October 21, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Aiko IWASAKI, Kiyoto KAWAUCHI, Kazuhiro ONO, Takuya SHOYA, Hiromitsu SHIRAI, Hideaki IJIRO
  • Publication number: 20210248231
    Abstract: A system dividing unit (110) divides a target system into a plurality of sub-systems. A root system selection unit (122) selects a sub-system in which a threat on security occurs, as a root system from among the plurality of sub-systems. A root tree generation unit (131) generates an attack tree of the root system, as a root tree. A descendant system selection unit (132) selects one sub-system or more located on an intrusion course to the root system, as one descendent system or more from among the plurality of sub-systems. A descendant tree generation unit (133) generates one attack tree or more corresponding to the one descendent system or more, as one descendent tree or more. A sub-attack tree integration unit (140) integrates the root tree and the one descendent tree or more, to thereby generate an attack tree of the target system.
    Type: Application
    Filed: April 29, 2021
    Publication date: August 12, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Ryosuke SHIMABE, Takeshi ASAI, Kiyoto KAWAUCHI
  • Publication number: 20210232686
    Abstract: Provided is an attack detection device including: an abnormality detection unit configured to detect, by acquiring an abnormality detection result which includes a facility ID, occurrence of an abnormality in a facility associated with the facility ID; a storage unit configured to store, as adjustment history data, data that associates the facility ID and an adjustment time; and an attack determination unit configured to determine that there is an attack on the facility associated with the facility ID, by obtaining an adjustment frequency of the facility from the adjustment history data which is stored in the storage unit, based on a result of detection by the abnormality detection unit, when the adjustment frequency exceeds an allowable number of times set in advance for the facility.
    Type: Application
    Filed: April 12, 2021
    Publication date: July 29, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Masashi TATEDOKO, Tsuyoshi HIGUCHI, Kiyoto KAWAUCHI, Takeshi YONEDA
  • Publication number: 20210224397
    Abstract: An evaluation tree generation unit (101) generates as an evaluation tree, an attack tree about an information system, which is based on inference using predicate logic. A gold tree generation unit (102) generates a gold tree which covers an intrusion route to the information system and reflects an intrusion procedure for the information system, by using network configuration information indicating a network configuration of the information system and intrusion procedure information indicating an intrusion procedure assumed in intrusion into the information system. A tree comparison unit (103) compares the evaluation tree with the gold tree.
    Type: Application
    Filed: March 12, 2021
    Publication date: July 22, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Takumi YAMAMOTO, Ryosuke SHIMABE, Takeshi ASAI, Kiyoto KAWAUCHI
  • Publication number: 20210218769
    Abstract: A scenario generation device (100) generates an attack scenario (32). An attack means storage unit (130) has stored therein attack means data (131) including a precondition and an attack effect of attack means. An edit screen display unit (110) arranges attack means to be included in the attack scenario (32) on a scenario edit screen (200). By using the attack means data (131), an attack scenario generation unit (20) extracts, from the attack means storage unit (130), another attack means whose attack effect is a precondition of attack means arranged on the scenario edit screen (200). The attack scenario generation unit (20) generates the attack scenario (32) by complementing the attack means arranged on the scenario edit screen (200) with the other attack means.
    Type: Application
    Filed: March 29, 2021
    Publication date: July 15, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventor: Kiyoto KAWAUCHI
  • Publication number: 20210182405
    Abstract: A disclosed feature generation unit (110) collects information related to an assessment target whose security risk is to be assessed, as disclosure target information from disclosed information that has been disclosed, and generates disclosed feature information (F1) expressing a feature of the disclosure target information. An email feature generation unit (120) generates email feature information F2 expressing a feature of an assessment target email contained in an email box of the assessment target. An assessment unit (130) calculates a similarity degree between the disclosed feature information (F1) and the email feature information (F2). The assessment unit (130) outputs an assessment result 31 being a result of assessment on the security risk of the assessment target, based on the similarity degree.
    Type: Application
    Filed: February 4, 2021
    Publication date: June 17, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Hiroki NISHIKAWA, Kiyoto KAWAUCHI
  • Publication number: 20210168170
    Abstract: A combination identification unit (27) identifies combinations of one or more components which constitute a target system and in each of which an intrusion detection system that detects unauthorized access can be installed. A combination reduction unit (28) extracts, from the combinations identified by the combination identification unit, a combination that satisfies an installation condition accepted by an installation condition input unit (22) and can detect unauthorized communications indicated by attack information accepted by an attack information input unit (24) at a rate higher than or equal to a threshold.
    Type: Application
    Filed: September 30, 2020
    Publication date: June 3, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Takeshi ASAI, Kiyoto KAWAUCHI
  • Publication number: 20210157909
    Abstract: An acquisition unit (10) acquires normal sample data and non-normal sample data. A model generation unit (120) generates a normal model representing the normal sample data. A change unit (141) generates a non-normal feature vector of the non-normal sample data, and generates a non-normal changed vector obtained by changing an element of the non-normal feature vector. When the non-normal changed vector and the normal model are similar to each other, a verification unit (142) executes a process using sample data represented by the non-normal changed vector. The verification unit (142) verifies whether an anomalous event is detected by a detection device. Upon verification that an anomalous event is not detected, the verification unit (142) determines whether an anomalous event is present, independently of the detection device.
    Type: Application
    Filed: October 11, 2017
    Publication date: May 27, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Keisuke KITO, Tomonori NEGI, Kiyoto KAWAUCHI
  • Publication number: 20210136043
    Abstract: A state replication apparatus (200) generates communication, between a main apparatus (421) and each sub-apparatus (422, 423), to cause a state combination to transit in accordance with transition order specified in an acquisition scenario. The state replication apparatus records each of the communication generated between the main apparatus and the each sub-apparatus. The state replication apparatus acquires a snapshot combination at each of acquisition timings specified in the acquisition scenario. The state replication apparatus replicates each of the main apparatus and the each sub-apparatus in states of a replication state combination based on the acquired each snapshot combination and the recorded each communication.
    Type: Application
    Filed: October 6, 2017
    Publication date: May 6, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Keisuke KITO, Kiyoto KAWAUCHI, Takumi YAMAMOTO, Hiroki NISHIKAWA
  • Publication number: 20210092139
    Abstract: In an email inspection device (10), a learning unit (20) learns a relationship between a feature of each email included in a plurality of emails and a feature of a resource accompanying each email. The resource accompanying each email includes at least either one of a file attached to each email and a resource specified by a URL in a message body of each email. A determination unit (30) extracts a feature of an inspection-target email and a feature of a resource accompanying the inspection-target email, and determines whether or not the inspection-target email is a suspicious email depending on whether or not the relationship learned by the learning unit (20) exists between the extracted features.
    Type: Application
    Filed: September 14, 2017
    Publication date: March 25, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Hiroki NISHIKAWA, Takumi YAMAMOTO, Kiyoto KAWAUCHI
  • Publication number: 20210049322
    Abstract: In an input error detection device (100), a selection unit (108) selects a group of words that appear common to a system specification document (117) describing a specification of an information system in a natural language, and an analysis object document (116) describing at least either one of analysis device input information (111) being input information to an analysis device that analyzes the information system, and analysis device output information (112) being output information from the analysis device, in a natural language. A learning unit (109) learns a meaning of an individual word in each of the system specification document (117) and the analysis object document (116), wherein the individual word belongs to the group of words selected by the selection unit (108).
    Type: Application
    Filed: October 15, 2020
    Publication date: February 18, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Ryosuke SHIMABE, Takeshi ASAI, Kiyoto KAWAUCHI
  • Publication number: 20210021617
    Abstract: An operation unit (120) calculates a feature quantity of an object mail which is an email to be tested. Then, the operation unit acquires, based on the feature quantity of the object mail, a status identifier of the object mail from a status definition file. Then, the operation unit selects a mail thread which the object mail belongs to, from one mail thread or more as an object thread, and adds the status identifier of the object mail to a status group of the object thread. Then, the operation unit decides whether the status group, to which the status identifier of the object mail has been added, of the object thread complies with a detection rule. When the status group of the object thread complies with the detection rule, the operation unit produces an alert.
    Type: Application
    Filed: September 25, 2020
    Publication date: January 21, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Hiroki NISHIKAWA, Takumi YAMAMOTO, Kiyoto KAWAUCHI
  • Publication number: 20210021555
    Abstract: A fraudulent email decision device (10) is provided with a consistency analysis unit (24). The consistency analysis unit (24) identifies an intention of a subject email by, for example, a method of, with respect to a newly received incoming email as a subject email, extracting a function term, being a word expressing a reason the subject email was sent, from a body of the subject email. The consistency analysis unit (24) decides whether or not the subject email is a fraudulent email, from a relationship between another incoming email received in the past from the same sender as the sender of the subject email, and the identified intention of the subject email.
    Type: Application
    Filed: October 1, 2020
    Publication date: January 21, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Hiroki NISHIKAWA, Kiyoto KAWAUCHI
  • Publication number: 20210014262
    Abstract: If an attack activity that belongs to any of a plurality of phases of a cyber-attack is detected, a calculation unit calculates an occurrence interval of an attack scenario, using activity interval data. The activity interval data indicates each occurrence interval of one or more attack activities for each phase. The attack scenario is composed of one attack activity of a phase to which a detected attack activity belongs and one attack activity of each phase before the phase to which the detected attack activity belongs. A determination unit determines necessity or non-necessity of an alert, based on the occurrence interval of the attack scenario.
    Type: Application
    Filed: September 21, 2017
    Publication date: January 14, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Hideaki IJIRO, Kiyoto KAWAUCHI
  • Publication number: 20210010950
    Abstract: A correlation value calculation unit calculates a correlation value between input data input to an inspection-targeted apparatus whose internal specifications are unknown and output data for the input data from the inspection-targeted apparatus. A state transition determination unit analyzes in a time-series manner, a plurality of correlation values calculated by the correlation value calculation unit for a plurality of pieces of input data and a plurality of pieces of output data for the plurality of pieces of input data, and determines whether or not a state transition has occurred in the inspection-targeted apparatus.
    Type: Application
    Filed: September 28, 2020
    Publication date: January 14, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Keisuke KITO, Kiyoto KAWAUCHI, Takumi YAMAMOTO, Hiroki NISHIKAWA
  • Publication number: 20210006587
    Abstract: A people network detection unit (110) detects, based on public information of a target person, a people network that indicates a connection between the target person and a group of related persons. A disclosure risk calculation unit (120) calculates a disclosure risk of the target person based on the public information of the target person, and calculates a group of disclosure risks corresponding to the group of related persons based on a group of public information corresponding to the group of related persons. A connection risk determination unit (130) determines a representative value of the group of disclosure risks as a connection risk of the target person based on the group of disclosure risks corresponding to the group of related persons. A security risk calculation unit (140) calculates a security risk of the target person with respect to a cyberattack, using the disclosure risk of the target person and the connection risk of the target person.
    Type: Application
    Filed: September 22, 2020
    Publication date: January 7, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Hiroki NISHIKAWA, Kiyoto KAWAUCHI
  • Publication number: 20200401117
    Abstract: An apparatus for identifying a path pattern of devices that produces a defective product in a production line where a product is produced via a plurality of device is provided. The device is configured to estimate a path pattern quality indicating a quality of a group of products produced through a production path included in a path pattern, based on a production path quality and an association relationship between a path pattern and a production path indicating devices via which the product is produced and an order of passing through the devices; and to identify a path pattern suspected to be defective based on the estimated path pattern quality.
    Type: Application
    Filed: September 3, 2020
    Publication date: December 24, 2020
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Masashi TATEDOKO, Tsuyoshi HIGUCHI, Kiyoto KAWAUCHI, Takeshi YONEDA