Patents by Inventor Moriyoshi Ohara
Moriyoshi Ohara has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11947660Abstract: Securing pods in a container orchestration environment is provided. A container runtime interface command is verified to perform an orchestration action on a set of containers comprising an application workload that corresponds to a service based on matching the container runtime interface command to a rule contained in a trusted execution environment contract included in a pod sandbox virtual machine of a trusted execution environment. It is determined whether the container runtime interface command to perform the orchestration action on the set of containers is valid based finding a matching rule in the trusted execution environment contract. In response to determining that the container runtime interface command to perform the orchestration action on the set of containers is valid, the container runtime interface command is executed to perform the orchestration action on the set of containers in the pod sandbox virtual machine of the trusted execution environment.Type: GrantFiled: August 31, 2021Date of Patent: April 2, 2024Assignee: International Business Machines CorporationInventors: James Robert Magowan, Angel Nunez Mencias, Stefan Liesche, Moriyoshi Ohara
-
Publication number: 20240078539Abstract: A computer-implemented method, in accordance with one embodiment, includes receiving, at an offline input bridge module, a transaction order and a corresponding cryptogram. The transaction order and the cryptogram are transferred from the input bridge module to a disconnected vault module. The input bridge module is discarded in response to the transfer of the transaction order and cryptogram. The transaction order is converted to an unsigned transaction, using the disconnected vault module. The unsigned transaction and cryptogram are transferred to an offline hardware security module. A seed is unwrapped from the cryptogram, using the hardware security module. A key for signing the transaction is generated, using the hardware security module. The signed transaction is transferred to an offline output bridge module, and from the output bridge module to an online module. The output bridge module is discarded in response to the transfer of the signed transaction and the cryptogram therefrom.Type: ApplicationFiled: September 7, 2022Publication date: March 7, 2024Inventors: Takuya Nakaike, Moriyoshi Ohara, Peter James DeMeo, Angel Nunez Mencias
-
Publication number: 20230091686Abstract: An example operation may include one or more of storing one or more public keys of one or more policy services, receiving, via a signing service, a blockchain transaction that has content that has been verified by a policy service and includes a signature created by a private key of the policy service, verifying, via a hardware security module (HSM), the signature of the policy service based on a public key of the policy service from among the one or more public keys, and in response to a verification of the signature of the policy service, signing, via the HSM, the blockchain transaction using a wallet key of a user of the blockchain transaction.Type: ApplicationFiled: September 21, 2021Publication date: March 23, 2023Inventors: TAKUYA NAKAIKE, Moriyoshi Ohara, Christopher S. Smith, Angel Nunez Mencias, Peter James De Meo
-
Publication number: 20230068221Abstract: Securing pods in a container orchestration environment is provided. A container runtime interface command is verified to perform an orchestration action on a set of containers comprising an application workload that corresponds to a service based on matching the container runtime interface command to a rule contained in a trusted execution environment contract included in a pod sandbox virtual machine of a trusted execution environment. It is determined whether the container runtime interface command to perform the orchestration action on the set of containers is valid based finding a matching rule in the trusted execution environment contract. In response to determining that the container runtime interface command to perform the orchestration action on the set of containers is valid, the container runtime interface command is executed to perform the orchestration action on the set of containers in the pod sandbox virtual machine of the trusted execution environment.Type: ApplicationFiled: August 31, 2021Publication date: March 2, 2023Inventors: James Robert Magowan, Angel Nunez Mencias, Stefan Liesche, Moriyoshi Ohara
-
Patent number: 11030069Abstract: A computer-implemented scaling method, an apparatus, and a computer program product for detecting whether a performance of a system reaches a target performance are provided. The method includes scaling a layered software environment, including scaling a first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance and scaling a second layer software environment that is above the first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance despite the first layer software environment being scaled. The method also includes scaling hardware resources used for executing the layered software environment in the system in response to the performance of the system not reaching the target performance before scaling of the first layer software environment or after scaling of the second layer software environment.Type: GrantFiled: September 8, 2017Date of Patent: June 8, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Takuya Nakaike, Moriyoshi Ohara, Takanori Ueda
-
Program optimization by converting code portions to directly reference internal data representations
Patent number: 11029924Abstract: A method includes identifying a code portion that accesses a primitive value in a user-defined function included in a user program, converting the code portion and an argument in a manner to directly reference an internal data representation of the user program, and generating a code for calling the user-defined function converted by the conversion.Type: GrantFiled: November 18, 2019Date of Patent: June 8, 2021Assignee: International Business Machines CorporationInventors: Hiroshi Inoue, Kazuaki Ishizaki, Jan M. Wroblewski, Moriyoshi Ohara -
Patent number: 11023348Abstract: A computer-implemented scaling method, an apparatus, and a computer program product for detecting whether a performance of a system reaches a target performance are provided. The method includes scaling a layered software environment, including scaling a first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance and scaling a second layer software environment that is above the first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance despite the first layer software environment being scaled. The method also includes scaling hardware resources used for executing the layered software environment in the system in response to the performance of the system not reaching the target performance before scaling of the first layer software environment or after scaling of the second layer software environment.Type: GrantFiled: November 2, 2017Date of Patent: June 1, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Takuya Nakaike, Moriyoshi Ohara, Takanori Ueda
-
Patent number: 10970055Abstract: A method is provided for building calling context trees of an application to identify a thread or a device affecting a throughput of a transaction relating to the application. The method obtains profiles of call stacks of multiple threads. The method obtains wake-up profiles which are the call stacks of a notifier thread and a waiter thread, from among the multiple threads, in a case that the waiter thread leaves from a sleep state. The method builds the calling context trees to indicate transitions of methods tracing callee relations and wake-up relations based on the profiles of the call stacks and the wake-up profiles, wherein each method is represented by a node having an average thread number. The method extracts and displays tree portions which are transitively reachable from a calling context tree for the transaction and which include the thread or device affecting throughput.Type: GrantFiled: August 21, 2018Date of Patent: April 6, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tatsushi Inagaki, Yohei Ueda, Moriyoshi Ohara, Yu Chin Fabian Lim, Chun Hui Suen, Venkatraman Ramakrishna, Takuya Nakaike
-
Patent number: 10599498Abstract: A computer-implemented method is provided for processing requests among microservices in a computer network. The method includes generating, by a processor, a method to return a body of a response from an Application Programming Interface (API) that aggregates the requests among the microservices to form aggregated requests. The method further includes generating, by the processor, another API that automatically receives the aggregated requests from the API by receiving an array of parameters of the original API and calling the method using each of the parameters of the array as a call parameter for the method. The method also includes optimizing, by the processor, a number of aggregated requests in a network layer of the computer network based on a wait time and a response time to receive and transfer requests between micro services.Type: GrantFiled: November 14, 2017Date of Patent: March 24, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Takuya Nakaike, Moriyoshi Ohara
-
PROGRAM OPTIMIZATION BY CONVERTING CODE PORTIONS TO DIRECTLY REFERENCE INTERNAL DATA REPRESENTATIONS
Publication number: 20200089477Abstract: A method includes identifying a code portion that accesses a primitive value in a user-defined function included in a user program, converting the code portion and an argument in a manner to directly reference an internal data representation of the user program, and generating a code for calling the user-defined function converted by the conversion.Type: ApplicationFiled: November 18, 2019Publication date: March 19, 2020Inventors: Hiroshi Inoue, Kazuaki Ishizaki, Jan M. Wroblewski, Moriyoshi Ohara -
Program optimization by converting code portions to directly reference internal data representations
Patent number: 10585647Abstract: A method includes identifying a code portion that accesses a primitive value in a user-defined function included in a user program, converting the code portion and an argument in a manner to directly reference an internal data representation of the user program, and generating a code for calling the user-defined function converted by the conversion.Type: GrantFiled: May 2, 2017Date of Patent: March 10, 2020Assignee: International Business Machines CorporationInventors: Hiroshi Inoue, Kazuaki Ishizaki, Jan M. Wroblewski, Moriyoshi Ohara -
Publication number: 20200065077Abstract: A method is provided for building calling context trees of an application to identify a thread or a device affecting a throughput of a transaction relating to the application. The method obtains profiles of call stacks of multiple threads. The method obtains wake-up profiles which are the call stacks of a notifier thread and a waiter thread, from among the multiple threads, in a case that the waiter thread leaves from a sleep state. The method builds the calling context trees to indicate transitions of methods tracing callee relations and wake-up relations based on the profiles of the call stacks and the wake-up profiles, wherein each method is represented by a node having an average thread number. The method extracts and displays tree portions which are transitively reachable from a calling context tree for the transaction and which include the thread or device affecting throughput.Type: ApplicationFiled: August 21, 2018Publication date: February 27, 2020Inventors: Tatsushi Inagaki, Yohei Ueda, Moriyoshi Ohara, Yu Chin Fabian Lim, Chun Hui Suen, Venkatraman Ramakrishna, Takuya Nakaike
-
Patent number: 10268463Abstract: Methods and systems for optimizing an application include optimizing, with a processor on a first device, an application for a second device in accordance with an application execution profile received from the second device to generate a binary for the application that is optimized for use indicated by the application execution profile. The optimized binary is set to be a default application binary, to be sent to devices requesting the application for a first time, if a percentage of matching application profiles exceeds a threshold. The optimized binary for the application is transmitted to the second device.Type: GrantFiled: February 2, 2017Date of Patent: April 23, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kiyokuni Kawachiya, Kazuaki Ishizaki, Moriyoshi Ohara, Mikio Takeuchi
-
Publication number: 20190079847Abstract: A computer-implemented scaling method, an apparatus, and a computer program product for detecting whether a performance of a system reaches a target performance are provided. The method includes scaling a layered software environment, including scaling a first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance and scaling a second layer software environment that is above the first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance despite the first layer software environment being scaled. The method also includes scaling hardware resources used for executing the layered software environment in the system in response to the performance of the system not reaching the target performance before scaling of the first layer software environment or after scaling of the second layer software environment.Type: ApplicationFiled: November 2, 2017Publication date: March 14, 2019Inventors: Takuya Nakaike, Moriyoshi Ohara, Takanori Ueda
-
Publication number: 20190079845Abstract: A computer-implemented scaling method, an apparatus, and a computer program product for detecting whether a performance of a system reaches a target performance are provided. The method includes scaling a layered software environment, including scaling a first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance and scaling a second layer software environment that is above the first layer software environment in the layered software environment in response to the performance of the system not reaching the target performance despite the first layer software environment being scaled. The method also includes scaling hardware resources used for executing the layered software environment in the system in response to the performance of the system not reaching the target performance before scaling of the first layer software environment or after scaling of the second layer software environment.Type: ApplicationFiled: September 8, 2017Publication date: March 14, 2019Inventors: Takuya Nakaike, Moriyoshi Ohara, Takanori Ueda
-
Publication number: 20180365088Abstract: A computer-implemented method is provided for processing requests among microservices in a computer network. The method includes generating, by a processor, a method to return a body of a response from an Application Programming Interface (API) that aggregates the requests among the microservices to form aggregated requests. The method further includes generating, by the processor, another API that automatically receives the aggregated requests from the API by receiving an array of parameters of the original API and calling the method using each of the parameters of the array as a call parameter for the method. The method also includes optimizing, by the processor, a number of aggregated requests in a network layer of the computer network based on a wait time and a response time to receive and transfer requests between micro services.Type: ApplicationFiled: November 14, 2017Publication date: December 20, 2018Inventors: Takuya Nakaike, Moriyoshi Ohara
-
Publication number: 20180365087Abstract: A computer-implemented method is provided for processing requests among microservices in a computer network. The method includes generating, by a processor, a method to return a body of a response from an Application Programming Interface (API) that aggregates the requests among the microservices to form aggregated requests. The method further includes generating, by the processor, another API that automatically receives the aggregated requests from the API by receiving an array of parameters of the original API and calling the method using each of the parameters of the array as a call parameter for the method. The method also includes optimizing, by the processor, a number of aggregated requests in a network layer of the computer network based on a wait time and a response time to receive and transfer requests between micro services.Type: ApplicationFiled: June 15, 2017Publication date: December 20, 2018Inventors: Takuya Nakaike, Moriyoshi Ohara
-
Publication number: 20180321916Abstract: A method includes identifying a code portion that accesses a primitive value in a user-defined function included in a user program, converting the code portion and an argument in a manner to directly reference an internal data representation of the user program, and generating a code for calling the user-defined function converted by the conversion.Type: ApplicationFiled: May 2, 2017Publication date: November 8, 2018Inventors: Hiroshi Inoue, Kazuaki Ishizaki, Jan M. Wroblewski, Moriyoshi Ohara
-
Publication number: 20170147305Abstract: Methods and systems for optimizing an application include optimizing, with a processor on a first device, an application for a second device in accordance with an application execution profile received from the second device to generate a binary for the application that is optimized for use indicated by the application execution profile. The optimized binary is set to be a default application binary, to be sent to devices requesting the application for a first time, if a percentage of matching application profiles exceeds a threshold. The optimized binary for the application is transmitted to the second device.Type: ApplicationFiled: February 2, 2017Publication date: May 25, 2017Inventors: Kiyokuni Kawachiya, Kazuaki Ishizaki, Moriyoshi Ohara, Mikio Takeuchi
-
Patent number: 9612810Abstract: Methods and systems for optimizing an application include optimizing, with a processor on a first device, an application for a second device in accordance with an application execution profile received from the second device to generate a binary for the application that is optimized for use indicated by the application execution profile. The optimized binary is transmitted to the second device.Type: GrantFiled: August 25, 2015Date of Patent: April 4, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kiyokuni Kawachiya, Kazuaki Ishizaki, Moriyoshi Ohara, Mikio Takeuchi