Patents by Inventor Michiharu Kudoh
Michiharu Kudoh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11093847Abstract: A method including receiving designation of an input node for which a node value is generated from collected data, an option node to which a node value is arbitrarily provided, and an estimation target node to be a target of a node value estimation, in a graph including nodes and directional edges; and identifying a directional edge for which a conditional probability is to be acquired to measure the node value of the estimation target node, from among the directional edges, by traversing a directional edge that can propagate an effect to a node value from the estimation target node. The identifying includes, for the option node, traversing both a directional edge that can propagate an effect if a node value is provided to the option node and a directional edge that can propagate an effect if a node value is not provided to the option node.Type: GrantFiled: November 6, 2017Date of Patent: August 17, 2021Assignee: International Business Machines CorporationInventors: Takayuki Katsuki, Michiharu Kudoh, Hiroaki Nakamura
-
Patent number: 11023817Abstract: A method including receiving designation of an input node for which a node value is generated from collected data, an option node to which a node value is arbitrarily provided, and an estimation target node to be a target of a node value estimation, in a graph including nodes and directional edges; and identifying a directional edge for which a conditional probability is to be acquired to measure the node value of the estimation target node, from among the directional edges, by traversing a directional edge that can propagate an effect to a node value from the estimation target node. The identifying includes, for the option node, traversing both a directional edge that can propagate an effect if a node value is provided to the option node and a directional edge that can propagate an effect if a node value is not provided to the option node.Type: GrantFiled: April 20, 2017Date of Patent: June 1, 2021Assignee: International Business Machines CorporationInventors: Takayuki Katsuki, Michiharu Kudoh, Hiroaki Nakamura
-
Patent number: 10176436Abstract: A method and system are provided for estimating a skill level of a user regarding a software program executed by the user on a computer processing system. The software program has workbenches that each include commands corresponding thereto. The method includes creating at least one special command set for user skill level estimation by including the commands that exist in various ones of the workbenches and that are executed at least a predetermined percentage of times by the user and excluding the commands which are common to at least two of the workbenches. The method further includes creating partial command sequences from the commands in the at least one special command set. The method also includes determining frequent command execution patterns by applying pattern mining to the partial command sequences. The method additionally includes estimating the skill level of the user based on frequencies of the frequent command execution patterns.Type: GrantFiled: December 15, 2015Date of Patent: January 8, 2019Assignee: International Business Machines CorporationInventors: Michiharu Kudoh, Fumiko Satoh
-
Publication number: 20180307999Abstract: A method including receiving designation of an input node for which a node value is generated from collected data, an option node to which a node value is arbitrarily provided, and an estimation target node to be a target of a node value estimation, in a graph including nodes and directional edges; and identifying a directional edge for which a conditional probability is to be acquired to measure the node value of the estimation target node, from among the directional edges, by traversing a directional edge that can propagate an effect to a node value from the estimation target node. The identifying includes, for the option node, traversing both a directional edge that can propagate an effect if a node value is provided to the option node and a directional edge that can propagate an effect if a node value is not provided to the option node.Type: ApplicationFiled: November 6, 2017Publication date: October 25, 2018Inventors: Takayuki Katsuki, Michiharu Kudoh, Hiroaki Nakamura
-
Publication number: 20180307996Abstract: A method including receiving designation of an input node for which a node value is generated from collected data, an option node to which a node value is arbitrarily provided, and an estimation target node to be a target of a node value estimation, in a graph including nodes and directional edges; and identifying a directional edge for which a conditional probability is to be acquired to measure the node value of the estimation target node, from among the directional edges, by traversing a directional edge that can propagate an effect to a node value from the estimation target node. The identifying includes, for the option node, traversing both a directional edge that can propagate an effect if a node value is provided to the option node and a directional edge that can propagate an effect if a node value is not provided to the option node.Type: ApplicationFiled: April 20, 2017Publication date: October 25, 2018Inventors: Takayuki Katsuki, Michiharu Kudoh, Hiroaki Nakamura
-
Publication number: 20170185907Abstract: A method is known for identifying a cause and effect relationship between events of equipment by using a Bayesian network, but it has been difficult to comprehensively gather events relating to people. Additionally, there is no known method for estimating the time at which other events occur between two or more events. Provided is an information processing apparatus including a target information obtaining section that obtains known event information relating to at least one known event that has occurred for a target; an information processing apparatus that obtains statistical data relating to events; and an event information generating section that generates unknown event information relating to an unknown event of the target, based on the statistical data and the known event information.Type: ApplicationFiled: December 8, 2016Publication date: June 29, 2017Inventors: Michiharu Kudoh, Hiroaki Nakamura, Takayuki Osogami
-
Publication number: 20170168666Abstract: A method and system are provided for estimating a skill level of a user regarding a software program executed by the user on a computer processing system. The software program has workbenches that each include commands corresponding thereto. The method includes creating at least one special command set for user skill level estimation by including the commands that exist in various ones of the workbenches and that are executed at least a predetermined percentage of times by the user and excluding the commands which are common to at least two of the workbenches. The method further includes creating partial command sequences from the commands in the at least one special command set. The method also includes determining frequent command execution patterns by applying pattern mining to the partial command sequences. The method additionally includes estimating the skill level of the user based on frequencies of the frequent command execution patterns.Type: ApplicationFiled: December 15, 2015Publication date: June 15, 2017Inventors: Michiharu Kudoh, Fumiko Satoh
-
Patent number: 8811607Abstract: A method and system for generating contexts of targets to estimate a high-order context. The system includes: a detection device including: a sensor for detecting a target; module for extracting the target and a primary context of the target based on data detected by the sensor; and module for encrypting the primary context with a key corresponding to the target; a storage device for recording encrypted primary context from the detection device; and a processing device including: module for receiving the encrypted primary context from the storage device; module for receiving the key corresponding to the target involved in the encrypted primary context; module for decrypting the encrypted primary context using received key; and module for estimating a high-order context using the decrypted primary context; where the processing device further includes a module for requesting the detection device to delete information on a key corresponding to a specific target.Type: GrantFiled: August 30, 2012Date of Patent: August 19, 2014Assignee: International Business Machines CorporationInventor: Michiharu Kudoh
-
Patent number: 7792861Abstract: It is one object of the present invention to provide an access control system that employs an access control rule and that does not distinguish between data and the access control rule, so that the same flexible access control that is available for the data can also be provided for the access control rule. An access control system comprises: an access controller 200 for, in accordance with the access request, employing an access control rule defining an access right for the object to determine whether or not access to the object should be permitted; and an object storage unit 500 for storing a set of access control rules as objects equivalent to common data objects, wherein, upon the receipt of a request to access an access control rule, the access controller 200 determines whether or not access to the access control rule should be permitted.Type: GrantFiled: July 15, 2006Date of Patent: September 7, 2010Assignee: International Business Machines CorporationInventors: Michiharu Kudoh, Tomio Amano
-
Patent number: 7409390Abstract: The present invention provides access control methods, apparatus and systems that employ an access control rule and that does not distinguish between data and the access control rule, so that the same flexible access control that is available for the data can also be provided for the access control rule. In an example embodiment, an access control system comprises: an access controller for, in accordance with the access request, employing an access control rule defining an access right for the object to determine whether or not access to the object should be permitted; and an object storage unit for storing a set of access control rules as objects equivalent to common data objects, wherein, upon the receipt of a request to access an access control rule, the access controller determines whether or not access to the access control rule should be permitted.Type: GrantFiled: September 7, 2001Date of Patent: August 5, 2008Assignee: International Business Machines CorporationInventors: Michiharu Kudoh, Tomio Amano
-
Publication number: 20070179954Abstract: It is one object of the present invention to provide an access control system that employs an access control rule and that does not distinguish between data and the access control rule, so that the same flexible access control that is available for the data can also be provided for the access control rule. An access control system comprises: an access controller 200 for, in accordance with the access request, employing an access control rule defining an access right for the object to determine whether or not access to the object should be permitted; and an object storage unit 500 for storing a set of access control rules as objects equivalent to common data objects, wherein, upon the receipt of a request to access an access control rule, the access controller 200 determines whether or not access to the access control rule should be permitted.Type: ApplicationFiled: July 15, 2006Publication date: August 2, 2007Inventors: MICHIHARU KUDOH, TOMIO AMANO
-
Patent number: 6990585Abstract: The present invention provides digital signature techniques using an information terminal, such as a portable terminal, having limited calculation resources. In one embodiment, a signature demandant generates a document to be signed, and an agent receives this document. The agent generates summary text for this document, and transmits the summary text to a signatory, and the signatory displays the summary text using his or her information terminal. The signatory confirms the contents, employs a private key stored in his or her terminal to sign (encrypt) the summary text. The signatory thereafter transmits a signature value to the agent, who generates a signed document that includes the signature value. Finally, the signature demandant verifies (decrypts) the received signed document using the public key of the signatory and confirms the contents.Type: GrantFiled: August 15, 2001Date of Patent: January 24, 2006Assignee: International Business Machines CorporationInventors: Hiroshi Maruyama, Michiharu Kudoh, Kento Tamura
-
Patent number: 6647388Abstract: It is one object of the present invention to use an access control process to evaluate under a specific condition an access permission request. An access control system 100 comprises a resource document 40 in which a policy description is stored; a policy evaluation module 10 for receiving an external request 110 for accessing the data file, for extracting, from the resource document 40, the policy description that is associated with target data for the access request 110, and for evaluating the policy description to determine whether or not the access request 110 is to be permitted; an enforcement function verification module 20 for, when an existing condition can not be evaluated using only the information included in the policy evaluation module 10, determining whether the condition can be evaluated or can be established; and an enforcement module 30 for evaluating or establishing the condition that, in accordance with the enforcement function verification module 20, can be evaluated or established.Type: GrantFiled: December 15, 2000Date of Patent: November 11, 2003Assignee: International Business Machines CorporationInventors: Masayuki Numao, Michiharu Kudoh, Tomio Amano
-
Publication number: 20020077803Abstract: The present invention provides access control methods, apparatus and systems that employ an access control rule and that does not distinguish between data and the access control rule, so that the same flexible access control that is available for the data can also be provided for the access control rule. In an example embodiment, an access control system comprises: an access controller for, in accordance with the access request, employing an access control rule defining an access right for the object to determine whether or not access to the object should be permitted; and an object storage unit for storing a set of access control rules as objects equivalent to common data objects, wherein, upon the receipt of a request to access an access control rule, the access controller determines whether or not access to the access control rule should be permitted.Type: ApplicationFiled: September 7, 2001Publication date: June 20, 2002Inventors: Michiharu Kudoh, Tomio Amano
-
Publication number: 20010023421Abstract: It is one object of the present invention to use an access control process to evaluate under a specific condition an access permission request.Type: ApplicationFiled: December 15, 2000Publication date: September 20, 2001Applicant: International Business Machines CorporationInventors: Masayuki Numao, Michiharu Kudoh, Tomio Amano