Patents by Inventor Masaya Yamagata

Masaya Yamagata has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130195112
    Abstract: Authentication apparatus authenticates user using host connected to forwarding node. Policy management apparatus holds access control policy for identifying host under access control using identifier of forwarding node or identifier of user, and links identifier of host under access control and identifier of forwarding node to which host is connected, or identifier of host under access control and identifier of user using host. Forwarding node transmits to policy management apparatus identifier of host connected to own forwarding node and identifier of own forwarding node. Authentication apparatus transmits to policy management apparatus identifier of host connected to forwarding node and identifier of user. Policy management apparatus refers to access control policy and, if host connected to forwarding node is under access control, notifies content of access control to control apparatus as access control list.
    Type: Application
    Filed: September 14, 2012
    Publication date: August 1, 2013
    Applicant: NEC CORPORATION
    Inventors: Yoichiro Morita, Masayuki Nakae, Masaya Yamagata, Takayuki Sasaki, Hideyuki Shimonishi, Kentaro Sonoda, Yoichi Hatano
  • Publication number: 20130148500
    Abstract: A terminal communicating via a network including a forwarding device(s) for forwarding a packet and a control device for controlling the forwarding device(s) in accordance with a request from the forwarding device, includes: a communication unit that receives a processing rule specifying a process of adding, to a packet, quality information related to communication quality with respect to the terminal, from the control device, a memory unit that stores the received processing rule, and a processing unit that in a case of communicating via the network, adds quality information to a packet in accordance with a processing rule that corresponds to the packet by referring to the processing rule stored in the memory unit.
    Type: Application
    Filed: April 16, 2012
    Publication date: June 13, 2013
    Inventors: Kentaro Sonoda, Hideyuki Shimonishi, Masayuki Nakae, Masaya Yamagata, Yoichiro Morita
  • Patent number: 7958549
    Abstract: An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source.
    Type: Grant
    Filed: July 25, 2007
    Date of Patent: June 7, 2011
    Assignee: NEC Corporation
    Inventors: Masayuki Nakae, Masaya Yamagata
  • Patent number: 7464407
    Abstract: An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source.
    Type: Grant
    Filed: August 20, 2003
    Date of Patent: December 9, 2008
    Assignee: NEC Corporation
    Inventors: Masayuki Nakae, Masaya Yamagata
  • Publication number: 20080282339
    Abstract: An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source.
    Type: Application
    Filed: July 25, 2007
    Publication date: November 13, 2008
    Applicant: NEC CORPORATION
    Inventors: Masayuki NAKAE, Masaya YAMAGATA
  • Publication number: 20080172739
    Abstract: An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source.
    Type: Application
    Filed: July 25, 2007
    Publication date: July 17, 2008
    Applicant: NEC CORPORATION
    Inventors: Masayuki NAKAE, Masaya YAMAGATA
  • Publication number: 20040172557
    Abstract: An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source.
    Type: Application
    Filed: August 20, 2003
    Publication date: September 2, 2004
    Inventors: Masayuki Nakae, Masaya Yamagata