Patents by Inventor Sachiko Yoshihama

Sachiko Yoshihama has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8528104
    Abstract: A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a volatile storage unit 24 for reading and storing a counter array out of an external nonvolatile storage unit storing the counter array, in which the counter array is obtained by coupling a hash value generated for each signature key with a signature number counter for counting the number of signatures performed by use of the signature key, and a hash function unit 28 for reading the counter array out of the volatile storage unit 24, generating the hash value, and transferring the hash value to the validity check unit for a validity check.
    Type: Grant
    Filed: April 14, 2011
    Date of Patent: September 3, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hiroshi Maruyama, Seiji Munetoh, Sachiko Yoshihama
  • Publication number: 20120331562
    Abstract: Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether the block is confidential. The document data set is dividable into blocks each being a unit including properties evaluated as having a certain characteristic. A document data set targeted for the confidentiality determination is acquired, and it is determined whether a document data set, including a block similar to each block of the acquired document data set, is stored. If the document data set including the similar block is stored, it is determined whether the confidentiality information indicating that the block is confidential is assigned to the block of the acquired document data corresponding to the similar block. If the confidentiality information indicating that the block is confidential is assigned, the acquired document data set is determined as confidential.
    Type: Application
    Filed: September 5, 2012
    Publication date: December 27, 2012
    Applicant: International Business Machines Corporation
    Inventors: Takuya Mishina, Masayoshi Teraguchi, Sachiko Yoshihama
  • Patent number: 8307451
    Abstract: Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether the block is confidential. The document data set is dividable into blocks each being a unit including properties evaluated as having a certain characteristic. A document data set targeted for the confidentiality determination is acquired, and it is determined whether a document data set, including a block similar to each block of the acquired document data set, is stored. If the document data set including the similar block is stored, it is determined whether the confidentiality information indicating that the block is confidential is assigned to the block of the acquired document data corresponding to the similar block. If the confidentiality information indicating that the block is confidential is assigned, the acquired document data set is determined as confidential.
    Type: Grant
    Filed: February 22, 2010
    Date of Patent: November 6, 2012
    Assignee: International Business Machines Corporation
    Inventors: Takuya Mishina, Masayoshi Teraguchi, Sachiko Yoshihama
  • Patent number: 8296722
    Abstract: A transformation tree for an object model (OM) is defined. The transformation tree has nodes interconnected by edges, where each node is connected to at most one other tree node. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. A transformation graph for the OM is constructed by simulating the transformation tree. The transformation graph has nodes interconnected by edges, and is a directed graph in which each node is connected to one or more other nodes. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. Crawling-oriented actions are performed in relation to the OM by being performed in relation to the transformation graph.
    Type: Grant
    Filed: October 6, 2008
    Date of Patent: October 23, 2012
    Assignee: International Business Machines Corporation
    Inventors: Sachiko Yoshihama, Shinya Kawanaka, Takaaki Tateishi, Ory Segal, Adi Sharabani, Marco Pistoia, Guy Podjarny
  • Publication number: 20120254850
    Abstract: A method and an inspection apparatus for inspecting an information processing unit to which software update is applied. The apparatus includes a collection component configured to collect the behavior, for a plurality of times of software update, of the information processing unit to which one software update is applied. The apparatus also includes a determination component configured to compare the behavior collected for the plurality of times of software update to one another to determine whether the behavior of the information processing unit after the one software update is applied thereto is normal.
    Type: Application
    Filed: March 30, 2012
    Publication date: October 4, 2012
    Applicant: International Business Machines Corporation
    Inventors: Shohei Hido, Seiji Munetoh, Shoko Suzuki, Naohiko Uramoto, Sachiko Yoshihama
  • Publication number: 20120203508
    Abstract: A mechanism is provided to improve the availability of an ICS and an external system that uses data from the ICS by ensuring operation of the ICS and operation of the system even if an anomaly has occurred in a device in the ICS. The mechanism receives measured data from the plurality of devices, calculates prediction data by using the measured data and correlation information used for deriving prediction data for correlated devices, and provides the measured data and the prediction data.
    Type: Application
    Filed: February 3, 2012
    Publication date: August 9, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Karim Hamzaoui, Shohei Hido, Shoko Suzuki, Sachiko Yoshihama
  • Publication number: 20110270851
    Abstract: A method, system and program for detecting similarity between two pieces of document data in which text information and non-text information are mixed. Each data object can include text, non-text, or a combination of text and non-text. The method includes converting each of the pieces of document data to a directed graph, storing the directed graph, and calculating a similarity between the converted directed graphs. In an embodiment, similarity is determined by importance of each object. Importance can be measured by a ratio of the area of the object to the total area of all objects. Moreover, when converting documents to a directed graph, objects can be converted to nodes which are connect to other nodes by edges.
    Type: Application
    Filed: April 18, 2011
    Publication date: November 3, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takuya Mishina, Sachiko Yoshihama
  • Publication number: 20110197283
    Abstract: A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a volatile storage unit 24 for reading and storing a counter array out of an external nonvolatile storage unit storing the counter array, in which the counter array is obtained by coupling a hash value generated for each signature key with a signature number counter for counting the number of signatures performed by use of the signature key, and a hash function unit 28 for reading the counter array out of the volatile storage unit 24, generating the hash value, and transferring the hash value to the validity check unit for a validity check.
    Type: Application
    Filed: April 14, 2011
    Publication date: August 11, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: HIROSHI MARUYAMA, SEIJI MUNETOH, SACHIKO YOSHIHAMA
  • Publication number: 20110191855
    Abstract: In-development vulnerability response management, in one aspect, may detect a code instance that matches a vulnerability pattern; generate one or more hints associated with the code instance in response to the detecting; retrieve an action response to the code instance that matches a vulnerability pattern; and associate the retrieved action response with the code instance.
    Type: Application
    Filed: May 26, 2010
    Publication date: August 4, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Frederik De Keukelaere, Lin Luo, Peter K. Malkin, Masayoshi Teraguchi, Naohiko Uramoto, Shun X. Yang, Sachiko Yoshihama, Yu Zhang
  • Patent number: 7953977
    Abstract: A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a volatile storage unit 24 for reading and storing a counter array out of an external nonvolatile storage unit storing the counter array, in which the counter array is obtained by coupling a hash value generated for each signature key with a signature number counter for counting the number of signatures performed by use of the signature key, and a hash function unit 28 for reading the counter array out of the volatile storage unit 24, generating the hash value, and transferring the hash value to the validity check unit for a validity check.
    Type: Grant
    Filed: June 16, 2008
    Date of Patent: May 31, 2011
    Assignee: International Business Machines Corporation
    Inventors: Hiroshi Maruyama, Seiji Munetoh, Sachiko Yoshihama
  • Patent number: 7930563
    Abstract: A platform configuration measurement device including: a configuration register; means for executing extension processing in which a predetermined operation is performed on a content of the configuration register by using a given additional value, a hash value is obtained by applying a predetermined hash function to a value obtained by the predetermined operation, and the hash value is set for a new content of the configuration register; and measurement extension means for obtaining measured values, corresponding to predetermined components constituting a platform, by sequentially making predetermined measurement on the predetermined components, and for allowing the means for executing extension processing to execute the extension processing using the measured values as the additional values, random extension means is provided for allowing the means for executing extension processing to execute the extension processing using a random value as the additional value.
    Type: Grant
    Filed: July 1, 2008
    Date of Patent: April 19, 2011
    Assignee: International Business Machines Corporation
    Inventors: Timothy David Ebringer, Sachiko Yoshihama, Seiji Munetoh, Hiroshi Maruyama
  • Publication number: 20100218259
    Abstract: Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether the block is confidential. The document data set is dividable into blocks each being a unit including properties evaluated as having a certain characteristic. A document data set targeted for the confidentiality determination is acquired, and it is determined whether a document data set, including a block similar to each block of the acquired document data set, is stored. If the document data set including the similar block is stored, it is determined whether the confidentiality information indicating that the block is confidential is assigned to the block of the acquired document data corresponding to the similar block. If the confidentiality information indicating that the block is confidential is assigned, the acquired document data set is determined as confidential.
    Type: Application
    Filed: February 22, 2010
    Publication date: August 26, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takuya Mishina, Masayoshi Teraguchi, Sachiko Yoshihama
  • Patent number: 7765490
    Abstract: A method and structure for a tiled interface system provides a Tiled User Interface (TUI) in which a tile manager manages at least one tile cluster on a display device and translates an input event into a tile cluster event and at least one tile cluster controlled by the tile manager to be displayed on the display device. Each tile cluster includes at least one tile, each tile cluster corresponds to one or more predefined functions for a specific application, each tile cluster provides a complete interaction of all the predefined functions for the specific application respectively corresponding to that tile cluster, and each tile cluster can be presented in its entirety on a single frame of the display device using at most one input event.
    Type: Grant
    Filed: July 18, 2001
    Date of Patent: July 27, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jennifer C. Lai, Anthony Levas, Mark E. Podlaseck, Sachiko Yoshihama
  • Patent number: 7752465
    Abstract: A platform configuration measurement device including: a configuration register; means for executing extension processing in which a predetermined operation is performed on a content of the configuration register by using a given additional value, a hash value is obtained by applying a predetermined hash function to a value obtained by the predetermined operation, and the hash value is set for a new content of the configuration register; and measurement extension means for obtaining measured values, corresponding to predetermined components constituting a platform, by sequentially making predetermined measurement on the predetermined components, and for allowing the means for executing extension processing to execute the extension processing using the measured values as the additional values, random extension means is provided for allowing the means for executing extension processing to execute the extension processing using a random value as the additional value.
    Type: Grant
    Filed: April 7, 2005
    Date of Patent: July 6, 2010
    Assignee: International Business Machines Corporation
    Inventors: Tim Ebringer, Sachiko Yoshihama, Seiji Munetoh, Hiroshi Maruyama
  • Publication number: 20100088668
    Abstract: A transformation tree for an object model (OM) is defined. The transformation tree has nodes interconnected by edges, where each node is connected to at most one other tree node. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. A transformation graph for the OM is constructed by simulating the transformation tree. The transformation graph has nodes interconnected by edges, and is a directed graph in which each node is connected to one or more other nodes. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. Crawling-oriented actions are performed in relation to the OM by being performed in relation to the transformation graph.
    Type: Application
    Filed: October 6, 2008
    Publication date: April 8, 2010
    Inventors: Sachiko Yoshihama, Shinya Kawanaka, Takaaki Tateishi, Ory Segal, Adi Sharabani, Marco Pistoia, Guy Podjarny
  • Publication number: 20100005304
    Abstract: A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a volatile storage unit 24 for reading and storing a counter array out of an external nonvolatile storage unit storing the counter array, in which the counter array is obtained by coupling a hash value generated for each signature key with a signature number counter for counting the number of signatures performed by use of the signature key, and a hash function unit 28 for reading the counter array out of the volatile storage unit 24, generating the hash value, and transferring the hash value to the validity check unit for a validity check.
    Type: Application
    Filed: June 16, 2008
    Publication date: January 7, 2010
    Inventors: Hiroshi Maruyama, Seiji Munetoh, Sachiko Yoshihama
  • Publication number: 20090070573
    Abstract: A platform configuration measurement device including: a configuration register; means for executing extension processing in which a predetermined operation is performed on a content of the configuration register by using a given additional value, a hash value is obtained by applying a predetermined hash function to a value obtained by the predetermined operation, and the hash value is set for a new content of the configuration register; and measurement extension means for obtaining measured values, corresponding to predetermined components constituting a platform, by sequentially making predetermined measurement on the predetermined components, and for allowing the means for executing extension processing to execute the extension processing using the measured values as the additional values, random extension means is provided for allowing the means for executing extension processing to execute the extension processing using a random value as the additional value.
    Type: Application
    Filed: July 1, 2008
    Publication date: March 12, 2009
    Inventors: Timothy David Ebringer, Sachiko Yoshihama, Seiji Munetoh, Hiroshi Maruyama
  • Publication number: 20080301766
    Abstract: Access control for each part in an HTML document constituting a Web page is performed according to the origin of the part in the document. Thereby, a content provided by a malicious user or server is prevented from fraudulently reading and writing other parts in the HTML document. More precisely, on a server side, each content (including a JavaScript program) is automatically provided with a label indicating the domain that is the origin of the content. Thereby, the control of accesses to multiple domains (cross domain access control) can be performed on a client side. Under this configuration, a combination of the contents, metadata and the access control policy is transmitted from the server side to the client side.
    Type: Application
    Filed: May 29, 2008
    Publication date: December 4, 2008
    Applicant: International Business Machines Corporation
    Inventors: Satoshi Makino, Naizhen Qi, Naohiko Uramoto, Sachiko Yoshihama
  • Publication number: 20080178257
    Abstract: A system for recording an expected value which a hash value of each of a plurality of the components in this system should take on. The system further records in association with secret information an expected value of integrity information which serves as a condition for permitting access to the secret information. The system includes a register for storing integrity information for certifying the integrity of the components. In the system, a value computed by further inputting to a hash function the expected values which hash values of the components should take on is stored in the register as the integrity information before the components are started. Then, a hash value of a component newly started is computed, and the integrity information of the register is updated on condition that the computed hash value is different from the expected value.
    Type: Application
    Filed: January 20, 2007
    Publication date: July 24, 2008
    Inventors: Takuya Mishina, Seiji Munetoh, Megumi Nakamura, Sachiko Yoshihama
  • Publication number: 20070168677
    Abstract: A computer system with authentication means including a storage device where first conditions, second conditions, and authentication information relating to authentication means are stored; means for acquiring the first conditions and the second conditions when a user requests authentication; and means for selecting at least one of a plurality of authentication means from the storage device based on the acquired first conditions and the second conditions.
    Type: Application
    Filed: December 27, 2006
    Publication date: July 19, 2007
    Applicant: International Business Machines Corporation
    Inventors: Michiharu Kudo, Seiji Munetoh, Megumi Nakamura, Sachiko Yoshihama