Patents by Inventor Moriyoshi Ohara

Moriyoshi Ohara has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11947660
    Abstract: Securing pods in a container orchestration environment is provided. A container runtime interface command is verified to perform an orchestration action on a set of containers comprising an application workload that corresponds to a service based on matching the container runtime interface command to a rule contained in a trusted execution environment contract included in a pod sandbox virtual machine of a trusted execution environment. It is determined whether the container runtime interface command to perform the orchestration action on the set of containers is valid based finding a matching rule in the trusted execution environment contract. In response to determining that the container runtime interface command to perform the orchestration action on the set of containers is valid, the container runtime interface command is executed to perform the orchestration action on the set of containers in the pod sandbox virtual machine of the trusted execution environment.
    Type: Grant
    Filed: August 31, 2021
    Date of Patent: April 2, 2024
    Assignee: International Business Machines Corporation
    Inventors: James Robert Magowan, Angel Nunez Mencias, Stefan Liesche, Moriyoshi Ohara
  • Publication number: 20240078539
    Abstract: A computer-implemented method, in accordance with one embodiment, includes receiving, at an offline input bridge module, a transaction order and a corresponding cryptogram. The transaction order and the cryptogram are transferred from the input bridge module to a disconnected vault module. The input bridge module is discarded in response to the transfer of the transaction order and cryptogram. The transaction order is converted to an unsigned transaction, using the disconnected vault module. The unsigned transaction and cryptogram are transferred to an offline hardware security module. A seed is unwrapped from the cryptogram, using the hardware security module. A key for signing the transaction is generated, using the hardware security module. The signed transaction is transferred to an offline output bridge module, and from the output bridge module to an online module. The output bridge module is discarded in response to the transfer of the signed transaction and the cryptogram therefrom.
    Type: Application
    Filed: September 7, 2022
    Publication date: March 7, 2024
    Inventors: Takuya Nakaike, Moriyoshi Ohara, Peter James DeMeo, Angel Nunez Mencias
  • Publication number: 20230091686
    Abstract: An example operation may include one or more of storing one or more public keys of one or more policy services, receiving, via a signing service, a blockchain transaction that has content that has been verified by a policy service and includes a signature created by a private key of the policy service, verifying, via a hardware security module (HSM), the signature of the policy service based on a public key of the policy service from among the one or more public keys, and in response to a verification of the signature of the policy service, signing, via the HSM, the blockchain transaction using a wallet key of a user of the blockchain transaction.
    Type: Application
    Filed: September 21, 2021
    Publication date: March 23, 2023
    Inventors: TAKUYA NAKAIKE, Moriyoshi Ohara, Christopher S. Smith, Angel Nunez Mencias, Peter James De Meo
  • Publication number: 20230068221
    Abstract: Securing pods in a container orchestration environment is provided. A container runtime interface command is verified to perform an orchestration action on a set of containers comprising an application workload that corresponds to a service based on matching the container runtime interface command to a rule contained in a trusted execution environment contract included in a pod sandbox virtual machine of a trusted execution environment. It is determined whether the container runtime interface command to perform the orchestration action on the set of containers is valid based finding a matching rule in the trusted execution environment contract. In response to determining that the container runtime interface command to perform the orchestration action on the set of containers is valid, the container runtime interface command is executed to perform the orchestration action on the set of containers in the pod sandbox virtual machine of the trusted execution environment.
    Type: Application
    Filed: August 31, 2021
    Publication date: March 2, 2023
    Inventors: James Robert Magowan, Angel Nunez Mencias, Stefan Liesche, Moriyoshi Ohara
  • Patent number: 11030069
    Abstract: A computer-implemented scaling method, an apparatus, and a computer program product for detecting whether a performance of a system reaches a target performance are provided. The method includes scaling a layered software environment, including scaling a first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance and scaling a second layer software environment that is above the first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance despite the first layer software environment being scaled. The method also includes scaling hardware resources used for executing the layered software environment in the system in response to the performance of the system not reaching the target performance before scaling of the first layer software environment or after scaling of the second layer software environment.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: June 8, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takuya Nakaike, Moriyoshi Ohara, Takanori Ueda
  • Patent number: 11029924
    Abstract: A method includes identifying a code portion that accesses a primitive value in a user-defined function included in a user program, converting the code portion and an argument in a manner to directly reference an internal data representation of the user program, and generating a code for calling the user-defined function converted by the conversion.
    Type: Grant
    Filed: November 18, 2019
    Date of Patent: June 8, 2021
    Assignee: International Business Machines Corporation
    Inventors: Hiroshi Inoue, Kazuaki Ishizaki, Jan M. Wroblewski, Moriyoshi Ohara
  • Patent number: 11023348
    Abstract: A computer-implemented scaling method, an apparatus, and a computer program product for detecting whether a performance of a system reaches a target performance are provided. The method includes scaling a layered software environment, including scaling a first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance and scaling a second layer software environment that is above the first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance despite the first layer software environment being scaled. The method also includes scaling hardware resources used for executing the layered software environment in the system in response to the performance of the system not reaching the target performance before scaling of the first layer software environment or after scaling of the second layer software environment.
    Type: Grant
    Filed: November 2, 2017
    Date of Patent: June 1, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takuya Nakaike, Moriyoshi Ohara, Takanori Ueda
  • Patent number: 10970055
    Abstract: A method is provided for building calling context trees of an application to identify a thread or a device affecting a throughput of a transaction relating to the application. The method obtains profiles of call stacks of multiple threads. The method obtains wake-up profiles which are the call stacks of a notifier thread and a waiter thread, from among the multiple threads, in a case that the waiter thread leaves from a sleep state. The method builds the calling context trees to indicate transitions of methods tracing callee relations and wake-up relations based on the profiles of the call stacks and the wake-up profiles, wherein each method is represented by a node having an average thread number. The method extracts and displays tree portions which are transitively reachable from a calling context tree for the transaction and which include the thread or device affecting throughput.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: April 6, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tatsushi Inagaki, Yohei Ueda, Moriyoshi Ohara, Yu Chin Fabian Lim, Chun Hui Suen, Venkatraman Ramakrishna, Takuya Nakaike
  • Patent number: 10599498
    Abstract: A computer-implemented method is provided for processing requests among microservices in a computer network. The method includes generating, by a processor, a method to return a body of a response from an Application Programming Interface (API) that aggregates the requests among the microservices to form aggregated requests. The method further includes generating, by the processor, another API that automatically receives the aggregated requests from the API by receiving an array of parameters of the original API and calling the method using each of the parameters of the array as a call parameter for the method. The method also includes optimizing, by the processor, a number of aggregated requests in a network layer of the computer network based on a wait time and a response time to receive and transfer requests between micro services.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: March 24, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takuya Nakaike, Moriyoshi Ohara
  • Publication number: 20200089477
    Abstract: A method includes identifying a code portion that accesses a primitive value in a user-defined function included in a user program, converting the code portion and an argument in a manner to directly reference an internal data representation of the user program, and generating a code for calling the user-defined function converted by the conversion.
    Type: Application
    Filed: November 18, 2019
    Publication date: March 19, 2020
    Inventors: Hiroshi Inoue, Kazuaki Ishizaki, Jan M. Wroblewski, Moriyoshi Ohara
  • Patent number: 10585647
    Abstract: A method includes identifying a code portion that accesses a primitive value in a user-defined function included in a user program, converting the code portion and an argument in a manner to directly reference an internal data representation of the user program, and generating a code for calling the user-defined function converted by the conversion.
    Type: Grant
    Filed: May 2, 2017
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Hiroshi Inoue, Kazuaki Ishizaki, Jan M. Wroblewski, Moriyoshi Ohara
  • Publication number: 20200065077
    Abstract: A method is provided for building calling context trees of an application to identify a thread or a device affecting a throughput of a transaction relating to the application. The method obtains profiles of call stacks of multiple threads. The method obtains wake-up profiles which are the call stacks of a notifier thread and a waiter thread, from among the multiple threads, in a case that the waiter thread leaves from a sleep state. The method builds the calling context trees to indicate transitions of methods tracing callee relations and wake-up relations based on the profiles of the call stacks and the wake-up profiles, wherein each method is represented by a node having an average thread number. The method extracts and displays tree portions which are transitively reachable from a calling context tree for the transaction and which include the thread or device affecting throughput.
    Type: Application
    Filed: August 21, 2018
    Publication date: February 27, 2020
    Inventors: Tatsushi Inagaki, Yohei Ueda, Moriyoshi Ohara, Yu Chin Fabian Lim, Chun Hui Suen, Venkatraman Ramakrishna, Takuya Nakaike
  • Patent number: 10268463
    Abstract: Methods and systems for optimizing an application include optimizing, with a processor on a first device, an application for a second device in accordance with an application execution profile received from the second device to generate a binary for the application that is optimized for use indicated by the application execution profile. The optimized binary is set to be a default application binary, to be sent to devices requesting the application for a first time, if a percentage of matching application profiles exceeds a threshold. The optimized binary for the application is transmitted to the second device.
    Type: Grant
    Filed: February 2, 2017
    Date of Patent: April 23, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kiyokuni Kawachiya, Kazuaki Ishizaki, Moriyoshi Ohara, Mikio Takeuchi
  • Publication number: 20190079847
    Abstract: A computer-implemented scaling method, an apparatus, and a computer program product for detecting whether a performance of a system reaches a target performance are provided. The method includes scaling a layered software environment, including scaling a first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance and scaling a second layer software environment that is above the first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance despite the first layer software environment being scaled. The method also includes scaling hardware resources used for executing the layered software environment in the system in response to the performance of the system not reaching the target performance before scaling of the first layer software environment or after scaling of the second layer software environment.
    Type: Application
    Filed: November 2, 2017
    Publication date: March 14, 2019
    Inventors: Takuya Nakaike, Moriyoshi Ohara, Takanori Ueda
  • Publication number: 20190079845
    Abstract: A computer-implemented scaling method, an apparatus, and a computer program product for detecting whether a performance of a system reaches a target performance are provided. The method includes scaling a layered software environment, including scaling a first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance and scaling a second layer software environment that is above the first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance despite the first layer software environment being scaled. The method also includes scaling hardware resources used for executing the layered software environment in the system in response to the performance of the system not reaching the target performance before scaling of the first layer software environment or after scaling of the second layer software environment.
    Type: Application
    Filed: September 8, 2017
    Publication date: March 14, 2019
    Inventors: Takuya Nakaike, Moriyoshi Ohara, Takanori Ueda
  • Publication number: 20180365088
    Abstract: A computer-implemented method is provided for processing requests among microservices in a computer network. The method includes generating, by a processor, a method to return a body of a response from an Application Programming Interface (API) that aggregates the requests among the microservices to form aggregated requests. The method further includes generating, by the processor, another API that automatically receives the aggregated requests from the API by receiving an array of parameters of the original API and calling the method using each of the parameters of the array as a call parameter for the method. The method also includes optimizing, by the processor, a number of aggregated requests in a network layer of the computer network based on a wait time and a response time to receive and transfer requests between micro services.
    Type: Application
    Filed: November 14, 2017
    Publication date: December 20, 2018
    Inventors: Takuya Nakaike, Moriyoshi Ohara
  • Publication number: 20180365087
    Abstract: A computer-implemented method is provided for processing requests among microservices in a computer network. The method includes generating, by a processor, a method to return a body of a response from an Application Programming Interface (API) that aggregates the requests among the microservices to form aggregated requests. The method further includes generating, by the processor, another API that automatically receives the aggregated requests from the API by receiving an array of parameters of the original API and calling the method using each of the parameters of the array as a call parameter for the method. The method also includes optimizing, by the processor, a number of aggregated requests in a network layer of the computer network based on a wait time and a response time to receive and transfer requests between micro services.
    Type: Application
    Filed: June 15, 2017
    Publication date: December 20, 2018
    Inventors: Takuya Nakaike, Moriyoshi Ohara
  • Publication number: 20180321916
    Abstract: A method includes identifying a code portion that accesses a primitive value in a user-defined function included in a user program, converting the code portion and an argument in a manner to directly reference an internal data representation of the user program, and generating a code for calling the user-defined function converted by the conversion.
    Type: Application
    Filed: May 2, 2017
    Publication date: November 8, 2018
    Inventors: Hiroshi Inoue, Kazuaki Ishizaki, Jan M. Wroblewski, Moriyoshi Ohara
  • Publication number: 20170147305
    Abstract: Methods and systems for optimizing an application include optimizing, with a processor on a first device, an application for a second device in accordance with an application execution profile received from the second device to generate a binary for the application that is optimized for use indicated by the application execution profile. The optimized binary is set to be a default application binary, to be sent to devices requesting the application for a first time, if a percentage of matching application profiles exceeds a threshold. The optimized binary for the application is transmitted to the second device.
    Type: Application
    Filed: February 2, 2017
    Publication date: May 25, 2017
    Inventors: Kiyokuni Kawachiya, Kazuaki Ishizaki, Moriyoshi Ohara, Mikio Takeuchi
  • Patent number: 9612810
    Abstract: Methods and systems for optimizing an application include optimizing, with a processor on a first device, an application for a second device in accordance with an application execution profile received from the second device to generate a binary for the application that is optimized for use indicated by the application execution profile. The optimized binary is transmitted to the second device.
    Type: Grant
    Filed: August 25, 2015
    Date of Patent: April 4, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kiyokuni Kawachiya, Kazuaki Ishizaki, Moriyoshi Ohara, Mikio Takeuchi