Patents by Inventor Sachiko Yoshihama
Sachiko Yoshihama has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8528104Abstract: A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a volatile storage unit 24 for reading and storing a counter array out of an external nonvolatile storage unit storing the counter array, in which the counter array is obtained by coupling a hash value generated for each signature key with a signature number counter for counting the number of signatures performed by use of the signature key, and a hash function unit 28 for reading the counter array out of the volatile storage unit 24, generating the hash value, and transferring the hash value to the validity check unit for a validity check.Type: GrantFiled: April 14, 2011Date of Patent: September 3, 2013Assignee: International Business Machines CorporationInventors: Hiroshi Maruyama, Seiji Munetoh, Sachiko Yoshihama
-
Publication number: 20120331562Abstract: Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether the block is confidential. The document data set is dividable into blocks each being a unit including properties evaluated as having a certain characteristic. A document data set targeted for the confidentiality determination is acquired, and it is determined whether a document data set, including a block similar to each block of the acquired document data set, is stored. If the document data set including the similar block is stored, it is determined whether the confidentiality information indicating that the block is confidential is assigned to the block of the acquired document data corresponding to the similar block. If the confidentiality information indicating that the block is confidential is assigned, the acquired document data set is determined as confidential.Type: ApplicationFiled: September 5, 2012Publication date: December 27, 2012Applicant: International Business Machines CorporationInventors: Takuya Mishina, Masayoshi Teraguchi, Sachiko Yoshihama
-
Patent number: 8307451Abstract: Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether the block is confidential. The document data set is dividable into blocks each being a unit including properties evaluated as having a certain characteristic. A document data set targeted for the confidentiality determination is acquired, and it is determined whether a document data set, including a block similar to each block of the acquired document data set, is stored. If the document data set including the similar block is stored, it is determined whether the confidentiality information indicating that the block is confidential is assigned to the block of the acquired document data corresponding to the similar block. If the confidentiality information indicating that the block is confidential is assigned, the acquired document data set is determined as confidential.Type: GrantFiled: February 22, 2010Date of Patent: November 6, 2012Assignee: International Business Machines CorporationInventors: Takuya Mishina, Masayoshi Teraguchi, Sachiko Yoshihama
-
Patent number: 8296722Abstract: A transformation tree for an object model (OM) is defined. The transformation tree has nodes interconnected by edges, where each node is connected to at most one other tree node. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. A transformation graph for the OM is constructed by simulating the transformation tree. The transformation graph has nodes interconnected by edges, and is a directed graph in which each node is connected to one or more other nodes. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. Crawling-oriented actions are performed in relation to the OM by being performed in relation to the transformation graph.Type: GrantFiled: October 6, 2008Date of Patent: October 23, 2012Assignee: International Business Machines CorporationInventors: Sachiko Yoshihama, Shinya Kawanaka, Takaaki Tateishi, Ory Segal, Adi Sharabani, Marco Pistoia, Guy Podjarny
-
Publication number: 20120254850Abstract: A method and an inspection apparatus for inspecting an information processing unit to which software update is applied. The apparatus includes a collection component configured to collect the behavior, for a plurality of times of software update, of the information processing unit to which one software update is applied. The apparatus also includes a determination component configured to compare the behavior collected for the plurality of times of software update to one another to determine whether the behavior of the information processing unit after the one software update is applied thereto is normal.Type: ApplicationFiled: March 30, 2012Publication date: October 4, 2012Applicant: International Business Machines CorporationInventors: Shohei Hido, Seiji Munetoh, Shoko Suzuki, Naohiko Uramoto, Sachiko Yoshihama
-
Publication number: 20120203508Abstract: A mechanism is provided to improve the availability of an ICS and an external system that uses data from the ICS by ensuring operation of the ICS and operation of the system even if an anomaly has occurred in a device in the ICS. The mechanism receives measured data from the plurality of devices, calculates prediction data by using the measured data and correlation information used for deriving prediction data for correlated devices, and provides the measured data and the prediction data.Type: ApplicationFiled: February 3, 2012Publication date: August 9, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Karim Hamzaoui, Shohei Hido, Shoko Suzuki, Sachiko Yoshihama
-
Publication number: 20110270851Abstract: A method, system and program for detecting similarity between two pieces of document data in which text information and non-text information are mixed. Each data object can include text, non-text, or a combination of text and non-text. The method includes converting each of the pieces of document data to a directed graph, storing the directed graph, and calculating a similarity between the converted directed graphs. In an embodiment, similarity is determined by importance of each object. Importance can be measured by a ratio of the area of the object to the total area of all objects. Moreover, when converting documents to a directed graph, objects can be converted to nodes which are connect to other nodes by edges.Type: ApplicationFiled: April 18, 2011Publication date: November 3, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Takuya Mishina, Sachiko Yoshihama
-
Publication number: 20110197283Abstract: A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a volatile storage unit 24 for reading and storing a counter array out of an external nonvolatile storage unit storing the counter array, in which the counter array is obtained by coupling a hash value generated for each signature key with a signature number counter for counting the number of signatures performed by use of the signature key, and a hash function unit 28 for reading the counter array out of the volatile storage unit 24, generating the hash value, and transferring the hash value to the validity check unit for a validity check.Type: ApplicationFiled: April 14, 2011Publication date: August 11, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: HIROSHI MARUYAMA, SEIJI MUNETOH, SACHIKO YOSHIHAMA
-
Publication number: 20110191855Abstract: In-development vulnerability response management, in one aspect, may detect a code instance that matches a vulnerability pattern; generate one or more hints associated with the code instance in response to the detecting; retrieve an action response to the code instance that matches a vulnerability pattern; and associate the retrieved action response with the code instance.Type: ApplicationFiled: May 26, 2010Publication date: August 4, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frederik De Keukelaere, Lin Luo, Peter K. Malkin, Masayoshi Teraguchi, Naohiko Uramoto, Shun X. Yang, Sachiko Yoshihama, Yu Zhang
-
Patent number: 7953977Abstract: A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a volatile storage unit 24 for reading and storing a counter array out of an external nonvolatile storage unit storing the counter array, in which the counter array is obtained by coupling a hash value generated for each signature key with a signature number counter for counting the number of signatures performed by use of the signature key, and a hash function unit 28 for reading the counter array out of the volatile storage unit 24, generating the hash value, and transferring the hash value to the validity check unit for a validity check.Type: GrantFiled: June 16, 2008Date of Patent: May 31, 2011Assignee: International Business Machines CorporationInventors: Hiroshi Maruyama, Seiji Munetoh, Sachiko Yoshihama
-
Patent number: 7930563Abstract: A platform configuration measurement device including: a configuration register; means for executing extension processing in which a predetermined operation is performed on a content of the configuration register by using a given additional value, a hash value is obtained by applying a predetermined hash function to a value obtained by the predetermined operation, and the hash value is set for a new content of the configuration register; and measurement extension means for obtaining measured values, corresponding to predetermined components constituting a platform, by sequentially making predetermined measurement on the predetermined components, and for allowing the means for executing extension processing to execute the extension processing using the measured values as the additional values, random extension means is provided for allowing the means for executing extension processing to execute the extension processing using a random value as the additional value.Type: GrantFiled: July 1, 2008Date of Patent: April 19, 2011Assignee: International Business Machines CorporationInventors: Timothy David Ebringer, Sachiko Yoshihama, Seiji Munetoh, Hiroshi Maruyama
-
Publication number: 20100218259Abstract: Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether the block is confidential. The document data set is dividable into blocks each being a unit including properties evaluated as having a certain characteristic. A document data set targeted for the confidentiality determination is acquired, and it is determined whether a document data set, including a block similar to each block of the acquired document data set, is stored. If the document data set including the similar block is stored, it is determined whether the confidentiality information indicating that the block is confidential is assigned to the block of the acquired document data corresponding to the similar block. If the confidentiality information indicating that the block is confidential is assigned, the acquired document data set is determined as confidential.Type: ApplicationFiled: February 22, 2010Publication date: August 26, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Takuya Mishina, Masayoshi Teraguchi, Sachiko Yoshihama
-
Patent number: 7765490Abstract: A method and structure for a tiled interface system provides a Tiled User Interface (TUI) in which a tile manager manages at least one tile cluster on a display device and translates an input event into a tile cluster event and at least one tile cluster controlled by the tile manager to be displayed on the display device. Each tile cluster includes at least one tile, each tile cluster corresponds to one or more predefined functions for a specific application, each tile cluster provides a complete interaction of all the predefined functions for the specific application respectively corresponding to that tile cluster, and each tile cluster can be presented in its entirety on a single frame of the display device using at most one input event.Type: GrantFiled: July 18, 2001Date of Patent: July 27, 2010Assignee: International Business Machines CorporationInventors: Jennifer C. Lai, Anthony Levas, Mark E. Podlaseck, Sachiko Yoshihama
-
Patent number: 7752465Abstract: A platform configuration measurement device including: a configuration register; means for executing extension processing in which a predetermined operation is performed on a content of the configuration register by using a given additional value, a hash value is obtained by applying a predetermined hash function to a value obtained by the predetermined operation, and the hash value is set for a new content of the configuration register; and measurement extension means for obtaining measured values, corresponding to predetermined components constituting a platform, by sequentially making predetermined measurement on the predetermined components, and for allowing the means for executing extension processing to execute the extension processing using the measured values as the additional values, random extension means is provided for allowing the means for executing extension processing to execute the extension processing using a random value as the additional value.Type: GrantFiled: April 7, 2005Date of Patent: July 6, 2010Assignee: International Business Machines CorporationInventors: Tim Ebringer, Sachiko Yoshihama, Seiji Munetoh, Hiroshi Maruyama
-
Publication number: 20100088668Abstract: A transformation tree for an object model (OM) is defined. The transformation tree has nodes interconnected by edges, where each node is connected to at most one other tree node. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. A transformation graph for the OM is constructed by simulating the transformation tree. The transformation graph has nodes interconnected by edges, and is a directed graph in which each node is connected to one or more other nodes. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. Crawling-oriented actions are performed in relation to the OM by being performed in relation to the transformation graph.Type: ApplicationFiled: October 6, 2008Publication date: April 8, 2010Inventors: Sachiko Yoshihama, Shinya Kawanaka, Takaaki Tateishi, Ory Segal, Adi Sharabani, Marco Pistoia, Guy Podjarny
-
Publication number: 20100005304Abstract: A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a volatile storage unit 24 for reading and storing a counter array out of an external nonvolatile storage unit storing the counter array, in which the counter array is obtained by coupling a hash value generated for each signature key with a signature number counter for counting the number of signatures performed by use of the signature key, and a hash function unit 28 for reading the counter array out of the volatile storage unit 24, generating the hash value, and transferring the hash value to the validity check unit for a validity check.Type: ApplicationFiled: June 16, 2008Publication date: January 7, 2010Inventors: Hiroshi Maruyama, Seiji Munetoh, Sachiko Yoshihama
-
Publication number: 20090070573Abstract: A platform configuration measurement device including: a configuration register; means for executing extension processing in which a predetermined operation is performed on a content of the configuration register by using a given additional value, a hash value is obtained by applying a predetermined hash function to a value obtained by the predetermined operation, and the hash value is set for a new content of the configuration register; and measurement extension means for obtaining measured values, corresponding to predetermined components constituting a platform, by sequentially making predetermined measurement on the predetermined components, and for allowing the means for executing extension processing to execute the extension processing using the measured values as the additional values, random extension means is provided for allowing the means for executing extension processing to execute the extension processing using a random value as the additional value.Type: ApplicationFiled: July 1, 2008Publication date: March 12, 2009Inventors: Timothy David Ebringer, Sachiko Yoshihama, Seiji Munetoh, Hiroshi Maruyama
-
Publication number: 20080301766Abstract: Access control for each part in an HTML document constituting a Web page is performed according to the origin of the part in the document. Thereby, a content provided by a malicious user or server is prevented from fraudulently reading and writing other parts in the HTML document. More precisely, on a server side, each content (including a JavaScript program) is automatically provided with a label indicating the domain that is the origin of the content. Thereby, the control of accesses to multiple domains (cross domain access control) can be performed on a client side. Under this configuration, a combination of the contents, metadata and the access control policy is transmitted from the server side to the client side.Type: ApplicationFiled: May 29, 2008Publication date: December 4, 2008Applicant: International Business Machines CorporationInventors: Satoshi Makino, Naizhen Qi, Naohiko Uramoto, Sachiko Yoshihama
-
Publication number: 20080178257Abstract: A system for recording an expected value which a hash value of each of a plurality of the components in this system should take on. The system further records in association with secret information an expected value of integrity information which serves as a condition for permitting access to the secret information. The system includes a register for storing integrity information for certifying the integrity of the components. In the system, a value computed by further inputting to a hash function the expected values which hash values of the components should take on is stored in the register as the integrity information before the components are started. Then, a hash value of a component newly started is computed, and the integrity information of the register is updated on condition that the computed hash value is different from the expected value.Type: ApplicationFiled: January 20, 2007Publication date: July 24, 2008Inventors: Takuya Mishina, Seiji Munetoh, Megumi Nakamura, Sachiko Yoshihama
-
Publication number: 20070168677Abstract: A computer system with authentication means including a storage device where first conditions, second conditions, and authentication information relating to authentication means are stored; means for acquiring the first conditions and the second conditions when a user requests authentication; and means for selecting at least one of a plurality of authentication means from the storage device based on the acquired first conditions and the second conditions.Type: ApplicationFiled: December 27, 2006Publication date: July 19, 2007Applicant: International Business Machines CorporationInventors: Michiharu Kudo, Seiji Munetoh, Megumi Nakamura, Sachiko Yoshihama